Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 21:17

General

  • Target

    3d1b9631c5905683931200fd58d783dd.exe

  • Size

    512KB

  • MD5

    3d1b9631c5905683931200fd58d783dd

  • SHA1

    2e95612519872978c8675b7e8bf452f99c89b91d

  • SHA256

    7cec07093cce87a490295124a8bf53a101d6d4452ec5c4c82b273cff23db0518

  • SHA512

    f3123bc89ad9bd7d4329b954abacc8b357ececc1941cb821abef6515bd655aa84dd77e475f7e3bd46338798cac17292b9f8dab8e97bfc7b48562b1607e8cb1a8

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6T:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm56

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 21 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d1b9631c5905683931200fd58d783dd.exe
    "C:\Users\Admin\AppData\Local\Temp\3d1b9631c5905683931200fd58d783dd.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Windows\SysWOW64\wolfenussu.exe
      wolfenussu.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2244
      • C:\Windows\SysWOW64\ouhgkoms.exe
        C:\Windows\system32\ouhgkoms.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:864
    • C:\Windows\SysWOW64\yehkcgoyefpbyjm.exe
      yehkcgoyefpbyjm.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1500
    • C:\Windows\SysWOW64\agtwhhfuxslir.exe
      agtwhhfuxslir.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1808
    • C:\Windows\SysWOW64\ouhgkoms.exe
      ouhgkoms.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3308
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4616

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

          Filesize

          5KB

          MD5

          9c142d3544a7eacff868996e12663b68

          SHA1

          359b2672bc9a634fc0a91570b073e28fcefa8fdc

          SHA256

          ea3d42319f5bf1365fa0c1787fed60f36a6850b6afc3f52594348ba81abe4222

          SHA512

          e699c7cb4e9e6c2a380a41bf5ad161f1e10f2ec64f591e3a36f96c95a644afda1adb888c865e2175861b2646cb5fbcd174f251aa1d77fd88647110ecc3a9de5d

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

          Filesize

          5KB

          MD5

          fd24b047026ac27d05c3ddade37af7cb

          SHA1

          e8808f79ef67a39f4e685069c38fa5ccd903aafd

          SHA256

          9673b421de1b4a838b59c71bc9ff3ed5e4b633146b4640c46368ac302ff8d026

          SHA512

          2ba10ac7a144f2c330df1a5f480086fd657e8df767375550f4638ced1d767840a934161411c1acc690fee593ca0f30fa47087a2e2dafaf880f72f79c03161965

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

          Filesize

          7KB

          MD5

          2c2020fcfcbe09b029635ea43dcab5a6

          SHA1

          84fb73a474696163feee21840df76d954f01d3a8

          SHA256

          0c2ddca3cbbf4d51d48e6b0911141164f5a2be9e633c9338dd86c653d27ff10a

          SHA512

          9660917a0606cdf8fbb15db73f50f4976a6b1d435652912d82953324ac8a5826792d3451e9bf3a7b6f4df7c36ae20413bc5a8b9d901ed757662bdcdf4aa01dbe

        • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

          Filesize

          239B

          MD5

          12b138a5a40ffb88d1850866bf2959cd

          SHA1

          57001ba2de61329118440de3e9f8a81074cb28a2

          SHA256

          9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

          SHA512

          9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          5e8185e0900026a4e179e661c6add996

          SHA1

          266fd32c4f71739fb2d2b6dc2188abe3acba2a8d

          SHA256

          f2624e2fd6338996febd21bfdb356a877b3b0dd4c6ab5866930d31b063996414

          SHA512

          dd7ecc874bc0f5281eb2c309463a01995e071b470096ec9ea5f078d99d14ec5e512ec50017dff19abbf66674116863cc28a61c6c7a7c4a1143ac6abf5428d1ed

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          9ddb8dbdd1c105ae458866f46b246eb9

          SHA1

          51fc368828f997afb752683a324d28f99f34a112

          SHA256

          aeb48d07b43f4bc295ab30afd2f83997d09c193849d13c4d0061c2d21b90fe35

          SHA512

          e956a682f742910cad7edf00b1ee2d856028f0acacda29c46ab41249daa0a48b1031fa5af203e8281276666fea8737a73305055b21543dc42a5f634e9f2b2647

