Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    30/04/2024, 02:40

General

  • Target

    cabad32d7855764ae9a54b5a28def015f233e8b0f2e9d780933e414c24e8f175.exe

  • Size

    382KB

  • MD5

    182c130cc37b284b08db74236f99e99a

  • SHA1

    0ecb30722d2b9964d665de628565ec706b0cd781

  • SHA256

    cabad32d7855764ae9a54b5a28def015f233e8b0f2e9d780933e414c24e8f175

  • SHA512

    0d4400438bae16d0c8075445a93287249ca1eebc3b2256b228f7609fbfdb334793961690a7ea16ef3c88abbae86d083dedf226d42a9c62585641de541d17595a

  • SSDEEP

    6144:UZT3k5umWrA7oSLvd5GrsHk42yqRfqOR/w0223zFe1vkdv/0DIrpLJO4BjnC+CMI:Uh3WukLF5g5JZ3eNk1ded

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cabad32d7855764ae9a54b5a28def015f233e8b0f2e9d780933e414c24e8f175.exe
    "C:\Users\Admin\AppData\Local\Temp\cabad32d7855764ae9a54b5a28def015f233e8b0f2e9d780933e414c24e8f175.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Users\Admin\AppData\Local\Temp\cabad32d7855764ae9a54b5a28def015f233e8b0f2e9d780933e414c24e8f175.exe
      "C:\Users\Admin\AppData\Local\Temp\cabad32d7855764ae9a54b5a28def015f233e8b0f2e9d780933e414c24e8f175.exe" C:\Users\Admin\AppData\Local\Temp\cabad32d7855764ae9a54b5a28def015f233e8b0f2e9d780933e414c24e8f175.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3036
    • C:\Program Files (x86)\Adobe\acrotray.exe
      "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\cabad32d7855764ae9a54b5a28def015f233e8b0f2e9d780933e414c24e8f175.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2628
      • C:\Program Files (x86)\Adobe\acrotray.exe
        "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\cabad32d7855764ae9a54b5a28def015f233e8b0f2e9d780933e414c24e8f175.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2776
      • C:\Program Files (x86)\Adobe\acrotray .exe
        "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\cabad32d7855764ae9a54b5a28def015f233e8b0f2e9d780933e414c24e8f175.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2808
        • C:\Program Files (x86)\Adobe\acrotray .exe
          "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\cabad32d7855764ae9a54b5a28def015f233e8b0f2e9d780933e414c24e8f175.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1240
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3052
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:3093512 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe\acrotray .exe

    Filesize

    398KB

    MD5

    8c6fee39bdfddb5c70304c8072c1a98e

    SHA1

    dd11cc37b79e8339dd9b379880683c2fa7323e6d

    SHA256

    2516f9977f35b4cea754fbf423cf93ecda9eb745de069a8b41a0574ac46be6cd

    SHA512

    78cc384ed1dfe17921bf1049c7e94d0eea02e2ee005df6aa169174d65214db4cf22e15168ca91b6d77fb4479836cee238e82a5c4c3dce1983c95bf4f39010a95

  • C:\Program Files (x86)\Adobe\acrotray.exe

    Filesize

    402KB

    MD5

    3240dae2f1524eeaef4bb3e1881b5187

    SHA1

    6b49ea7e07aab6004729da19c9052a4ed167c14f

    SHA256

    2f73e84f4b589ad1ff382cde866d1e0ee1294573c3b2a5919ad0a3989e44ee8b

    SHA512

    377e2cf98707344d1cb6aee63c097e3dfa6ef669f6edb77ab9270ad8d58a627ce3d65de6bf07b0389b95ac5a0600c4d8c285ce00e84ee88a38488a78cbd24b72

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    9353383d777ec8e5bb88d9cd5abfcb24

    SHA1

    752d4f4cc1e0d1d72399b526801bdadb3ed948cd

    SHA256

    2028771f73dbb412118897ce6c121708d792eda1673ee7242efc639c0b37cc6d

    SHA512

    f86ebd8c021483eda2592f76205f7eb852a893f29f19b7b1fcc821ae5e73e980daedea7f2ec69a4b782724e44fe76b9c463104b579e11b9d665864cc40f1e5c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    1aaf1910abe461d6426448491a53e43f

    SHA1

    5a8d9b7fcaa9a2ad8adb16f6614cc98f92307c14

    SHA256

    bc078926a005cf101567748c6cbfcf7f73763f165a9b5b163f674351f73c4db9

    SHA512

    9d2ea7adfef0cb7f7e098fbf650808ff3e2bd9fd91e718d33cf3a33caca3e3251b6c79b210a5d365b6e87af49ade568727eb3d67e38241cdfbb13257079a7382

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c3c88fe6f5871b02f37909ae9e63dfae

