Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    19-11-2024 08:17

General

  • Target

    _Silent Update.cmd

  • Size

    1KB

  • MD5

    9add192714f7645e21ca939f159d595d

  • SHA1

    b7aeb23abbb7795917943cf11af634d645cbef35

  • SHA256

    1d433ad24bd7efbfcee720496cb557fa36bcbf6d50ad57968e988e413b359c57

  • SHA512

    aa671e8f820e2ba3c791f5bbdcbec92be58d6b0c1373c8aae42aa2b631b124255183d86ba216a4d1b23e366c3d0474b734aa963e23fb2d9aad022dba75f7c2bd

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 20 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 64 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\_Silent Update.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Users\Admin\AppData\Local\Temp\Internet Download Manager 6.42.25.exe
      "Internet Download Manager 6.42.25.exe" /SILENT /UPDATE=1
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      PID:1736
      • C:\Users\Admin\AppData\Local\Temp\is-658DK.tmp\Internet Download Manager 6.42.25.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-658DK.tmp\Internet Download Manager 6.42.25.tmp" /SL5="$A019C,14999154,64512,C:\Users\Admin\AppData\Local\Temp\Internet Download Manager 6.42.25.exe" /SILENT /UPDATE=1
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2156
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\downlWithIDM.dll"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:3060
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMGetAll.dll"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:1284
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMIECC.dll"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:1468
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\idmfsa.dll"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:2512
        • C:\Windows\system32\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMShellExt64.dll"
          4⤵
          • Loads dropped DLL
          PID:2852
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\downlWithIDM64.dll"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3008
          • C:\Windows\system32\regsvr32.exe
            /s "C:\Program Files (x86)\Internet Download Manager\downlWithIDM64.dll"
            5⤵
            • Loads dropped DLL
            • Modifies registry class
            PID:3020
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMGetAll64.dll"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:3068
          • C:\Windows\system32\regsvr32.exe
            /s "C:\Program Files (x86)\Internet Download Manager\IDMGetAll64.dll"
            5⤵
            • Loads dropped DLL
            • Modifies registry class
            PID:3004
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMIECC64.dll"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:2480
          • C:\Windows\system32\regsvr32.exe
            /s "C:\Program Files (x86)\Internet Download Manager\IDMIECC64.dll"
            5⤵
            • Loads dropped DLL
            • Modifies registry class
            PID:2928
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s /u "C:\Program Files (x86)\Internet Download Manager\IDMShellExt.dll"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:2872
        • C:\Windows\SysWOW64\regedit.exe
          "C:\Windows\regedit.exe" /S "C:\Users\Admin\AppData\Local\Temp\settings.reg"
          4⤵
          • System Location Discovery: System Language Discovery
          • Runs .reg file with regedit
          PID:1696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Internet Download Manager\IDMGetAll.dll

    Filesize

    73KB

    MD5

    d04845fab1c667c04458d0a981f3898e

    SHA1

    f30267bb7037a11669605c614fb92734be998677

    SHA256

    33a8a6b9413d60a38237bafc4c331dfebf0bf64f8057abc335b4a6a6b95c9381

    SHA512

    ccd166dbe9aaba3795963af7d63b1a561de90153c2eaefb12f3e9f9ddebd9b1f7861ee76f45b4ef19d41ca514f3796e98b3c3660596730be8d8eb9e1048ef59e

  • C:\Program Files (x86)\Internet Download Manager\IDMGetAll64.dll

    Filesize

    93KB

    MD5

    597164da15b26114e7f1136965533d72

    SHA1

    9eeaa7f7de2d04415b8c435a82ee7eea7bbf5c8a

    SHA256

    117abaeb27451944c72ffee804e674046c58d769bd2e940c71e66edec0725bd1

    SHA512

    7a2d31a1342286e1164f80c6da3a9c07418ebeafb9b4d5b702c0f03065ee26949da22193eb403c8aeec012b6f1c5ff21179104943943302972492fcdccc850d9

  • C:\Program Files (x86)\Internet Download Manager\IDMIECC.dll

    Filesize

    463KB

    MD5

    23efcfffee040fdc1786add815ccdf0a

    SHA1

    0d535387c904eba74e3cb83745cb4a230c6e0944

    SHA256

    9a9989644213043f2cfff177b907ef2bdd496c2f65803d8f158eae9034918878

    SHA512

    cf69ed7af446a83c084b3bd4b0a3dbb5f013d93013cd7f2369fc8a075fe05db511cfe6b6afdef78026f551b53ad0cb7c786193c579b7f868dd0840b53dbb5e9f

  • C:\Program Files (x86)\Internet Download Manager\IDMIECC64.dll

    Filesize

    656KB

    MD5

    e032a50d2cf9c5bf6ff602c1855d5a08

    SHA1

    f1292134eaad69b611a3d7e99c5a317c191468aa

    SHA256

    d0c6d455d067e8717efe2cfb9bdcbeae27b48830fe77e9d45c351fbfb164716d

    SHA512

    77099b44e4822b4a556b4ea6417cf0a131ffb5ee65c3f7537ab4cdc9939f806b15d21972ea4d14a0d95cf946013b9997a9127d798016f68bcd957bbffdab6c11

  • C:\Program Files (x86)\Internet Download Manager\downlWithIDM.dll

    Filesize

    197KB

    MD5

    b94d0711637b322b8aa1fb96250c86b6

    SHA1

    4f555862896014b856763f3d667bce14ce137c8b

    SHA256

    38ac192d707f3ec697dd5fe01a0c6fc424184793df729f427c0cf5dfab6705fe

    SHA512

    72cdb05b4f45e9053ae2d12334dae412e415aebd018568c522fa5fe0f94dd26c7fe7bb81ccd8d6c7b5b42c795b3207dffa6345b8db24ce17beb601829e37a369

  • C:\Program Files (x86)\Internet Download Manager\downlWithIDM64.dll

    Filesize

    155KB

    MD5

    13c99cbf0e66d5a8003a650c5642ca30

    SHA1

    70f161151cd768a45509aff91996046e04e1ac2d

    SHA256

    8a51ece1c4c8bcb8c56ca10cb9d97bff0dfe75052412a8d8d970a5eb6933427b

    SHA512

    f3733ef2074f97768c196ad662565b28e9463c2c8cf768166fed95350b21c2eb6845d945778c251093c00c65d7a879186843eb334a8321b9956738d9257ce432

  • C:\Program Files (x86)\Internet Download Manager\idmfsa.dll

    Filesize

    90KB

    MD5

    79fef25169ac0a6c61e1ed17409f8c1e

    SHA1

    c19f836fca8845adf9ae21fb7866eedb8c576eb8

    SHA256

    801d3a802a641212b54c9f0ef0d762b08bcca9ab4f2c8603d823a1c1bc38c75a

    SHA512

    49bf489d6836b4327c6ebad722f733f66722aadb89c4eac038231e0f340d48bb8c4fe7ce70437213a54e21bce40a4a564a72a717f67e32af09b3f9aa59050aab

  • \Program Files (x86)\Internet Download Manager\IDMNetMon64.dll

    Filesize

    500KB

    MD5

    750e48e15233e2f27d664978f7f06b38

    SHA1

    81ccc803d79f5016bd05049724764cdc09cf1cf9

    SHA256

    e8639ec2f53d947f0400343368e60a4158332314e23adfa028f589b84c754744

    SHA512

    f318bee9af7f419329dff6d30173777d773de5603b0bf5ceef0d20e3202ddfdb47ce23cb8302d31afc23624f0c5ea76c5bcfeee30a2452fd0cce3da2e9dadd2d

  • \Program Files (x86)\Internet Download Manager\IDMShellExt.dll

    Filesize

    33KB

    MD5

    8ebbfdc893b3449ce9940e078e8a87ea

    SHA1

    def9a44b6901f33b0d6d06963a4b60bfa4327ae0

    SHA256

    211930e13a1270450388be5ca4e8a049f71710c53bc3983772e3613224190812

    SHA512

    b4cb33739f928d3e17eff33bf0692d49f446637bcbd1bdbdd243120c3e46537b254e62668cddc50bfccb9d52f8bde57b1bb45a26cb5dcec1e101bebaec703b5d

  • \Program Files (x86)\Internet Download Manager\IDMShellExt64.dll

    Filesize

    36KB

    MD5

    a3c44204992e307d121df09dd6a1577c

    SHA1

    9482d8ffda34904b1dfd0226b374d1db41ca093d

    SHA256

    48e5c5916f100880e68c9e667c4457eb0065c5c7ab40fb6d85028fd23d3e4838

    SHA512

    f700cf7accab0333bc412f68cdcfb25d68c693a27829bc38a655d52cb313552b59f9243fc51357e9dccd92863deecb529cc68adbc40387aad1437d625fd577f1

  • \Program Files (x86)\Internet Download Manager\Registration\IDMAutoREG.exe

    Filesize

    435KB

    MD5

    60cde96d6216f580a27894ed25e9c269

    SHA1

    9b6dc297f4a36fcb36eb96742d9980d26b5e2f0b

    SHA256

    54c8d9cfa7eb17da638fd7d5cb502a411399b983035403b17602dae8257957f1

    SHA512

    a1299da685fc4676015ad2fa9839f2357ed26fab2bd0387bc06890829a9591fdf706213de013e72a9379e63aa1c1f2ea9805ea7d91dcba2908f72757c5a7577d

  • \Users\Admin\AppData\Local\Temp\is-2U8SR.tmp\ISTask.dll

    Filesize

    66KB

    MD5

    86a1311d51c00b278cb7f27796ea442e

    SHA1

    ac08ac9d08f8f5380e2a9a65f4117862aa861a19

    SHA256

    e916bdf232744e00cbd8d608168a019c9f41a68a7e8390aa48cfb525276c483d

    SHA512

    129e4b8dd2665bcfc5e72b4585343c51127b5d027dbb0234291e7a197baeca1bab5ed074e65e5e8c969ee01f9f65cc52c9993037416de9bfff2f872e5aeba7ec

  • \Users\Admin\AppData\Local\Temp\is-2U8SR.tmp\VclStylesInno.dll

    Filesize

    3.0MB

    MD5

    b0ca93ceb050a2feff0b19e65072bbb5

    SHA1

    7ebbbbe2d2acd8fd516f824338d254a33b69f08d

    SHA256

    0e93313f42084d804b9ac4be53d844e549cfcaf19e6f276a3b0f82f01b9b2246

    SHA512

    37242423e62af30179906660c6dbbadca3dc2ba9e562f84315a69f3114765bc08e88321632843dbd78ba1728f8d1ce54a4edfa3b96a9d13e540aee895ae2d8e2

  • \Users\Admin\AppData\Local\Temp\is-2U8SR.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-658DK.tmp\Internet Download Manager 6.42.25.tmp

    Filesize

    911KB

    MD5

    4a6c1b37772b488d1bdff1eb6e589118

    SHA1

    e89a6b43b8fb61f988779c0bc3bd421090424d53

    SHA256

    109e48992f332ddde3f2ff8ea6459f11eff3d7968dab4951dc96ed7507f1bbf6

    SHA512

    132ff049d9d2d2dca20084f4fa1b3ebf059ccfbc0c5b0b29fabf78543896fb9e18d0dd2255f6bbbd5c637d5c6d405fd07ebd247c77bf751e0d8758cd8eda73cb

  • memory/1736-2-0x0000000000401000-0x000000000040B000-memory.dmp

    Filesize

    40KB

  • memory/1736-0-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2156-54-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-44-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-77-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-76-0x00000000075F0000-0x00000000075F1000-memory.dmp

    Filesize

    4KB

  • memory/2156-75-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-74-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-73-0x00000000075E0000-0x00000000075E1000-memory.dmp

    Filesize

    4KB

  • memory/2156-72-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-71-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-70-0x00000000075D0000-0x00000000075D1000-memory.dmp

    Filesize

    4KB

  • memory/2156-69-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-68-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-67-0x00000000075C0000-0x00000000075C1000-memory.dmp

    Filesize

    4KB

  • memory/2156-66-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-65-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-64-0x00000000075B0000-0x00000000075B1000-memory.dmp

    Filesize

    4KB

  • memory/2156-63-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-62-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-61-0x0000000002400000-0x0000000002401000-memory.dmp

    Filesize

    4KB

  • memory/2156-60-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-59-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-58-0x00000000023F0000-0x00000000023F1000-memory.dmp

    Filesize

    4KB

  • memory/2156-57-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-56-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-55-0x0000000001EA0000-0x0000000001EA1000-memory.dmp

    Filesize

    4KB

  • memory/2156-79-0x0000000007600000-0x0000000007601000-memory.dmp

    Filesize

    4KB

  • memory/2156-53-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-52-0x0000000001E50000-0x0000000001E51000-memory.dmp

    Filesize

    4KB

  • memory/2156-51-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-50-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-49-0x0000000001E40000-0x0000000001E41000-memory.dmp

    Filesize

    4KB

  • memory/2156-48-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-47-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-46-0x0000000001E30000-0x0000000001E31000-memory.dmp

    Filesize

    4KB

  • memory/2156-45-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-78-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-42-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-41-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-39-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-38-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-37-0x00000000005D0000-0x00000000005D1000-memory.dmp

    Filesize

    4KB

  • memory/2156-36-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-35-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-34-0x00000000005C0000-0x00000000005C1000-memory.dmp

    Filesize

    4KB

  • memory/2156-33-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-32-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-30-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-29-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-40-0x0000000001E10000-0x0000000001E11000-memory.dmp

    Filesize

    4KB

  • memory/2156-28-0x00000000005A0000-0x00000000005A1000-memory.dmp

    Filesize

    4KB

  • memory/2156-27-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-26-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-23-0x0000000007150000-0x000000000746A000-memory.dmp

    Filesize

    3.1MB

  • memory/2156-87-0x0000000000400000-0x00000000004F7000-memory.dmp

    Filesize

    988KB

  • memory/2156-89-0x0000000000400000-0x00000000004F7000-memory.dmp

    Filesize

    988KB

  • memory/2156-88-0x0000000000400000-0x00000000004F7000-memory.dmp

    Filesize

    988KB

  • memory/2156-90-0x0000000000400000-0x00000000004F7000-memory.dmp

    Filesize

    988KB

  • memory/2156-490-0x0000000000400000-0x00000000004F7000-memory.dmp

    Filesize

    988KB

  • memory/2156-80-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-81-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-82-0x0000000007610000-0x0000000007611000-memory.dmp

    Filesize

    4KB

  • memory/2156-83-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-84-0x0000000007470000-0x00000000075B0000-memory.dmp

    Filesize

    1.2MB

  • memory/2156-43-0x0000000001E20000-0x0000000001E21000-memory.dmp

    Filesize

    4KB

  • memory/2156-31-0x00000000005B0000-0x00000000005B1000-memory.dmp

    Filesize

    4KB

  • memory/2156-25-0x0000000000590000-0x0000000000591000-memory.dmp

    Filesize

    4KB

  • memory/2156-19-0x0000000000570000-0x0000000000586000-memory.dmp

    Filesize

    88KB

  • memory/2156-9-0x0000000000400000-0x00000000004F7000-memory.dmp

    Filesize

    988KB

  • memory/2156-542-0x0000000000400000-0x00000000004F7000-memory.dmp

    Filesize

    988KB