        • C:\Users\Admin\Desktop\SaveUndo.doc.exe

          Filesize

          25KB

          MD5

          cce8a3f14c044d713a42bc78168ebcf5

          SHA1

          6f0c43628da4ba84e81003f31ecdfa1a71284b7d

          SHA256

          c5e381d9d6d228a40858dd2d48afee4c2a3fe25461691ad22d807572d2fec676

          SHA512

          4c6e9af4f867266ed820d5812d686c642eb3a48daab5494ca267a4c9c2545492cf1dbbe9185cf70f8123980e71ab8b00a6798665696a2dedfce008ceeb11e94f

        • C:\Users\Admin\Desktop\TestRestore.doc.exe

          Filesize

          13KB

          MD5

          ea9452198e7e353f191c5bad65c10627

          SHA1

          5e639e49c52ba7c5641e7601f8660f1a1871fa0e

          SHA256

          0d38279462b8734299db91a9d8363e6e0031c1709d1e9f290ad276f91dd4e4dd

          SHA512

          939b20c86caaf9612990db308b84123baa17aa76101f259b7373701f5e7b4eac0195d3af173b0df30219d7701e67a84a66c31b03a95fb7dbd77ea59a64307e82

        • C:\Users\Admin\Music\ResumeUnprotect.doc.exe

          Filesize

          1KB

          MD5

          ec89629d437c17787acc7061c89e753c

          SHA1

          c65089b32eba1cf75d3546335718073460c971f9

          SHA256

          87b17909878537f2c3d3bc046f54b9eb382e312fa75d2b177457a978dcc7d83c

          SHA512

          65f02cc30b64e2c33d7287c135bc0bb20abe1e35c7176a03e47403db3e21da28f7e7ec7a13ef748aeb76ac06e5e159a9b4e62196692c3411459a4ae235a1bec9

        • C:\Windows\SysWOW64\agtwhhfuxslir.exe

          Filesize

          38KB

          MD5

          a2b85bc5a4396d67e0b04ef1209c904a

          SHA1

          1623632abf6190a0deefb0bd82639267102ecf2e

          SHA256

          60b61093f0c42e736589d65006f3f1fa950869be524fc51c2bb034057cb1954c

          SHA512

          461cbcd6b5219644f692591bdb0c52e970dfbed4297c942ccfd16142d56070e510be11829585690f9f619c718a4b084853af55f726e04db24f46d6047d67ba27

        • C:\Windows\SysWOW64\agtwhhfuxslir.exe

          Filesize

          24KB

          MD5

          ffdbc494e805e37ec3b0ba287b8403e5

          SHA1

          42614617f30db6b9115b22d411ca3a3f4e8c55be

          SHA256

          292de84cd64349c6dc5cc5f8b1878cfd5285ecd418db4b333eee204f86b01d66

          SHA512

          f3eff959cd2dd5ad84bd7996ee9a7d02b23672314e17a1d5305db03f462c469d8f40eeff91e85e014791d280dabacc314a512328631210f6094861b862d80e4e

        • C:\Windows\SysWOW64\ouhgkoms.exe

          Filesize

          100KB

          MD5

          2cabbf6d07b40a94f6702028dbcc3e8c

          SHA1

          a4a79452ba5b7f57d172f01adcd6cc07d2d2c5ce

          SHA256

          4ea6a4d2cc996d9532f7c68f61d7dcc526a09e8e3cc58bac29dcef3d60e1e581

          SHA512

          63c8b14531ab8bfd503aac49298b93eafbd476336c63cd030b9e6e500a2665338706131d6e11e228a8e9830a98fc6acf6628c1d91f08a8c72f448ec480ba0a34

        • C:\Windows\SysWOW64\ouhgkoms.exe

          Filesize

          80KB

          MD5

          97a739716938c47c8f30f178cc5fde13

          SHA1

          a767de18bd4e16f506e529881acee321b93da3a9

          SHA256

          8cf7d2cde69ec79475ecbe2a662f25b9255c3ffe10771a279eefbcd1bec26efe

          SHA512

          2178d0ebc8e729dc08b80cecb4cd7ad29ce02a3eedcf023bdc1d6a0b5b02d1dcff4c44a2a2fd37751673a8057d625208e8f1f28f1d171a0e59ed450b99d1eebb

        • C:\Windows\SysWOW64\ouhgkoms.exe

          Filesize

          111KB

          MD5

          aa43a28b22b05918e5ce66890a3fd721

          SHA1

          68ce3d671eea3125986d914d358fd379486aef1b

          SHA256

          bcd27954ee06e1172c1e5edc53e5de4cf40b02a916b68a7a5b4125bd351587bc

          SHA512

          1c6e20ed47dd6404460dfa937d6936b552ac6dd9d5d9a7aa59782475fe7e6f70e483f8178249cb4ff5e5bc908610deddf63d236c536b884bbd9e439e91e58db3

        • C:\Windows\SysWOW64\wolfenussu.exe

          Filesize

          32KB

          MD5

          3b7b3ae7203607f39392e29d2255b8ce

          SHA1

          2fd81184a7a13b5968e29a4fcc8c5c9e1fcbc078

          SHA256

          47d9a990e3e33a931eef17e0b3c492d257e5cab739ea62426e376f140350794d

          SHA512

          195462327d84e6b056858187f96e59ebaac4f242cb1325b90ef464ea49caea96bea67e21293850536672ca87e44d236661e1c75b5d94bf1ccb1049a34bbadd5d

        • C:\Windows\SysWOW64\wolfenussu.exe

          Filesize

          22KB

          MD5

          6709fbdd5f5345b881d1b5fbb6e5c1f4

          SHA1

          1d21d666dd7c42f5c4e4299fa6266d3e4cdd4eec

          SHA256

          9fbaa071a91cd6c917a0c0f3d56efae19a49dd7de88a503c0844c2dfb0e0dcf5

          SHA512

          46576aa99ff2fac4c2e2de0c40a36e9a10e8a789f2d2e9b661bf9f37bff5e3a381729056cd281e33644b7c791e75abb0414cead39140c3d047e55ab7adf012a7

        • C:\Windows\SysWOW64\yehkcgoyefpbyjm.exe

          Filesize

          71KB

          MD5

          a3a5011df8771a9baa800b488c27cb98

          SHA1

          3a2394560307a9bbc3aaf9bd19e076b8249921b6

          SHA256

          2d77311ae0a1675d117b93f2f39ca7f907b342852b4707fdf9e8de7210ce1100

          SHA512

          4304f45c060fa5581145f7d45216db2504d06bb7dfec667f5199a1d862d1f867933e25e09ed22fe76060a7087fd5bb3ca3fc50b62fcbe3af1033b5d76be236f1

        • C:\Windows\SysWOW64\yehkcgoyefpbyjm.exe

          Filesize

          112KB

          MD5

          5952f67d82c43a28d6567723c6685f42

          SHA1

          55e10bdb1d074113ec6029ef0b7345b0d7a5e748

          SHA256

          ee40660002f8b19c08fde755b9b665bc9c6bf30ecbb04740bbce5cb283536408

          SHA512

          316d7852077284ec76b864b803a41a8c0d5553039a877e977d48c3d8b8d6bb29083cf903fccf91200277c761dec75fa1492b165be8365544f6d6063361ffbb34

        • C:\Windows\SysWOW64\yehkcgoyefpbyjm.exe

          Filesize

          81KB

          MD5

          6999a2fda0cc0dfa783637a000f79a7d

          SHA1

          d6c07462af6bf01d6912ad17cc97fc1ab6eb6ebb

          SHA256

          ce9638efe63693d80ee40161108b8d7d585fd68de4ffdddc5185abd8d939cbe4

          SHA512

          4fd6daad3cae64042d9bc0d416e5e50575a61092f8512dedf250c8a2bdb43580a88e3a5cc0f071b71a0a714f7d010db3a7047bb8f984f245efea0f5556586e14

        • C:\Windows\mydoc.rtf

          Filesize

          223B

          MD5

          06604e5941c126e2e7be02c5cd9f62ec

          SHA1

          4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

          SHA256

          85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

          SHA512

          803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          90KB

          MD5

          1d87ba40feacc74d269f11fe0557a274

          SHA1

          a4ba269fa435ce0a4cb66b3345242a66aaaae97b

          SHA256

          67ac182c9a95fa80024351df39921d2ad03dbda9d9b400daa25b8cbe99610b1e

          SHA512

          000068d944bf33d87a854f20b04495def65ff31a9c1ad45262666dacc0159f204236fd891115d406d83fe6b1914cf70bd24502cb2633fbf1c052aea89f1677bc

