Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

29/04/2024, 03:57

240429-ehxsrshf91 7

29/04/2024, 03:19

240429-dvcgxsge93 7

29/04/2024, 03:10

240429-dn8xjsgd42 7

Analysis

  • max time kernel
    56s
  • max time network
    60s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240419-en
  • resource tags

    arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    29/04/2024, 03:10

General

  • Target

    GunManiaSetup(4).exe

  • Size

    51.2MB

  • MD5

    2ab8b50b30c738d5bf9d143d3a04fb2e

  • SHA1

    1fe4c07e8f8cad012bb8940077156fc681c11295

  • SHA256

    aec4b44f6a7d73dfd5fb0953ae43ea47653c3de957da800abf0c85ef9c296358

  • SHA512

    3db47ea9138d363f093d12917a044a5961769db1b19fdbee24b4078ba67ed4980804a173d11420437eb0233d6078b2035c6c74532758f221153ccfb961f81ad7

  • SSDEEP

    393216:1pIMX/BFDRn5kd4eqJbJMKg+DVMr1PJvKXPDaF9W375zOlBOLfK6mIDoN0/zv+jG:1FYK/wlBOLC7/WyrV+

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GunManiaSetup(4).exe
    "C:\Users\Admin\AppData\Local\Temp\GunManiaSetup(4).exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:4060
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "type C:\Users\Admin\AppData\Local\Temp\neuillestealer-1714360301943\temp.ps1 | powershell.exe -noprofile -"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\Temp\neuillestealer-1714360301943\temp.ps1 "
        3⤵
          PID:2056
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -noprofile -
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3584
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\n21pjthm\n21pjthm.cmdline"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4992
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5D14.tmp" "c:\Users\Admin\AppData\Local\Temp\n21pjthm\CSCABB50DA0515745629B2AD98AFE31A8C9.TMP"
              5⤵
                PID:3480
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe"
        1⤵
        • Drops file in Windows directory
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3216
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8b68fcc40,0x7ff8b68fcc4c,0x7ff8b68fcc58
          2⤵
            PID:832
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1800,i,1002917098190281755,2848148666174247487,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1796 /prefetch:2
            2⤵
              PID:3124
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2056,i,1002917098190281755,2848148666174247487,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2100 /prefetch:3
              2⤵
                PID:1984
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2184,i,1002917098190281755,2848148666174247487,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2200 /prefetch:8
                2⤵
                  PID:4124
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,1002917098190281755,2848148666174247487,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3104 /prefetch:1
                  2⤵
                    PID:2132
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3112,i,1002917098190281755,2848148666174247487,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3308 /prefetch:1
                    2⤵
                      PID:4996
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4440,i,1002917098190281755,2848148666174247487,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4476 /prefetch:1
                      2⤵
                        PID:784
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4708,i,1002917098190281755,2848148666174247487,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4716 /prefetch:8
                        2⤵
                          PID:480
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4424,i,1002917098190281755,2848148666174247487,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4964 /prefetch:1
                          2⤵
                            PID:2904
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4396,i,1002917098190281755,2848148666174247487,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4968 /prefetch:1
                            2⤵
                              PID:3108
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4320,i,1002917098190281755,2848148666174247487,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4936 /prefetch:1
                              2⤵
                                PID:3068
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5340,i,1002917098190281755,2848148666174247487,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5332 /prefetch:1
                                2⤵
                                  PID:2896
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3388,i,1002917098190281755,2848148666174247487,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3472 /prefetch:1
                                  2⤵
                                    PID:4820
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5436,i,1002917098190281755,2848148666174247487,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5116 /prefetch:1
                                    2⤵
                                      PID:420
                                  • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                                    "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                                    1⤵
                                      PID:3672
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                      1⤵
                                        PID:4876
                                      • C:\Windows\System32\rundll32.exe
                                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                        1⤵
                                          PID:2908

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                          Filesize

                                          649B

                                          MD5

                                          d425f2093e05b701b23d9bea2a60a219

                                          SHA1

                                          05e6b3308b7c9f005251d4c6a302109d1a00d7fb

                                          SHA256

                                          3461bd4a86e047ac063ad46c1290f4fa83c2d0aeebc4dfb5add927cdbaab06ee

                                          SHA512

                                          e0a0d94960c336124084ad4e2ace00108f0b68dda792acffb6b0951aa6315136f6a9b8570d1bef55ae6d4eb4caec1dffb87f7162cb563c666161de225136be9f

