Analysis

  • max time kernel
    140s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2024, 01:37

General

  • Target

    b8def34fea92531627b7fa57918e53cb6f8823e4829deb97663a946f83372884.exe

  • Size

    464KB

  • MD5

    a4bbd937328a0f7e2710187a61542cc1

  • SHA1

    ea478b5fb6d88e14cdc404317a6db0f518cc58b8

  • SHA256

    b8def34fea92531627b7fa57918e53cb6f8823e4829deb97663a946f83372884

  • SHA512

    a8750b7b5aab7e144f3317ad6db27d7aa9472f783dcc398eab2c665bec1a5e68c0bc3d1fb5247977035ff9b6337c39b05a1f03916176064388dd525bea581edb

  • SSDEEP

    6144:WZT3H5umWrA7oSLvd5Gr83KS1PCG0LcMFM/2dsc0YQ9X43UWIp4XFJ4U3hHMHiF1:Wh3ZukLF5fRY5a/6GX4C4frUSASCzNmV

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8def34fea92531627b7fa57918e53cb6f8823e4829deb97663a946f83372884.exe
    "C:\Users\Admin\AppData\Local\Temp\b8def34fea92531627b7fa57918e53cb6f8823e4829deb97663a946f83372884.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\b8def34fea92531627b7fa57918e53cb6f8823e4829deb97663a946f83372884.exe
      "C:\Users\Admin\AppData\Local\Temp\b8def34fea92531627b7fa57918e53cb6f8823e4829deb97663a946f83372884.exe" C:\Users\Admin\AppData\Local\Temp\b8def34fea92531627b7fa57918e53cb6f8823e4829deb97663a946f83372884.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2088
    • C:\Program Files (x86)\Adobe\acrotray.exe
      "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\b8def34fea92531627b7fa57918e53cb6f8823e4829deb97663a946f83372884.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Program Files (x86)\Adobe\acrotray.exe
        "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\b8def34fea92531627b7fa57918e53cb6f8823e4829deb97663a946f83372884.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2780
      • C:\Program Files (x86)\Adobe\acrotray .exe
        "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\b8def34fea92531627b7fa57918e53cb6f8823e4829deb97663a946f83372884.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2080
        • C:\Program Files (x86)\Adobe\acrotray .exe
          "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\b8def34fea92531627b7fa57918e53cb6f8823e4829deb97663a946f83372884.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2856
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2768 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2544
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2768 CREDAT:275476 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1424

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

          Filesize

          914B

          MD5

          e4a68ac854ac5242460afd72481b2a44

          SHA1

          df3c24f9bfd666761b268073fe06d1cc8d4f82a4

          SHA256

          cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

          SHA512

          5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

          Filesize

          252B

          MD5

          34fdeab5d79ce7dd69d53516a1576058

          SHA1

          73632790b999f23d1a56f4011dad06606324aa72

          SHA256

          c78df048c1ccffb0031387c085d986fc0eea837ebc4bf81b0ef2ae957d44bc11

          SHA512

          8f85a4a140784eeda9a82d34059e36c9f305db0751f52d64139e0c6be8e63b024dfc8172dd7de7f5c58d967b6bac9eed66cfe2494d1f3042be72ee5c38bcfdf6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          638e205a99cd93f757d6bfb51d37f393

          SHA1

          f9f20f50e475c97867533b275aa7140b84179f60

          SHA256

          7a73d07aeebb5b2c4ba173be3086e544f8cdbc952ef8acf3bb310925b7b95dbb

          SHA512

          c1ace61723325ddf276f2b3ca4dc613ba1d5b3a7804c61f0c8a520f73f11880fa9b184b1f9e669d47a8724ca0bce430bffc382689212c2fa17e2a4586244ee63

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          2fc223b6ffb2d1341c418bd4b871f8aa

          SHA1

          7c33f38778fd62e8e9d165bedc85dce059a21f7a

          SHA256

          c0023aa1247df2ed20a10dd807c51ec990ecea044337d3a3b83bec2872a88dad

          SHA512

          e47cd1da705b610bc59f63d4b91df08c611f6cadca630f0b53bc98e2b0fcb968bc3aaf0d58590d24e2344ada8a01ed4d6f947190de7d474c2c923f7f782eaf19

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          ae5329b69c7b9cd75715b07aac6cf0e3

          SHA1

          facf0a1830b55cb32c849e5fa78f56217b82dadd

          SHA256

          6da94d32eee89804ef715daadfbd6759b99f4b3da5f95dcb4c9e91b3b8d3a875

          SHA512

          b5408592e4a45ad7e6d4f7f0bd53ecb2a1f57edc5899bfa3df5aa977e0f027f71ed9d0a9dee1750f81411c229405ed0a23040fd8ab268122e08dbe72b0916345

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          67b3d0b64a316e769818257829f8c764

          SHA1

          f30a27d53d2a4e9b1836fcfc2b8927c11fd1f5be

          SHA256

          14b056c0f6ffd9508b2a4233d6bd2d74533c8ba7f0cf85fdbdf0d4fdcf19701f

          SHA512

          53c40b297639f3fe2f0e8fac464766387e7d11dbbe5c72fb51b68195b181783f7a823b30bfd6c232c30f28229bc0a2586ee636abdd7864b2ebf6db0efdeb3395

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          b17947f1235d236a3e5aa9c943bf3a23

          SHA1

          b6aa706c720d972d90b96e6ff4146fb45378329f

          SHA256

          1274a65680b6d80fd66bd5d949961161ac6bb0d79bd25953fd96c24ad9332b91

          SHA512

          4837c638534f4eb37fed472728042926897e8e93e0e7aea6f2527be9daf4d521d8dcc382039ea3fd96f51bf8ed0e17dfa8c4abe6691b0b66f22bdfb9d981ec36

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          c372c464f25a6cc97df760275e4c4a86

          SHA1

          55150ec00711a264f165c3d1edbc6a3d738469b9

          SHA256

          f1424b0682669fc6f1a4f0e3253e78a4751ea46fc82cdaba822a20f400125690

          SHA512

          e42886827c3816a3641dcfc7b8237813c3bf5addd128145127b11b0e163b9494bb70a6c61d22e511c009b7f53fb2081207edfbabe8bfae60044142b950b2e530

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          01f0da4e48160cdbbe8bcb9f1c5bbf46

          SHA1

          38408d0dea5479f12c1870b904b4dd86859fff06

          SHA256

          7e5b51eb197a42b4183ec7793bd6b27139535801d86d52346f8ded15adc6a100

          SHA512

          2ac6afda1b4086f8897850c25deae4bc350ff541c592120ef7760f2b5c3873e8a4427769f5b2f083aad1459c551c156a35eb982642a0a493240b7aba97efb63f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          548f0aa951b1eeff99a5231fe3d470f2

          SHA1

          6ff71f3b5b2fdfc3b08212af79be79c16cb5e2e8

          SHA256

          afc4f8e5ae1b002911c2ac8e16dd30c802c028b18351e6fb880bbc63750a8b68

          SHA512

          01186db224bee34eec6ccf4a057ca00bee14453ff06aa43ee621750d41f690c241573ec75a152024153a7acb9fe464d35b4b7a8b8112df67f459a11e70356034

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          a51e92e75eee88c3ecc2c1d6c72e942b

          SHA1

          9bfb80c3d2c44c5f8309418a346262f1ec4d1f2e

          SHA256

          7ad71b1b17555835a3dfbe1689a16d0e163bdd68ec2adc9a2ffa57a3fe7590eb

          SHA512

          078878dea757b78c3e326cd8e87fe893043f49e12ba221cc49fb032c6afc1a70debb30c355e7438b99dc1612013862941d77047751396a5b88e2a50103113a17

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          1447bd58b1f09b63f07d6aca50e55fb5

          SHA1

          4287e3b4bd91de8c13519641e5e1248108034ccb

          SHA256

          774f82f25a129595375040b50a376ea68c84c86ac35eeb448ebe8a10f601e4b0

          SHA512

          de790abd7bf4132c3ef245f18f50b123641e538cc82db2fea281848f2bfa9ba4b5ba0b8e128f95a0871b96e3d91dad7057332f20a9f266dc339a67064e1e9a2e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          725871f77dcf6778522bc173995e2d02

          SHA1

          a03f44df6ca6b8a7d2bf8c977df31900f8cfbae8

          SHA256

          f324cf43a2011e5f49e86af55e315ed216de117b1d30f01fec15f1850841b982

          SHA512

          61ade1abda825994cd7bd031f75e951f28c9731ff48df92a9a6e10d12ed1bfe7d734123f1a4b2de7e67c5528a3c77790a02fef6b8247fe5142300d75ef0f27db

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          40f7b9b1ce3fac2730449372fa743bea

          SHA1

          2cab2c97e594c45b21a4640c77a69171e7a13c84

          SHA256

          dde2e75798f74383dbaa726757c7c92734f7207ea832ebd12ad6217051bf41ee

          SHA512

          6667233ffbf508f360ca358baa501a00df336eb8f24ad1b9f83a2931485e720b4926b6da4bb33d27b78e240a9ac5b9a161e5726aa5ecf185f371bb933a41c971

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          3f10c0d3c6acaadbb54aac7e78148bdc

          SHA1

          3e938f4d4a62af4b2c26baf3d76e9f735b9bc636

          SHA256

          8db70bad619bc0cf24f9d3119023727791629818a2d9524161f90748a86f7826

          SHA512

          fcf7b1b62994b752013a8317eb95f82f61ab16f3b927abc5eff4e5f4fc333fad13e6bab3dc254f112182566efaca9ca6430a80458c9d1aab481d28c4af500735

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f988983202f8179e027c7f644bfcbab7

          SHA1

          5282e4d213c675dbe23cae93fe6cdaff9b8a79fe

          SHA256

          0c5a3330260e7894e2ac7bf6088a8b63a1b51e7d337a8dfd5f9e9de8e867d8bd

          SHA512

          e5c462290e51c56822544c74ca16b6e8f884d195680740c0a1c501bd8f9205597725810d139b5661c119a91df8e339b91b0fa598dfa5a77ac3f53ff7df313371

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          3d6d7605b0e95d46050be1d4736df72d

          SHA1

          cbf5aa6aabb0729ebd1995b08976a3d4de305181

          SHA256

          8a6312bbf4ebe864d8a768814a6a16b48c2ff0f17e2cbd5e7c6c8749583fc93d

          SHA512

          4f56c5042ecf91424a0cb18fc10ab124100b623ddcab3470d182ecc6dcfdb7b85c59c341e6c2df330f50823c55d78a9f5313e5f03b9a0f1be94aeaad49f872e2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          517e45841df5891213674ffbad8540f7

          SHA1

          2073f19a65d39fba4415025aab656c5c63e4977b

          SHA256

          99e81a524d45850da0f3c279fed7ddf2565205b4b2b48f807a87ac189d7e5538

          SHA512

          0e8fe6a16b19bce0c0d70f37a2357cee3817f696e3ad6c6038f81dbcb93a34da95f52cec28ab654123e6e78c0db2632c2babb1741ae18832b61a2f5e3a392419

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          8483939ec416496e9f04feb2a024eb42

          SHA1

          6e846f988f4ff2b5c03b7c83946c2199a07bb76f

          SHA256

          f1208b2ec86619fd7784839b2868b1cac23dc630d2db70e49357a04decf2b7d1

          SHA512

          ea56495632f810aba1726da7fc2b23204308ca19419dc39f0815f03b5d65f9999aec21586533ddda3f20ab6e333531c3a8e975bb308ce792a3b7cf3db74790f0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          bf068d7adfd87383cde3b8d4458b506a

          SHA1

          5ed677d55d4b86c5e987628e8cbaeb20032c331d

          SHA256

          16322c0d3b8a00acd33c22f03be2560c06cfe2e95fb19aa6a53dad1c9c0b5a3d

          SHA512

          2b9c56544dc452efbf6b0e80545f141746dcc967ad716f6079aac1a24b913640c6f803e408a4dbb5f9ef236c77971880ae43256e41eea8731d2c7e4c15c630b6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          4dcb5546e3c6518d38ba240173109b87

          SHA1

          f399602802f30c98e6a6a02075bb5650ba468196

          SHA256

          67155cca34dfba9da861834ad5c7407216240b193844658036fa3bc684f24477

          SHA512

          9a3462fb71d975c63f50c185c9dc5c3a84addeb4179150d26a679cefec688bac43557acbde4e3c125de34a57f9c87d1a2dcc235a0b511289b82d971c5682db2e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          6247041dbd9bb25ab0005c5042e162bd

          SHA1

          2e24b60c8060abff7443d8218f49eccb9e5ce429

          SHA256

          07fe0ccce1954ac7685bd441b50a36335ea306c890ac32f8ccda2e790c52a979

          SHA512

          7c36b617c173ee8553e42415cc73b180f48236b933abec4168167b5b176bb7bcdf6ab0725360e4b67b6535eb0db143d15679a905b5818f77b9232bc12018145b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

          Filesize

          4KB

          MD5

          da597791be3b6e732f0bc8b20e38ee62

          SHA1

          1125c45d285c360542027d7554a5c442288974de

          SHA256

          5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

          SHA512

          d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

        • C:\Users\Admin\AppData\Local\Temp\Cab5A03.tmp

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\Tar5B30.tmp

          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • \Program Files (x86)\Adobe\acrotray .exe

          Filesize

          476KB

          MD5

          29b674b0ec828784d19878fe08af1785

          SHA1

          a5a8d8296f061167abec18d78de6360c37a45b24

          SHA256

          6c082036e79aaa975327250adbe974b27248569979458aa290ec321cc32179e8

          SHA512

          2c32fd42ac08d04fac4f9b0b52d24185391501a1b0374b70d3649c7cd940c4fb6190b4ca94bc54a8c8b2f28fe942c48e682a0276c9d82a3494364d169e634bc6

        • \Program Files (x86)\Adobe\acrotray.exe

          Filesize

          465KB

          MD5

          3a98e2286eda05ddd049c2452137481a

          SHA1

          ca4ee89a38b4dadea45ec9abc0de314252788e78

          SHA256

          a9a45b77efb8a31e2842dcb370ec10b73b55c0a46e6a0a399a1313723281c636

          SHA512

          e55da9343a51566218872df4f2a27ee6d5d6aa3aadb9fa55e46619d885a67a30399db2517b411891b1ca629b2c79dcdb3b7caac61a0095b495e7cdb0a4ba2672

        • memory/2244-31-0x0000000002F20000-0x0000000002F22000-memory.dmp

          Filesize

          8KB

        • memory/2244-0-0x0000000010000000-0x0000000010010000-memory.dmp

          Filesize

          64KB