Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 11:14

General

  • Target

    19fba48af940ee0df42d649be0b83956.exe

  • Size

    29KB

  • MD5

    19fba48af940ee0df42d649be0b83956

  • SHA1

    cb5d068906ac8a9aa0441653e117fda8c5638002

  • SHA256

    d2ade013842751895e152fb60cde6524dd7249919689ef6d028f9a00b69cdbe6

  • SHA512

    574acf0fc89f19c17c778b9b36db817b8ffcc0b58b4a3a93037305736e45925c3581af04b4632e5f41f121a7f5a83f6ffdb528500b6016563fed17b131c7aaa3

  • SSDEEP

    768:T4JROoFgDEUEWZdjLYbIvUWAJaTIQLRGqpeoRMb/+4azuY:EVFsEde6svkw7cq8oRMb/PazuY

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\19fba48af940ee0df42d649be0b83956.exe
    "C:\Users\Admin\AppData\Local\Temp\19fba48af940ee0df42d649be0b83956.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1580
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:316
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1600
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1000
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3020
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Users\Admin\AppData\Local\Temp\19fba48af940ee0df42d649be0b83956.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2644
  • C:\Users\Admin\AppData\Local\Temp\svchost32.exe
    C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Users\Admin\AppData\Local\Temp\19fba48af940ee0df42d649be0b83956.exe"
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3876
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"' & exit
      2⤵
        PID:4584
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"'
          3⤵
          • Creates scheduled task(s)
          PID:2296
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost32.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2304
      • C:\Windows\system32\services32.exe
        "C:\Windows\system32\services32.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4032
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Windows\system32\services32.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2356
    • C:\Windows\system32\choice.exe
      choice /C Y /N /D Y /T 3
      1⤵
        PID:760
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'
        1⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4332
      • C:\Windows\system32\cmd.exe
        "cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:4676
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3352
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3664
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:744
      • C:\Users\Admin\AppData\Local\Temp\svchost32.exe
        C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Windows\system32\services32.exe"
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1580
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"' & exit
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1280
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"'
            3⤵
            • Creates scheduled task(s)
            PID:2112
        • C:\Windows\system32\Microsoft\Telemetry\sihost32.exe
          "C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4584
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost32.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:868
          • C:\Windows\system32\choice.exe
            choice /C Y /N /D Y /T 3
            3⤵
              PID:1556

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                Filesize

                2KB

                MD5

                d85ba6ff808d9e5444a4b369f5bc2730

                SHA1

                31aa9d96590fff6981b315e0b391b575e4c0804a

                SHA256

                84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                SHA512

                8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost32.exe.log

                Filesize

                539B

                MD5

                b245679121623b152bea5562c173ba11

                SHA1

                47cb7fc4cf67e29a87016a7308cdb8b1b4dc8e3d

                SHA256

                73d84fd03e38f1bbf8b2218f8a454f0879051855252fc76b63f20f46e7fd877f

                SHA512

                75e46843b1eafcc7dc4362630838895b7f399e57662a12bf0305a912c8e726b02e0a760b1b97a2c262b2d05fdb944b9ed81c338ad93e5eb5cb57bc651602e42c

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                944B

                MD5

                98baf5117c4fcec1692067d200c58ab3

                SHA1

                5b33a57b72141e7508b615e17fb621612cb8e390

                SHA256

                30bf8496e9a08f4fdfe4767abcd565f92b6da06ca1c7823a70cb7cab16262e51

                SHA512

                344a70bfc037d54176f12db91f05bf4295bb587a5062fd1febe6f52853571170bd8ef6042cb87b893185bbae1937cf77b679d7970f8cc1c2666b0b7c1b32987d

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                944B

                MD5

                d306e30c2787820c6dd1a90858f4d23d

                SHA1

                ef222569f6119441cd6e27ecaae130a55972d7f8

                SHA256

                00e3d5066ac6ca75fc3d69708f156fa6389840035d5cb74c37b72a0b30434483

                SHA512

                a4a3c1cdb31422e4402fcef2fa32097eb03f37f7419b3737f56a4f06324571c26aff198e5e42662797b4d41913cdccc171c069fbeb1039e3192d576daf39be09