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          188KB

          MD5

          55224960b7d98730ace87bf264d99b27

          SHA1

          9aedfafd47df8bc7a52b0e204951841296221df1

          SHA256

          161ffdfab2ba1d088c7be68661348b4dabde3e96696bfad9e7f548bd2bf1986f

          SHA512

          69edab17b4c20b1d993fe6469b1e17a6143f6bf6780b191659079bafc8319e39ad8c77cb932cb21654dec7ed0b6e2dca8045e6591a6431176e1fddca6148ef4d

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          110KB

          MD5

          86a3cce83674178e6b9b2fd55ca5cfc8

          SHA1

          d0b8cb37ba2687b1c2b82c439bbd83a711f642e1

          SHA256

          327272c07a13c744a46077b2e23b4b86516c2485f4d37264c0760a25fc1ade2b

          SHA512

          59a7699c9366a3d12857cf2d3bd007905a00f7708203b26ff0f092becff21e6ce87acaf633de2e46eb68ffb6ee6796fbb9c09a56a0328f7fcc84f81267016262

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          118KB

          MD5

          35bc43784022a1bd182cec562c8944fb

          SHA1

          da69dd6f5dbcd6512ccb9c917fd6414496e5621a

          SHA256

          eb0ee88788037c9d3a8916f2013bc73c274050d25ed0232151f9b6afcc2b2a2c

          SHA512

          e421cfe0900b8f10340a816b6c2b82693fb2f7ffca40513c72dfc708d725cf42416009e2289d6914a7292f190ca2aeb798bdb880dc39da267583507e08dbd03d

        • memory/2916-0-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB

        • memory/4616-41-0x00007FFBEC2F0000-0x00007FFBEC4E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4616-53-0x00007FFBEC2F0000-0x00007FFBEC4E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4616-54-0x00007FFBEC2F0000-0x00007FFBEC4E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4616-49-0x00007FFBEC2F0000-0x00007FFBEC4E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4616-48-0x00007FFBA9B50000-0x00007FFBA9B60000-memory.dmp

          Filesize

          64KB

        • memory/4616-42-0x00007FFBEC2F0000-0x00007FFBEC4E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4616-55-0x00007FFBA9B50000-0x00007FFBA9B60000-memory.dmp

          Filesize

          64KB

        • memory/4616-40-0x00007FFBAC370000-0x00007FFBAC380000-memory.dmp

          Filesize

          64KB

        • memory/4616-38-0x00007FFBAC370000-0x00007FFBAC380000-memory.dmp

          Filesize

          64KB

        • memory/4616-36-0x00007FFBAC370000-0x00007FFBAC380000-memory.dmp

          Filesize

          64KB

        • memory/4616-35-0x00007FFBAC370000-0x00007FFBAC380000-memory.dmp

          Filesize

          64KB

        • memory/4616-58-0x00007FFBEC2F0000-0x00007FFBEC4E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4616-59-0x00007FFBEC2F0000-0x00007FFBEC4E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4616-57-0x00007FFBEC2F0000-0x00007FFBEC4E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4616-56-0x00007FFBEC2F0000-0x00007FFBEC4E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4616-51-0x00007FFBEC2F0000-0x00007FFBEC4E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4616-52-0x00007FFBEC2F0000-0x00007FFBEC4E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4616-50-0x00007FFBEC2F0000-0x00007FFBEC4E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4616-46-0x00007FFBEC2F0000-0x00007FFBEC4E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4616-47-0x00007FFBEC2F0000-0x00007FFBEC4E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4616-44-0x00007FFBEC2F0000-0x00007FFBEC4E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4616-39-0x00007FFBEC2F0000-0x00007FFBEC4E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4616-37-0x00007FFBAC370000-0x00007FFBAC380000-memory.dmp

          Filesize

          64KB

        • memory/4616-118-0x00007FFBEC2F0000-0x00007FFBEC4E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4616-143-0x00007FFBAC370000-0x00007FFBAC380000-memory.dmp

          Filesize

          64KB

        • memory/4616-145-0x00007FFBEC2F0000-0x00007FFBEC4E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4616-144-0x00007FFBEC2F0000-0x00007FFBEC4E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4616-142-0x00007FFBAC370000-0x00007FFBAC380000-memory.dmp

          Filesize

          64KB

        • memory/4616-141-0x00007FFBAC370000-0x00007FFBAC380000-memory.dmp

          Filesize

          64KB

        • memory/4616-140-0x00007FFBAC370000-0x00007FFBAC380000-memory.dmp

          Filesize

          64KB