Analysis

  • max time kernel
    43s
  • max time network
    44s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/02/2025, 08:24

General

  • Target

    SilverBulletPro.exe

  • Size

    1.1MB

  • MD5

    1719753c2e9deea9520d879a5b8d01b5

  • SHA1

    50610f754a2b99017eecb449eea4b0489d1cbdec

  • SHA256

    de36b984b5c5a2716d8a4b8a32dbdecddc41b379374159f66862567130da88d4

  • SHA512

    a91199c5ba5c4e9dbdf9fea12b228c5f5650f5b53b09481fd937be44d3d6b6fce3f0671af46e32923dacacbbe0877ced61251995a38d183da946446685b9c5eb

  • SSDEEP

    12288:pAu6wZePi/hIRMJuAfkiaU7vsBqpq+S1SwW8o3sovW3Xrvk9I6ULshS:iwZ96M0/iaU7vqqppvcbvsULsh

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

cpanel.hackcrack.io:3333

Mutex

Windows Explorer

Attributes
  • reg_key

    Windows Explorer

  • splitter

    |'|'|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 16 IoCs

    Run Powershell and hide display window.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Hide Artifacts: Hidden Window 1 TTPs 8 IoCs

    Windows that would typically be displayed when an application carries out an operation can be hidden.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SilverBulletPro.exe
    "C:\Users\Admin\AppData\Local\Temp\SilverBulletPro.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:840
    • C:\Users\Admin\AppData\Local\Temp\Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4704
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4404
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3000
          • \??\c:\windows\system32\cmstp.exe
            "c:\windows\system32\cmstp.exe" /au C:\Users\Admin\AppData\Local\Temp\avgp345o.inf
            5⤵
              PID:3236
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe"
              5⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3764
              • C:\Windows\SYSTEM32\netsh.exe
                netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe" "explorer.exe" ENABLE
                6⤵
                • Modifies Windows Firewall
                • Event Triggered Execution: Netsh Helper DLL
                PID:5040
      • C:\Users\Admin\AppData\Local\Temp\Setup.exe
        "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:820
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:368
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4756
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
              dw20.exe -x -s 744
              5⤵
              • Checks processor information in registry
              • Enumerates system info in registry
              • Suspicious use of AdjustPrivilegeToken
              PID:2972
      • C:\Users\Admin\AppData\Local\Temp\SilverBulletPro .exe
        "C:\Users\Admin\AppData\Local\Temp\SilverBulletPro .exe"
        2⤵
        • Executes dropped EXE
        PID:920
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\version.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Windows\version.exe
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3612
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c PowerShell.exe -windowstyle hidden Add-Mppreference -ExclusionPath C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe
        2⤵
        • Hide Artifacts: Hidden Window
        • Suspicious use of WriteProcessMemory
        PID:428
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          PowerShell.exe -windowstyle hidden Add-Mppreference -ExclusionPath C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious use of AdjustPrivilegeToken
          PID:4072
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c PowerShell.exe -windowstyle hidden Add-Mppreference -ExclusionPath C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cortana.exe
        2⤵
        • Hide Artifacts: Hidden Window
        • Suspicious use of WriteProcessMemory
        PID:4260
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          PowerShell.exe -windowstyle hidden Add-Mppreference -ExclusionPath C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cortana.exe
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious use of AdjustPrivilegeToken
          PID:4052
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c PowerShell.exe -windowstyle hidden Add-Mppreference -ExclusionPath C:\Users\Admin\AppData\Roaming\Microsoft\Windows\OneDrive.exe
        2⤵
        • Hide Artifacts: Hidden Window
        • Suspicious use of WriteProcessMemory
        PID:4448
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          PowerShell.exe -windowstyle hidden Add-Mppreference -ExclusionPath C:\Users\Admin\AppData\Roaming\Microsoft\Windows\OneDrive.exe
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious use of AdjustPrivilegeToken
          PID:3640
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c PowerShell.exe -windowstyle hidden Add-Mppreference -ExclusionPath C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
        2⤵
        • Hide Artifacts: Hidden Window
        • Suspicious use of WriteProcessMemory
        PID:3956
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          PowerShell.exe -windowstyle hidden Add-Mppreference -ExclusionPath C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious use of AdjustPrivilegeToken
          PID:116
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c PowerShell.exe -windowstyle hidden Add-Mppreference -ExclusionPath C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SystemSettings.exe
        2⤵
        • Hide Artifacts: Hidden Window
        • Suspicious use of WriteProcessMemory
        PID:4552
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          PowerShell.exe -windowstyle hidden Add-Mppreference -ExclusionPath C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SystemSettings.exe
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious use of AdjustPrivilegeToken
          PID:4648
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c PowerShell.exe -windowstyle hidden Add-Mppreference -ExclusionPath C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Taskmgr.exe
        2⤵
        • Hide Artifacts: Hidden Window
        • Suspicious use of WriteProcessMemory
        PID:1744
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          PowerShell.exe -windowstyle hidden Add-Mppreference -ExclusionPath C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Taskmgr.exe
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious use of AdjustPrivilegeToken
          PID:4844
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c PowerShell.exe -windowstyle hidden Add-Mppreference -ExclusionPath C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\msedge.exe
        2⤵
        • Hide Artifacts: Hidden Window
        • Suspicious use of WriteProcessMemory
        PID:2624
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          PowerShell.exe -windowstyle hidden Add-Mppreference -ExclusionPath C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\msedge.exe
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious use of AdjustPrivilegeToken
          PID:3708
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c PowerShell.exe -windowstyle hidden Add-Mppreference -ExclusionPath C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\SystemSettingsBroker.exe
        2⤵
        • Hide Artifacts: Hidden Window
        • Suspicious use of WriteProcessMemory
        PID:2716
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          PowerShell.exe -windowstyle hidden Add-Mppreference -ExclusionPath C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\SystemSettingsBroker.exe
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious use of AdjustPrivilegeToken
          PID:4852
    • C:\Windows\system32\taskkill.exe
      taskkill /IM cmstp.exe /F
      1⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:4584

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\explorer.exe.log

      Filesize

      676B

      MD5

      79d206410500f74a6f755f82d514c459

      SHA1

      67782eff101d316ad1eb79ee76dc4095f5994db3

      SHA256

      697be2be7b14b3ef2953b93cc2d380b350c19e2ef41399ab289fe1c8e2281f36

      SHA512

      72848557148090200726fbfa30c008e54067d79e804ef604c78ee4fdc0c77d3da6c60abedb5c05e4943eb768d737873db585619b2559a1b6d1e6b917d216d822

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Setup.exe.log

      Filesize

      1KB

      MD5

      a8a147915e3a996fdbe10b3a3f1e1bb2

      SHA1

      abc564c1be468d57e700913e7b6cf8f62d421263

      SHA256

      8b96a8557deea66696837af011843d6a82451ba57c8f9b5a2726a70818d6fc7e

      SHA512

      17b42f17ef60a9f625703172763f692e5ed2ca93564a97853dfa72bb0ac6305ef3267aea0b205938e3aa8eac10156d9d4f322b30d0329d92d647bcec6372731c

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      d85ba6ff808d9e5444a4b369f5bc2730

      SHA1

      31aa9d96590fff6981b315e0b391b575e4c0804a

      SHA256

      84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

      SHA512

      8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.exe.log

      Filesize

      1KB

      MD5

      cafd74774ee92e32d33d986aa1d02887

      SHA1

      4eba3d811e150ea0e03193916820ceb1353d7d3a

      SHA256

      a9a2445fa2c7695be72695fb46f2d5fbb7106691d7840d454fac2b91ddd014b0

      SHA512

      27baef4953ca7ffd10dfc22d6ee2e6b961c1c08aa2a9813737afb4a265bfa9dfa56d577b20b0aefa84c157ab8fbc3fc4a7456c4e5093dd480f22c3fbdef30bf6

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      2e907f77659a6601fcc408274894da2e

      SHA1

      9f5b72abef1cd7145bf37547cdb1b9254b4efe9d

      SHA256

      385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233

      SHA512

      34fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      d28a889fd956d5cb3accfbaf1143eb6f

      SHA1

      157ba54b365341f8ff06707d996b3635da8446f7

      SHA256

      21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

      SHA512

      0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      119B

      MD5

      7c61d27a6db3717fa1c36027be2730fc

      SHA1

      1ed6d7067a568585a4eb4dde714dd13d90b2b81e

      SHA256

      c86a40e87c3d504e2afec2a3bf7cfa9ea3e315e40560c9f76c52299be0090287

      SHA512

      3e322022ec09b14a453e6a9eeb51642e689574c9f83d2afcd3708b03af75cb2cb7b745ad4b8eeba50d5e79b6e7a5fc5d1f2dd73d39e69050ca2f27ad546aed98

    • C:\Users\Admin\AppData\Local\Temp\Setup.exe

      Filesize

      449KB

      MD5

      914ec5019485543bb2ec8edcacd662a7

      SHA1

      2b0e0a2513383701690a22e7aebeaba44b2343cc

      SHA256

      2a95104de0f1dd12579c1068d0a789721f7655de59f84ed431f006b8bbe2d2a3

      SHA512

      705404fbc5bd94a61fb6ead690058da43500f14d0b56fcec4922506cbdc80aa74165d031ebc387a2ba0396b0347137e174ac6c0adef8e5b5b79ea0510646746f

    • C:\Users\Admin\AppData\Local\Temp\SilverBulletPro .exe

      Filesize

      600KB

      MD5

      d0938f6257589b55244d4a8f86d9c29e

      SHA1

      ffca994d0326a6d7c924621277988836b2c4469e

      SHA256

      071e154de4ee23ed0d33f1543836f1a1931d8ae3b0386a98848cc4c9d8a99146

      SHA512

      47bd17954a1742931958539595e48e0887467ef9b61d0c85f7305b6d53d7085c7e91e869c05ba6741bbba5f2572a50f7b718f973fd84f34e9352ec2380a5686a

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_j1ydcsci.aah.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\avgp345o.inf

      Filesize

      619B

      MD5

      6f1420f2133f3e08fd8cdea0e1f5fe27

      SHA1

      3aa41ec75adc0cf50e001ca91bbfa7f763adf70b

      SHA256

      aed1ac2424a255f231168bcb02f16b6ea89603e0045465c2149abcde33a06242

      SHA512

      d5629e9835f881cd271e88d9ec2d2c27b9d5d1b25329ade5cfb9824a6358c9e98e66f1b89ac9459b4c540c02af2728129dd8523bdf007cadf28b5fa2d199a2aa

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe

      Filesize

      356KB

      MD5

      f5c7b3834802705249ddf4702b86ec20

      SHA1

      47cc4fe19da5e600717e162279e31339e5d35168

      SHA256

      613b7f3b124505e4ee4461ac76136a43f32cc93d281f46c9bee7ac774e8af3c7

      SHA512

      073e3e3b2ad8afc44e78118ac4ca3d740e6356c67e1c47f6ebeedbfb2eba7c0e3b25e3c181b6d653bae7a2d4f6d102133e49e2a4741dc2d1b003bbb1c8f5b269

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.zip

      Filesize

      462KB

      MD5

      78982fd0e9e9e3ff394087ec2afd6bf1

      SHA1

      68907182a04ca992b4f5196ebd13c2953ea5db8e

      SHA256

      d9cfe7b4e917801362d232a468c21e0a11ec998d4ee80735d67cacd94005178c

      SHA512

      b439552acb89278c363224168b5a05dd172c6e0bd448433bdb89aa54b178cbebbcd8817115aeb5b6815cf161e5997a34869cfaca20c12f0df8daaef27944447b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe

      Filesize

      307KB

      MD5

      1242c41211464efab297bfa6c374223e

      SHA1

      42d15b2d2f4b436e8064cb56639269934f7e2c5c

      SHA256

      9cb018a17bdf9cd70f7c16f31bcb3eaa5183eb3c2a26d6c59d5c65d3438cac75

      SHA512

      7730e0c4fdeaaf81af454cefb5509fd2bd28f2c889c69ec23ec47338283e32ff681ae6362e08182e52eaf0e95de641f31c8f0ca0f22419f05da58cdbcca25a18

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\version.exe

      Filesize

      84KB

      MD5

      15ee95bc8e2e65416f2a30cf05ef9c2e

      SHA1

      107ca99d3414642450dec196febcd787ac8d7596

      SHA256

      c55b3aaf558c1cd8768f3d22b3fcc908a0e8c33e3f4e1f051d2b1b9315223d4d

      SHA512

      ed1cceb8894fb02cd585ec799e7c8564536976e50c04bf0c3e246a24a6eef719079455f1d6664fa09181979260db16903c60a0ef938472ca71ccaabe16ea1a98

    • memory/368-60-0x000000001AE40000-0x000000001AF42000-memory.dmp

      Filesize

      1.0MB

    • memory/368-67-0x000000001AE40000-0x000000001AF42000-memory.dmp

      Filesize

      1.0MB

    • memory/840-1-0x0000000000950000-0x0000000000A6A000-memory.dmp

      Filesize

      1.1MB

    • memory/840-0-0x00007FFD9E2E3000-0x00007FFD9E2E5000-memory.dmp

      Filesize

      8KB

    • memory/3000-87-0x000000001B670000-0x000000001B67C000-memory.dmp

      Filesize

      48KB

    • memory/3000-74-0x000000001C160000-0x000000001C62E000-memory.dmp

      Filesize

      4.8MB

    • memory/3000-83-0x000000001BB20000-0x000000001BBBC000-memory.dmp

      Filesize

      624KB

    • memory/3000-84-0x000000001B590000-0x000000001B598000-memory.dmp

      Filesize

      32KB

    • memory/3000-71-0x000000001B5A0000-0x000000001B646000-memory.dmp

      Filesize

      664KB

    • memory/4052-94-0x00000283213C0000-0x00000283213E2000-memory.dmp

      Filesize

      136KB

    • memory/4404-70-0x000000001BC00000-0x000000001BD02000-memory.dmp

      Filesize

      1.0MB

    • memory/4404-59-0x000000001BC00000-0x000000001BD02000-memory.dmp

      Filesize

      1.0MB

    • memory/4404-43-0x0000000000D80000-0x0000000000DD2000-memory.dmp

      Filesize

      328KB

    • memory/4704-44-0x00007FFD9E2E0000-0x00007FFD9EDA1000-memory.dmp

      Filesize

      10.8MB

    • memory/4704-22-0x00007FFD9E2E0000-0x00007FFD9EDA1000-memory.dmp

      Filesize

      10.8MB

    • memory/4704-18-0x00007FFD9E2E0000-0x00007FFD9EDA1000-memory.dmp

      Filesize

      10.8MB

    • memory/4704-16-0x0000000000EA0000-0x0000000000F16000-memory.dmp

      Filesize

      472KB