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                          Filesize

                                          1KB

                                          MD5

                                          9cf66751af3e59d84a102b938e427204

                                          SHA1

                                          089d95e8f6312346ac1c129a94b73e0abc03a5b1

                                          SHA256

                                          d67e6baeaf03f2009845da8791c88530ed11342643dd7fdbdd8d18b0a07d9eb2

                                          SHA512

                                          976c9b7c9c0e855fa2ace01372406db8f01de9cc31d60d50c7b3098afa296f2b7506f99b6e1ab65e98eeaf6cd3f37427c74c467bc50ebbfa65134d12eb8e0203

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                          Filesize

                                          2B

                                          MD5

                                          d751713988987e9331980363e24189ce

                                          SHA1

                                          97d170e1550eee4afc0af065b78cda302a97674c

                                          SHA256

                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                          SHA512

                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          9KB

                                          MD5

                                          2625f1b911daa1c5a0c92d18413bbd96

                                          SHA1

                                          c7db686da4a4112e55aaf863bd6bf8ab9670d66a

                                          SHA256

                                          d32fe26b8ea7886c58b58fb2f0ba8c0bd7a1ae5c6803927c6c819e1800b16454

                                          SHA512

                                          bb788a87491d1c1374ae45e1452a78ba1b4037ec648c2c4d67e227875abf8ed8dd509e7adc76484efa5918a7331bd6e7489f686f94203eeb064f2f5d3f3007b6

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          77KB

                                          MD5

                                          807e458ed9f8d5830c3361c3e8cb3d12

                                          SHA1

                                          993a7f726d0fa2c62ad1273f27e23e1c025894d7

                                          SHA256

                                          2b8434c2503eb482f5a1e3fbdcf0bad24315f530a13f66ad7b34a0fd369730f1

                                          SHA512

                                          4e507a9d9b45e08e01c4f2d327c09280f535eaca27ccd27b2e2fa04991ced27fc3711ed62274027beffe8130f1fe546a57080b5f93464a4ec1b96a3961ee190b

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          77KB

                                          MD5

                                          a86bab2541e2872bfc9071f22a7b3c43

                                          SHA1

                                          ec4931ca93c10166178b4fa53d649b1a8fd0d057

                                          SHA256

                                          a90071723284124e729da7b6bd1c0568205085f54afd5179b5574d594a371d1b

                                          SHA512

                                          084373f559538cd0038ac98b3b672eb573960142902aab037b1a261a4ecd6ced04561be7e50a330ea3f73d770bb518efb9d92ccff37c3e60c9dfde6fc917b4ac

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                          Filesize

                                          264KB

                                          MD5

                                          f50f89a0a91564d0b8a211f8921aa7de

                                          SHA1

                                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                                          SHA256

                                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                          SHA512

                                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                        • C:\Users\Admin\AppData\Local\Temp\RES5D14.tmp

                                          Filesize

                                          1KB

                                          MD5

                                          fb8fe3e898a1a117f56506b37b253d7b

                                          SHA1

                                          90182452488c4ee0b988277ce98aecf9a1be653f

                                          SHA256

                                          ce7d72547499ccc0fc77f3baf2404181ebccc844359fc708c0cf0d2edce39aaa

                                          SHA512

                                          9c286179532f1acc4d3b57a8ee0be860d68cacb89681cc21a51018de786515b9255ade058096cdadd754535893ee058b1c160229ad44cec63df0c4e5415eda5e

                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rcnvlk5z.eqd.ps1

                                          Filesize

                                          60B

                                          MD5

                                          d17fe0a3f47be24a6453e9ef58c94641

                                          SHA1

                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                          SHA256

                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                          SHA512

                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                        • C:\Users\Admin\AppData\Local\Temp\n21pjthm\n21pjthm.dll

                                          Filesize

                                          3KB

                                          MD5

                                          8b255ff42448161d98fa2215fafe442e

                                          SHA1

                                          c6e3efbc5674bb215890ef466b6d94ffdf6519e8

                                          SHA256

                                          281a04b211a482678ebdf612d908f61e4aea0bf13d1c03e1c3e0207937b2058d

                                          SHA512

                                          34e633c0fafebb5a5a9b97c01b0ab454714ec3254de3fbe75052a8e65abb325ba5672ec9f6c5a923de93183cc8a963bfec810927c2f83c03103a6ce684202230

                                        • C:\Users\Admin\AppData\Local\Temp\neuillestealer-1714360301943\temp.ps1

                                          Filesize

                                          337B

                                          MD5

                                          73b96006f10fa4751894674df3a0ef90

                                          SHA1

                                          ebe6d5798552efd54dc7e17706fbcb7545c61e4b

                                          SHA256

                                          eec685962488449f098ed630b2ec1a403d27bc11759f414e4c64d4fce012ae47

                                          SHA512

                                          235b585ccd3795b844bd6325f45b48a44269c4f2d56e73ecd0b6606201af8cce73eecc880f84fb2e75953b7fd59b08baf4419c54c585992319f603edc8212e48

                                        • C:\Users\Admin\AppData\Local\Temp\pkg\f806f89dc41dde00ca7124dc1e649bdc9b08ff2eff5c891b764f3e5aefa9548c\sqlite3\build\Release\node_sqlite3.node

                                          Filesize

                                          1.8MB

                                          MD5

                                          66a65322c9d362a23cf3d3f7735d5430

                                          SHA1

                                          ed59f3e4b0b16b759b866ef7293d26a1512b952e

                                          SHA256

                                          f806f89dc41dde00ca7124dc1e649bdc9b08ff2eff5c891b764f3e5aefa9548c

                                          SHA512

                                          0a44d12852fc4c74658a49f886c4bc7c715c48a7cb5a3dcf40c9f1d305ca991dd2c2cb3d0b5fd070b307a8f331938c5213188cbb2d27d47737cc1c4f34a1ea21

                                        • \??\c:\Users\Admin\AppData\Local\Temp\n21pjthm\CSCABB50DA0515745629B2AD98AFE31A8C9.TMP

                                          Filesize

                                          652B

                                          MD5

                                          6a518ddd6041c896d07c09dd83095a30

                                          SHA1

                                          7af4b3fb1b67bb7581e218d8cea0ff55f0f38e54

                                          SHA256

                                          3479c1194e06285de51addc5cf0c39c28a6dd99ec050802ac05bec7213ba6122

                                          SHA512

                                          91a7eb709fe4726c06f7c04f33547376d31c9236eaddda65db67081d0f6771e4bf1a42034841ccdae206da0a37a1efbbcbef2e8926e000a524af923d40648a9c

                                        • \??\c:\Users\Admin\AppData\Local\Temp\n21pjthm\n21pjthm.0.cs

                                          Filesize

                                          291B

                                          MD5

                                          8e748907be602c9282ec791eb1029847

                                          SHA1

                                          8b5930eaf7d3fee3eff5aea3125122f8a3f7be49

                                          SHA256

                                          f474479ebe51c16859553b4f871f2ac58012d6ddcdbb6593fbc9a6be3345fa76

                                          SHA512

                                          ca5915d6eb1101947978afc9921d74a2994db2dc0854ed4e848ca18c84b4f5abec572fb89124480cf14ed8c5380b82dfff0e54d17f0e57f6d3d0e9c74e2d66ef

                                        • \??\c:\Users\Admin\AppData\Local\Temp\n21pjthm\n21pjthm.cmdline

                                          Filesize

                                          369B

                                          MD5

                                          1ef5a58720c3871ba0cdae246c1cc991

                                          SHA1

                                          85eec84c2e029f38c906b4caf1313cc636f7fd52

                                          SHA256

                                          27cba068c81652b680114027cfa063d821f54ee94704ae220cbe8b4fcfd6b147

                                          SHA512

                                          1524ddbcf13bb37a8f08dffe3efd8df1d4199d5a2be5b98cf591cee61cf60a04ec88e16ec4efff80c7a9ffd93a5898ff008f6a151673e815ad30a7d981b2162c

                                        • memory/3584-61-0x00007FF8A4C90000-0x00007FF8A5752000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/3584-56-0x000001ABAA240000-0x000001ABAA248000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/3584-43-0x000001ABAA290000-0x000001ABAA2D6000-memory.dmp

                                          Filesize

                                          280KB

                                        • memory/3584-40-0x00007FF8A4C90000-0x00007FF8A5752000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/3584-41-0x000001AB91AB0000-0x000001AB91AC0000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/3584-42-0x000001AB91AB0000-0x000001AB91AC0000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/3584-39-0x000001ABA9E60000-0x000001ABA9E82000-memory.dmp

                                          Filesize

                                          136KB