    SHA1

    e0e70d7507ddd30086901f2184138c5d4dffe720

    SHA256

    73d654eb3ac21fba4b1aac6ffc2395919b7758107ff8818eb65fad838cdcacf1

    SHA512

    c39bb7ca147b8588e87687966fd4fdae9c0e20327ca7ecb1e42c7759a39b69df608ea5a59d111ce464c9b6bab6605586d525ea8e6e85779a6dc1554058ead294

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    bff1016da59cb77d89871b780933e6c6

    SHA1

    073cd21e52b4148ce842d902f017f79dd362d813

    SHA256

    bfe416d3ba007a4b3db6b79c844f40fa20a21c07170af648ee0d4f705af07372

    SHA512

    ca984496e97a60067a092c0ed17d51c4545e06fe376d047eeaaf8b1d4cfe8875a39429dcf8d3c2ca67cb94e3723bd9645806e91c5e4eb90b78e087340ce352c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b0fb5d6a5bda64440955d3ce3a7bc0f9

    SHA1

    cffe8597d63574717faad5e1d877498b41c7083c

    SHA256

    7aba51d42c6634c00fd288b00781f92376cd0f47f551afcd66e52d2df1b42327

    SHA512

    e27a14582419a173ef9fbc77c60529ad4ef0ce9cb25b56dcc9aee39bea35aeff525dfdf066a2092142cb0f108c2afe28835c1ca1318f4bc571ced804022bd7f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    aca03470baef0109fa8fe3f82ec66d5a

    SHA1

    1bf4d0c601094c2e9c31ff5f5fa467dc5c4453f4

    SHA256

    0fe15b1fd7f9c7cf840ed75902db8c54036caafe7328f8045d9ed3112c123c85

    SHA512

    7e2aa2d5c4068068192b3b79fed8b30abec015528676555aca430ee2c4ec4a6f0b6e43b4491eedfe0b76ec0b698c5c75cec257e62cf7a33389e823f16fdc5bf8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    be593564f75b96ff37e2a2c28a83df84

    SHA1

    71cbe9f878ab7a0dfc3650101381423c33c52e1f

    SHA256

    0c2a8d994632e3c84152b86513c9d236c444b4e705b2e0e96e0fc961524bddc8

    SHA512

    618405f8eece9e1a58dab6e96c84aa6f8f6dd83ea6a42aa3500de55a0a6cad8c8b6eb16cb24c3537a7eea1015f7666382fbba86809be31ce03818c08b95fc34f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a9b909799b6244c26a34c77f6033d3d4

    SHA1

    143b7120b65841f1200ed1d91fa09847686fe723

    SHA256

    6e4ded9b008535a0d673b0a65315b75bbbaec38c1b1e4af6e3e3317e78e744e5

    SHA512

    62166ec43084c28edb8bcd1c119fe9b7556b5d5a805867f58978a70868a4f9885c2ce45510efe345da65e8f2ed3cb988dbb6401f3e86b0216e73e02e260d012b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c206b10b4dca3daad04ae35ea6d57fec

    SHA1

    4682f9374ef6011ebffac6a1c8129d1502c746dd

    SHA256

    3338a38ab4b4a3e9fa41d3c12d2b56543d62a839bcdb811f9da2e819ac2c02bb

    SHA512

    74c71ba020c55c5d7fd6e038a67219010e60310bd5abf194db7dd21687df744f0352456a2808d5736052fc47d66b67f37dc4739f9f8641db6196bfdf716358c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    18d391bc1506e3386860cfc08761e17e

    SHA1

    a9d0adbce115dfc19967ac3bb997166b7c68d3e9

    SHA256

    8443fce477adaaa983d08b1e7eb0c6cbd2cdeeec38690c96080289ed3aa9d95a

    SHA512

    e5c0299024f88adb714225fad38479695e8947e3a5983a3ad8ebe4911baceedc62a212a794ef5cc99b61272d2cf482cc768fb4b5ab15e7a1361d367e37a4d0ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ab3352fe3343863db61ba0b6b1516fd0

    SHA1

    34317a8982f25c11a7c8fe120102c1265fabcbe5

    SHA256

    10d39ddabc20ddb49ef48ec92d43c26479cfd6fbb162860dd113474fc5d4d6f4

    SHA512

    55930ee00b54e1177ffec43ed470bf31ea7cb00de49f808cb8a0de0ae7daf08d32a9408afdfd47dea549d47b8ac96362f28a4c8f85ceb298d5d1b5a676081b5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    7d89a63dce2a19fa4c078dafec93dbd5

    SHA1

    b6d03b9ec5476d52c08fb6e94476a52e0963fd1a

    SHA256

    0c0ab1231232d599ff8fa8f3c019cf30bc81d5f692b315d0611bd984b9e4344b

    SHA512

    3f3d15fd81b22c1b98b688c583036d06b4b562e268f7a4dbee1d00557d0d8840f1a6eb90fe0bf92361753b17c02db619ddcfbb1fa98fbdcc081134b5bd383d63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    09e76fec91578641eecd57111a88f1ac