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                944B

                MD5

                15dde0683cd1ca19785d7262f554ba93

                SHA1

                d039c577e438546d10ac64837b05da480d06bf69

                SHA256

                d6fa39eab7ee36f44dc3f9f2839d098433db95c1eba924e4bcf4e5c0d268d961

                SHA512

                57c0e1b87bc1c136f0d39f3ce64bb8f8274a0491e4ca6e45e5c7f9070aa9d9370c6f590ce37cd600b252df2638d870205249a514c43245ca7ed49017024a4672

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                944B

                MD5

                77d622bb1a5b250869a3238b9bc1402b

                SHA1

                d47f4003c2554b9dfc4c16f22460b331886b191b

                SHA256

                f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

                SHA512

                d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                944B

                MD5

                cae60f0ddddac635da71bba775a2c5b4

                SHA1

                386f1a036af61345a7d303d45f5230e2df817477

                SHA256

                b2dd636b7b0d3bfe44cef5e1175828b1fa7bd84d5563f54342944156ba996c16

                SHA512

                28ed8a8bc132ef56971cfd7b517b17cdb74a7f8c247ef6bff232996210075e06aa58a415825a1e038cfb547ad3dc6882bf1ca1b68c5b360ef0512a1440850253

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                944B

                MD5

                c1b0a9f26c3e1786191e94e419f1fbf9

                SHA1

                7f3492f4ec2d93e164f43fe2606b53edcffd8926

                SHA256

                796649641966f606d7217bb94c5c0a6194eef518815dacc86feacdd78d3c1113

                SHA512

                fa0290d77372c26a2f14cb9b0002c222bc757ce7ad02516b884c59a1108f42eb4c76884f9edb6c7149f7c3fac917eda99b72a3b1d72b7e118a1d5a73cadd15a8

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ecbzcxgy.opc.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Admin\AppData\Local\Temp\svchost32.exe

                Filesize

                22KB

                MD5

                d6f691125b0d43be191e1fb811ef8ab5

                SHA1

                5489df0c20ac24580ff909d9c3f2490aa7300126

                SHA256

                c01911ec5ff1fa41ce959f9adf95a1574509cea78f0186947d7f53c2233c2657

                SHA512

                5cba9d6ad32463e123b3586117c0b59259d6438c75e593ecc70bfaf15b8f080cfcd160858cc5ba611a2e40e5a58c41c0eec496512ed5f393281c1f3f58d830a9

              • C:\Windows\System32\services32.exe

                Filesize

                29KB

                MD5

                19fba48af940ee0df42d649be0b83956

                SHA1

                cb5d068906ac8a9aa0441653e117fda8c5638002

                SHA256

                d2ade013842751895e152fb60cde6524dd7249919689ef6d028f9a00b69cdbe6

                SHA512

                574acf0fc89f19c17c778b9b36db817b8ffcc0b58b4a3a93037305736e45925c3581af04b4632e5f41f121a7f5a83f6ffdb528500b6016563fed17b131c7aaa3

              • C:\Windows\system32\Microsoft\Telemetry\sihost32.exe

                Filesize

                8KB

                MD5

                4577ec1058da9843c638be104bc98503

                SHA1

                bee3f20548834595adbaa5ce03fa0ebc5fd3d424

                SHA256

                804791f5dedce14edca593ed7bf6c1805a606056f55e03415ef97eb16fc5e1ea

                SHA512

                07cf025bcc73b554cec570e0129c4779c560a3daff6ee0808d4d3dc6e08a87d3cd00fa2fdc0e0864da443ad8beaecd19a7dbb5bbc63449729c707b5e98f4a004

              • memory/316-12-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/316-19-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/316-13-0x000001DE1D4B0000-0x000001DE1D4C0000-memory.dmp

                Filesize

                64KB

              • memory/316-14-0x000001DE1D4B0000-0x000001DE1D4C0000-memory.dmp

                Filesize

                64KB

              • memory/316-16-0x000001DE1D4B0000-0x000001DE1D4C0000-memory.dmp

                Filesize

                64KB

              • memory/316-9-0x000001DE051F0000-0x000001DE05212000-memory.dmp

                Filesize

                136KB

              • memory/744-157-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/744-144-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/744-145-0x000002B238350000-0x000002B238360000-memory.dmp

                Filesize

                64KB

              • memory/744-155-0x000002B238350000-0x000002B238360000-memory.dmp

                Filesize

                64KB

              • memory/900-66-0x0000000001AE0000-0x0000000001AF0000-memory.dmp

                Filesize

                64KB

              • memory/900-74-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/900-0-0x0000000000D00000-0x0000000000D0C000-memory.dmp

                Filesize

                48KB

              • memory/900-1-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/900-15-0x0000000001AE0000-0x0000000001AF0000-memory.dmp

                Filesize

                64KB

              • memory/1000-52-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/1000-46-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/1000-50-0x00000226F3FD0000-0x00000226F3FE0000-memory.dmp

                Filesize

                64KB

              • memory/1000-47-0x00000226F3FD0000-0x00000226F3FE0000-memory.dmp

                Filesize

                64KB

              • memory/1000-49-0x00000226F3FD0000-0x00000226F3FE0000-memory.dmp

                Filesize

                64KB

              • memory/1580-166-0x0000000002F90000-0x0000000002FA0000-memory.dmp

                Filesize

                64KB

              • memory/1580-183-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/1580-184-0x0000000002F90000-0x0000000002FA0000-memory.dmp

                Filesize

                64KB

              • memory/1580-188-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/1580-165-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/1600-34-0x0000026462F00000-0x0000026462F10000-memory.dmp

                Filesize

                64KB

              • memory/1600-36-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/1600-33-0x0000026462F00000-0x0000026462F10000-memory.dmp

                Filesize

                64KB

              • memory/1600-31-0x0000026462F00000-0x0000026462F10000-memory.dmp

                Filesize

                64KB

              • memory/1600-30-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/3020-62-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/3020-68-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/3020-64-0x0000019336A80000-0x0000019336A90000-memory.dmp

                Filesize

                64KB

              • memory/3020-63-0x0000019336A80000-0x0000019336A90000-memory.dmp

                Filesize

                64KB

              • memory/3352-120-0x000002D5F4DF0000-0x000002D5F4E00000-memory.dmp

                Filesize

                64KB

              • memory/3352-121-0x000002D5F4DF0000-0x000002D5F4E00000-memory.dmp

                Filesize

                64KB

              • memory/3352-123-0x000002D5F4DF0000-0x000002D5F4E00000-memory.dmp

                Filesize

                64KB

              • memory/3352-119-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/3352-126-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/3664-140-0x000002ECC6670000-0x000002ECC6680000-memory.dmp

                Filesize

                64KB

              • memory/3664-139-0x000002ECC6670000-0x000002ECC6680000-memory.dmp

                Filesize

                64KB

              • memory/3664-136-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/3664-142-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/3876-76-0x0000000000AE0000-0x0000000000AF2000-memory.dmp

                Filesize

                72KB

              • memory/3876-77-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/3876-78-0x0000000000B40000-0x0000000000B50000-memory.dmp

                Filesize

                64KB

              • memory/3876-75-0x0000000000110000-0x000000000011A000-memory.dmp

                Filesize

                40KB

              • memory/3876-92-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/4032-160-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/4032-91-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/4032-124-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/4032-138-0x000000001C5B0000-0x000000001C5C0000-memory.dmp

                Filesize

                64KB

              • memory/4032-93-0x000000001C5B0000-0x000000001C5C0000-memory.dmp

                Filesize

                64KB

              • memory/4332-109-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/4332-107-0x000001862E820000-0x000001862E830000-memory.dmp

                Filesize

                64KB

              • memory/4332-95-0x000001862E820000-0x000001862E830000-memory.dmp

                Filesize

                64KB

              • memory/4332-96-0x000001862E820000-0x000001862E830000-memory.dmp

                Filesize

                64KB

              • memory/4332-94-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/4584-180-0x0000000000F80000-0x0000000000F86000-memory.dmp

                Filesize

                24KB

              • memory/4584-182-0x000000001CB20000-0x000000001CB30000-memory.dmp

                Filesize

                64KB

              • memory/4584-181-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/4584-185-0x00007FFF06490000-0x00007FFF06F51000-memory.dmp

                Filesize

                10.8MB

              • memory/4584-186-0x000000001CB20000-0x000000001CB30000-memory.dmp

                Filesize

                64KB