Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    30/04/2024, 07:19

General

  • Target

    7016785bb1287883a56550ef04fd9bd8531f0516ae203b5b1450c6f39e027532.exe

  • Size

    1.1MB

  • MD5

    7549973d9f58e681b9ea8f493249d340

  • SHA1

    94e31b8641e1ea131bab63c322d2a1988d4dcac0

  • SHA256

    7016785bb1287883a56550ef04fd9bd8531f0516ae203b5b1450c6f39e027532

  • SHA512

    23854679b18f28890d74dbca9205e2fce7fed4b078bd068795fa2f7f9fdb8addbc950b1821a0bc441bee014e34097a27fd3a5f5be51dc9b5d218a30517173a99

  • SSDEEP

    24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5QY:acallSllG4ZM7QzMP

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 30 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7016785bb1287883a56550ef04fd9bd8531f0516ae203b5b1450c6f39e027532.exe
    "C:\Users\Admin\AppData\Local\Temp\7016785bb1287883a56550ef04fd9bd8531f0516ae203b5b1450c6f39e027532.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3056
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2520
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2988
          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2784
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1208
              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:1348
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                  8⤵
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:2944
                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                    "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:2984
                    • C:\Windows\SysWOW64\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                      10⤵
                      • Loads dropped DLL
                      • Suspicious use of WriteProcessMemory
                      PID:1724
                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                        11⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:1568
                        • C:\Windows\SysWOW64\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                          12⤵
                          • Loads dropped DLL
                          • Suspicious use of WriteProcessMemory
                          PID:1660
                          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                            13⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:2872
                            • C:\Windows\SysWOW64\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                              14⤵
                              • Loads dropped DLL
                              • Suspicious use of WriteProcessMemory
                              PID:2304
                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                15⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:1664
                                • C:\Windows\SysWOW64\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                  16⤵
                                  • Loads dropped DLL
                                  PID:3008
                                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                    "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                    17⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:3056
                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                15⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2412
                                • C:\Windows\SysWOW64\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                  16⤵
                                  • Loads dropped DLL
                                  PID:2836
                                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                    "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                    17⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2456
                                    • C:\Windows\SysWOW64\WScript.exe
                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                      18⤵
                                      • Loads dropped DLL
                                      PID:1612
                                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                        19⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2288
                                        • C:\Windows\SysWOW64\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                          20⤵
                                          • Loads dropped DLL
                                          PID:2784
                                          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                            21⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2036
                                            • C:\Windows\SysWOW64\WScript.exe
                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                              22⤵
                                              • Loads dropped DLL
                                              PID:1924
                                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                23⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1860
                                          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                            21⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2780

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Config.ini

          Filesize

          92B

          MD5

          67b9b3e2ded7086f393ebbc36c5e7bca

          SHA1

          e6299d0450b9a92a18cc23b5704a2b475652c790

          SHA256

          44063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d

          SHA512

          826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09

        • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

          Filesize

          696B

          MD5

          840853c0aa5a4d702a8110a0cb763b4b

          SHA1

          58d028e09818c3fd2a9d521c26772cf4d1a9072a

          SHA256

          4438df44bf53668a332407b1c60d745bd1293a3f1acab9953b1d77e5131d2728

          SHA512

          f2b044e4710dadb03164bc78519207bd8d39d2cf9d4568fc11c38271eabc3e57410083b1cf29e40b1f6119ffa33ed4784ef652f112e50b554c2983755a606b6a

        • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

          Filesize

          753B

          MD5

          b7b8f429907ee9218e230ddcdcbfa0f9

          SHA1

          9898b6f95ce4ab08e3d9faa2438e3f4bf01fba0b

          SHA256

          926b001a61cefa4cba099814a1ed1cdf2876d4e69b304b84f17bada5cb15e37c

          SHA512

          d9be653ba5d6b25a38951898efda5b44abc3ac4de03ff7a4b6bc4b26fb04d30428495e0c632aeb0b4caff11341922ee3984bd60742c2ba91576774821606ebab

        • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

          Filesize

          696B

          MD5

          7e30bbf5f589f6ae6e5daf322f9f4c63

          SHA1

          4078c36ab68538c4d3aa3996b3a218fa786e5813

          SHA256

          9ed68f0cb63b2fca99956af2a550eb26ac99a883afef4ea6dc1236c14593266b

          SHA512

          63bb07bfbef6c96b50bbcb60d7f805930aaeefd6eadaa39dcb3e591c84636c670257a7f544bb0565174578a517d06de29a6c086812ef5cfb3039aea1917fb4b8

        • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

          Filesize

          696B

          MD5

          f68761d0622df41d256ee6fc39583d8a

          SHA1

          2dd40e574a86ff4b4be5e6aca6fda4d7fcc33d56

          SHA256

          b4bf1092c76497e935596e32fcb9119a44acab11e9b80b660ecea53867655245

          SHA512

          fd70e0b445bcd24117b449853c98a4996063d49f774a55bc5aca087b44cdb5381974551c4fcd2d3d1c82cd708fcb616009519f3914267ea5c37cdda4d31ea3a1

        • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

          Filesize

          696B

          MD5

          4f1c3e04fe09c26eac61a6a5e73d41a6

          SHA1

          5d61ea8f22af3a41286cfd2e03bf0d5fe912527e

          SHA256

          fcea651549aa97e3646b2b5857daab87dfa90158918203ea713fbc3d8dc96d2b

          SHA512

          23a253717242040b3497cc5dd9736a2a19adac084ebdf17f578f11a3c07aa584c78a8155ece8de4317293c4b75fca53b4cc225d05785f69e01d18ef6582e01f5

        • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

          Filesize

          696B

          MD5

          d6998fa6acf02bf81ca3b787bf2aac86

          SHA1

          c3c08503b40c243120c2815bec43823d1457c93f

          SHA256

          5f2a7d05a52819de3a4caa28c4b355ca484eea50de6ed9ce8078d244de25e365

          SHA512

          068536d1ae495d6610534c4536f6024b33bac2e935cb37f99668affefcb8d1fcd8c420e150b6e5807a58157eec83b24cc9017e7cb7b597a7523decdfbaf2a8e0

        • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

          Filesize

          696B

          MD5

          be85ce7bb02d959078db568ee3a8905d

          SHA1

          e3598468f1db49d961a98da4deda91a619b56985

          SHA256

          4d76969f7a746574f6be0eca7b1939230ca7607610f12f82b670f4b7bf829806

          SHA512

          8ffd0d9432c57b2a445afb0701de88903bee1df5295b7ec14042623bfd5d72d0d3cdf198bbdce55be06439c8ac594ddc9bcf53f425bf9e9c9ebb299f6d8150cb

        • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

          Filesize

          696B

          MD5

          b9f42b67196579be4b48ef3493e40a6d

          SHA1

          f0a798a4aa9401ce637b3016829d6bc178b46b36

          SHA256

          5af7cfef4fc0b02f32178caf67f947bc09a9631a5ec201ffa67b2f4f470bbed2

          SHA512

          875207383356da783c8f932da091d7c1316a0859406a388a6a4b0e641cc15326ac5134a5dc3e5299cccd6c245456483db86f5f9652fec2fa049996259d166284

        • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

          Filesize

          696B

          MD5

          5200291c61f8a54498d5ea3882597c4f

          SHA1

          7faf4fa36d25b6e6a25fa637cd4d565bacfc98c9

          SHA256

          370d3f0009b4f5179e917aaf335aa8267dd7e03688f0fff18f72d7d7af43d55f

          SHA512

          7fab6730403115fe4a56ca1d5d9056a0796ca40f75c0499cb0a1d7cb77ad696163f960414f3248c7893a1cc99dadcdb73251603bca50a54668b45b79bc62b06e

        • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

          Filesize

          696B

          MD5

          bdff210bf33c9ed5f2b10773c8c98ff5

          SHA1

          fc4fbaca4c7f23506dc792dec89e640050ad62e9

          SHA256

          900ab6b8ac0df4e138335d9d8e283495f569bf9fa1f401a6f8122661104f8cf8

          SHA512

          45849b735796586ea2518bd4aec42377db54b2de01025df65e52d8d1561d7e26702051c945ac7257857e00d7ab9d2d7fbf87f178e1e606905e095b22d95e5b32

        • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

          Filesize

          696B

          MD5

          951aaea1269f2a203f3dd7cd181c5d34

          SHA1

          3623d216764b24aa0b02cbc136287252bf5b412a

          SHA256

          228b66ed4c4a1270fe5a6655cdd849de937351e95974b96acafa59b8107b7dd4

          SHA512

          cd84967ad43a13c3cd57cc80f6533a9e9fd93a5eddf4807825b8d19883da4acda3e7b4ff963f23209c579050fedf834382d8e718386c852ceaf350b2b0f91816

        • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

          Filesize

          696B

          MD5

          b42266100fb9f5e0b7be593aac3c37cf

          SHA1

          7cd55f31fd2871d09de73a6f62e3a7e1a53327b2

          SHA256

          1a6710caaf3886be368f3205ee8c9905e10f8ed754d80598c80f1455a700d846

          SHA512

          d3e5a4f7395d6196403e60214239043b2da6e546cbe080f74c3a680a6f4a7fe1374988df0a1aa84dbc0e41199efd8fb11050d1d1295f3b45811935d740a5108b

        • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

          Filesize

          1.1MB

          MD5

          06a5082a72fc942fedc558872674fb77

          SHA1

          5a7f3a4f21929907155222d9bfabc5c36e78d41e

          SHA256

          3338623e487f391468f9c3a8727244d74db55b30742d970f8f85597b4a54c5ed

          SHA512

          5db6d3ae241ec7f1032210589f557d6433b8ebf5834c8b3919f8bb7a0f701c603ad59cf53e690ed671c6dbf8fbbd61efd7110ced268d0f048efc3cea64a716b2

        • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

          Filesize

          1.1MB

          MD5

          5f8859f4fb474f8ad064aacd4ebac7df

          SHA1

          7243b195303cf79014951c7f297388ab427ae730

          SHA256

          aff2aec7359cbbe292611ab03dd6c518ce9266fc99ba424f1c3148d11dcecc29

          SHA512

          5ded616ef4d5acc4b28f35478ad3162bc90ede297eaf0a2e18eab1ec3a0615b87f9efcf95b1224ed6626c8f40b93c8257bcb38da1d002c265c2ef5fdaa7b4b5e

        • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

          Filesize

          1.1MB

          MD5

          3c28f45aca29b3f1b5bdb6a66c7df3a5

          SHA1

          a7707995c1d6f9b410ec9ec87fd92a3970f7c3a2

          SHA256

          353248c5cf19867cf3dc5c3f7ece23f81f38469d4b59110eae22bf8520e56ed0

          SHA512

          db89c4661c465c250abe4c97bf03ffdf68bb615e15c7b26c4b3e2755cfa889bfaaac22d7b37c1901b1dd3abf478e9d179472a2ee68539b9f3560b463d5ad06f7

        • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

          Filesize

          1.1MB

          MD5

          e0fffc4f31180757f006e1e822188c38

          SHA1

          de5353124da852b57c583a84c8b9d7d6b0093606

          SHA256

          d7a3386ec00aedc6f339ea1f485cc11929f2467e8c3efd4908c24ea6d96a37c9

          SHA512

          ab61f333f601b5c1e92e2efb68531ae32b9e527659090bb6d5dc77544e7712207f75744710fd4061af20112bcd63efda047f1295508aed9b02df4c37a5ef9b7a

        • memory/1348-44-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/1348-51-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/1568-78-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/1568-69-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/1660-82-0x0000000004690000-0x00000000047EF000-memory.dmp

          Filesize

          1.4MB

        • memory/1664-99-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/1664-104-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/1724-70-0x0000000005980000-0x0000000005ADF000-memory.dmp

          Filesize

          1.4MB

        • memory/1724-68-0x0000000005980000-0x0000000005ADF000-memory.dmp

          Filesize

          1.4MB

        • memory/1860-155-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/2036-150-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/2084-0-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/2084-9-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/2288-140-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/2304-98-0x0000000003E90000-0x0000000003FEF000-memory.dmp

          Filesize

          1.4MB

        • memory/2412-114-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/2412-108-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/2456-117-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/2456-131-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/2520-16-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/2520-25-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/2780-154-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/2780-153-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/2784-32-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/2784-40-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/2872-83-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/2872-91-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/2944-54-0x0000000005BA0000-0x0000000005CFF000-memory.dmp

          Filesize

          1.4MB

        • memory/2984-55-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/2984-63-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/2988-31-0x00000000059C0000-0x0000000005B1F000-memory.dmp

          Filesize

          1.4MB

        • memory/3008-127-0x0000000005940000-0x0000000005A9F000-memory.dmp

          Filesize

          1.4MB

        • memory/3056-14-0x0000000005900000-0x0000000005A5F000-memory.dmp

          Filesize

          1.4MB

        • memory/3056-15-0x0000000005900000-0x0000000005A5F000-memory.dmp

          Filesize

          1.4MB

        • memory/3056-128-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB

        • memory/3056-129-0x0000000000400000-0x000000000055F000-memory.dmp

          Filesize

          1.4MB