    SHA1

    abfadfd160dca4a036d936496979304b8ed4b2d8

    SHA256

    c63b1f055576917ad440141343c9d07d809511aea6f8868f132dbc5b4e8e1d4f

    SHA512

    613734415cb81fb880b01194c7ed04d8d4f1c44eed081ffebb0e1abc040b2611cdaf21d6f90492ee2aa1ced178c1365f1dc24731e2e05b77d064b527f2c7ab83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    e82908e20275fee2a8a2bea6dc27a901

    SHA1

    6b287e160b667cf7e95db317d26426227fd01a6e

    SHA256

    2e9907bff8da10b9b91a536a6d5985fa5d8c010245ca0433a0a1e422d1f3a692

    SHA512

    db3359ace2a2968e0c6fe397c04a19fff7da549eee7224bb2325af62d3459ed902299ebccd75feff2c053ee8fd343f64679b2c8e2c5b913e6043a0095986df88

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6f0675e42bd5fcf42eab2087d3f9208e

    SHA1

    e093d5bac13d612bf24a253eb229168c8850c3c6

    SHA256

    4803574a6dd26eed0fe3d3ffd18a6b271099a9100722706ddf33554621769e76

    SHA512

    e1770a3387bf5f9748f6b9870bcb2b62903f2268a63a216dd1ae6a479b414adb5a2b382d8498380034d115a8d772e875a4a98e17e744bc184a9abd9cc5c09fff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    274e9d143dec15fe50ac531c3ec37e8b

    SHA1

    b61b23ecb005230566ec69a7d72e79bdd05982ca

    SHA256

    6c6fd7cf97adab5e566cd4cf1c4b3570bd3e7057d05eee9d8d250b45c85549cb

    SHA512

    c18bddcc33b0a8621cd992a24898a49bfe10d75ecf212a49cb832cd233cc84f77ce7ea597bce4e6665e46971fa344a81bd9824ed8575f3a6eec12cbb4c93c273

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    219c10ef66e10b2ca993416f4e0d0cc6

    SHA1

    5cab396bbf96e6bebfad6f1e151f194ce5a6b5f9

    SHA256

    914974319e164d90c4fc0a16fd2afb86a87ab608b6c9bb7ea9b8994d6da53658

    SHA512

    90fb70c5ad2320ace214e863c73a7640a0888aa439201f159b95ff5b9ef698c5d2c7c450f452fd770a707c949de50ee9f126ba367bf01a33da52a491dfe48fae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a93f1ea923202ea66b74ba5aafd72176

    SHA1

    7725f6d3c01234421821c3db51b9f61fbc17d490

    SHA256

    9f650d4e373807e203c2e815ec2c1d4c6a944b7c3721fa3a489c13c113459097

    SHA512

    319cca63c365b6f0e47887b428aee3a0c96ac2f746b2ffd06019edf045f93bb6016f9606cc15a73578a73ca32d67d34cb83358121ea1da34504570a8b5e8b4d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    91c2387d53a0d69fe7f0b6d8bdf8abae

    SHA1

    da3d78d3ad6e1790c197fe8275b261cbb7a196e7

    SHA256

    29df1084cef1138134a9f56b47b2f99453b80d845bb5f3571284b2633e787e0a

    SHA512

    610eb99349dd1b2d9a35c86e5f085e63227f384762fb615567b1f51f1ab9eb342681f0fea168b4a167a4a3ad54c707414d91f0ed2aaad36ff9d175bbf883e9ad

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORQXHVT\bCaZGNuRY[1].js

    Filesize

    32KB

    MD5

    f48baec69cc4dc0852d118259eff2d56

    SHA1

    e64c6e4423421da5b35700154810cb67160bc32b

    SHA256

    463d99ca5448f815a05b2d946ddae9eed3e21c335c0f4cfe7a16944e3512f76c

    SHA512

    06fdccb5d9536ab7c68355dbf49ac02ebccad5a4ea01cb62200fd67728a6d05c276403e588a5bdceacf5e671913fc65b63e8b92456ca5493dae5b5a70e4a8b37

  • C:\Users\Admin\AppData\Local\Temp\Cab874C.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar880E.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/1240-543-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/1240-51-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2172-31-0x00000000021A0000-0x00000000021A2000-memory.dmp

    Filesize

    8KB

  • memory/2172-17-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2172-1-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/2172-0-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2172-4-0x00000000021A0000-0x00000000021C1000-memory.dmp

    Filesize

    132KB

  • memory/2172-15-0x00000000021A0000-0x00000000021C1000-memory.dmp

    Filesize

    132KB

  • memory/2172-18-0x00000000021A0000-0x00000000021C1000-memory.dmp

    Filesize

    132KB

  • memory/2628-27-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2628-536-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2628-37-0x00000000028E0000-0x0000000002901000-memory.dmp

    Filesize

    132KB

  • memory/2776-537-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2776-36-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2808-39-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2808-542-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/3036-26-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/3036-5-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB