Analysis

  • max time kernel
    1577s
  • max time network
    1178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/04/2024, 05:25

General

  • Target

    XClient.exe

  • Size

    41KB

  • MD5

    4a85a8fd8d30e43227a2eeafb180b649

  • SHA1

    89c5f32f587eaf749c6b8fc4eaaf890bc0ff6928

  • SHA256

    ef5cb311599cd04871fa56f516e56af8da03d605013367021d99e1af0db876f1

  • SHA512

    1a48b86c97ad617839169601cb149b7d823ebfe07b59537c46934a57cb74e067ee36f1365f8dd568364b8fd6c899eecb1023fcaeb4f38715a1e17dda9a8906a7

  • SSDEEP

    768:nNreDweeLOoHdSgDder3XvggggQLJF5PG9pmOH6vOwhp3Euzl:n4DweQldSgDIjXvvggCFI9A46vOwLNp

Malware Config

Extracted

Family

xworm

Version

5.0

C2

maximum-meet.gl.at.ply.gg:1675

Mutex

9LQBHUPAUEJEhUPH

Attributes
  • Install_directory

    %Temp%

  • install_file

    blacked.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 20 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\XClient.exe
    "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4144
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2500
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\blacked.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3668
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'blacked.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3904
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "blacked" /tr "C:\Users\Admin\AppData\Local\Temp\blacked.exe"
      2⤵
      • Creates scheduled task(s)
      PID:4708
    • C:\Users\Admin\AppData\Local\Temp\asrdgl.exe
      "C:\Users\Admin\AppData\Local\Temp\asrdgl.exe"
      2⤵
      • Executes dropped EXE
      PID:2664
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /delete /f /tn "blacked"
      2⤵
        PID:4792
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpC6D7.tmp.bat""
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2420
        • C:\Windows\system32\timeout.exe
          timeout 3
          3⤵
          • Delays execution with timeout.exe
          PID:5096
    • C:\Users\Admin\AppData\Local\Temp\blacked.exe
      C:\Users\Admin\AppData\Local\Temp\blacked.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:460
    • C:\Users\Admin\AppData\Local\Temp\blacked.exe
      C:\Users\Admin\AppData\Local\Temp\blacked.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1508
    • C:\Users\Admin\AppData\Local\Temp\blacked.exe
      C:\Users\Admin\AppData\Local\Temp\blacked.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3028
    • C:\Users\Admin\AppData\Local\Temp\blacked.exe
      C:\Users\Admin\AppData\Local\Temp\blacked.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1196
    • C:\Users\Admin\AppData\Local\Temp\blacked.exe
      C:\Users\Admin\AppData\Local\Temp\blacked.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:392
    • C:\Users\Admin\AppData\Local\Temp\blacked.exe
      C:\Users\Admin\AppData\Local\Temp\blacked.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:928
    • C:\Users\Admin\AppData\Local\Temp\blacked.exe
      C:\Users\Admin\AppData\Local\Temp\blacked.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:944
    • C:\Users\Admin\AppData\Local\Temp\blacked.exe
      C:\Users\Admin\AppData\Local\Temp\blacked.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3940
    • C:\Users\Admin\AppData\Local\Temp\blacked.exe
      C:\Users\Admin\AppData\Local\Temp\blacked.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3460
    • C:\Users\Admin\AppData\Local\Temp\blacked.exe
      C:\Users\Admin\AppData\Local\Temp\blacked.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4320
    • C:\Users\Admin\AppData\Local\Temp\blacked.exe
      C:\Users\Admin\AppData\Local\Temp\blacked.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2444
    • C:\Users\Admin\AppData\Local\Temp\blacked.exe
      C:\Users\Admin\AppData\Local\Temp\blacked.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1872
    • C:\Users\Admin\AppData\Local\Temp\blacked.exe
      C:\Users\Admin\AppData\Local\Temp\blacked.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2768
    • C:\Users\Admin\AppData\Local\Temp\blacked.exe
      C:\Users\Admin\AppData\Local\Temp\blacked.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3940
    • C:\Users\Admin\AppData\Local\Temp\blacked.exe
      C:\Users\Admin\AppData\Local\Temp\blacked.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3624
    • C:\Users\Admin\AppData\Local\Temp\blacked.exe
      C:\Users\Admin\AppData\Local\Temp\blacked.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2636
    • C:\Users\Admin\AppData\Local\Temp\blacked.exe
      C:\Users\Admin\AppData\Local\Temp\blacked.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4400
    • C:\Users\Admin\AppData\Local\Temp\blacked.exe
      C:\Users\Admin\AppData\Local\Temp\blacked.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:5104
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x30c 0x4f8
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3044
    • C:\Users\Admin\AppData\Local\Temp\blacked.exe
      C:\Users\Admin\AppData\Local\Temp\blacked.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2840

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\blacked.exe.log

      Filesize

      654B

      MD5

      2ff39f6c7249774be85fd60a8f9a245e

      SHA1

      684ff36b31aedc1e587c8496c02722c6698c1c4e

      SHA256

      e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

      SHA512

      1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      71fa55c67a762ba70e40011153e19b3c

      SHA1

      a36d2bb4802a8ec7db1a68de5f0c3d6007987492

      SHA256

      b8be6896ca89d3ebe9ee8a94e3407483f4750badaf7fa33526817cfc926dc291

      SHA512

      32760af7c05e20fec8cbddf56c2df544a69335f930f1d313cd1fdceaa90ed2afe81e54ac1b6770097d6f5ca5f30955f95970171a453579aa19239a17aaefe47f

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      e2da2d9f90026fdcbf934311a18284a2

      SHA1

      56de674db9fb5e29a62562191b498d976228dfd4

      SHA256

      199babd6ffc35f86a277f477aa21cc4242a5650779f79c64928eb469c857183e

      SHA512

      c7ed9f7540a927186f6192c71a18e41d43f87a6b7c578d0bbc63718a9f5ff3e4e597cf4ae18b2cb50ee5730d4360b45994a5931c648291f3250fd0ddfbb70bb3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      cae60f0ddddac635da71bba775a2c5b4

      SHA1

      386f1a036af61345a7d303d45f5230e2df817477

      SHA256

      b2dd636b7b0d3bfe44cef5e1175828b1fa7bd84d5563f54342944156ba996c16

      SHA512

      28ed8a8bc132ef56971cfd7b517b17cdb74a7f8c247ef6bff232996210075e06aa58a415825a1e038cfb547ad3dc6882bf1ca1b68c5b360ef0512a1440850253

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      e3161f4edbc9b963debe22e29658050b

      SHA1

      45dbf88dadafe5dd1cfee1e987c8a219d3208cdb

      SHA256

      1359d6daeaed2f254b162914203c891b23139cc236a3bf75c2dfcbe26265c84a

      SHA512

      006ffb8f37d1f77f8ee79b22ffa413819f565d62773c632b70985759572121c6ab4743139d16d885f8c0ff9d0e0b136686741728b3e142ee54aea3bb733dffb2

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kbwiyzmk.1ct.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\asrdgl.exe

      Filesize

      131KB

      MD5

      bd65d387482def1fe00b50406f731763

      SHA1

      d06a2ba2e29228f443f97d1dd3a8da5dd7df5903

      SHA256

      1ab7375550516d7445c47fd9b551ed864f227401a14ff3f1ff0d70caca3bd997

      SHA512

      351ecd109c4d49bc822e8ade73a9516c4a531ebcda63546c155e677dcff19708068dc588b2fcf30cad086238e8b206fc5f349d37dda02d3c3a8d9b570d92e4d9

    • C:\Users\Admin\AppData\Local\Temp\blacked.exe

      Filesize

      41KB

      MD5

      4a85a8fd8d30e43227a2eeafb180b649

      SHA1

      89c5f32f587eaf749c6b8fc4eaaf890bc0ff6928

      SHA256

      ef5cb311599cd04871fa56f516e56af8da03d605013367021d99e1af0db876f1

      SHA512

      1a48b86c97ad617839169601cb149b7d823ebfe07b59537c46934a57cb74e067ee36f1365f8dd568364b8fd6c899eecb1023fcaeb4f38715a1e17dda9a8906a7

    • C:\Users\Admin\AppData\Local\Temp\tmpC6D7.tmp.bat

      Filesize

      159B

      MD5

      882ef581afe28c9178491b6de200957d

      SHA1

      bb51b48dfb870def84ffa5b5bf789410e2b45ac2

      SHA256

      b10cf58e2cf60cc348bdab68e1acafa245f1e9b0a38e5312bd21548f4fa89e6b

      SHA512

      778dd9dbabe1a331515a2c86a74554e37c8ca58f91ebf329f463a2da8e22c6382cfe3c2efbb33a82fc4c231d24d74905e36f4b9646d2c39ebdc25be6ed0e3fd4

    • memory/392-88-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/392-89-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/460-75-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/460-73-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/928-91-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/928-92-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/944-94-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/944-95-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/1196-86-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/1196-85-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/1508-80-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/1508-79-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/1872-112-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/1872-111-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/1976-1-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/1976-147-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/1976-69-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/1976-70-0x000000001B040000-0x000000001B050000-memory.dmp

      Filesize

      64KB

    • memory/1976-96-0x0000000000B70000-0x0000000000B7C000-memory.dmp

      Filesize

      48KB

    • memory/1976-2-0x000000001B040000-0x000000001B050000-memory.dmp

      Filesize

      64KB

    • memory/1976-109-0x000000001B0D0000-0x000000001B0DA000-memory.dmp

      Filesize

      40KB

    • memory/1976-0-0x00000000003B0000-0x00000000003C0000-memory.dmp

      Filesize

      64KB

    • memory/2444-107-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/2444-108-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/2500-25-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/2500-31-0x00000241FFD40000-0x00000241FFD50000-memory.dmp

      Filesize

      64KB

    • memory/2500-29-0x00000241FFD40000-0x00000241FFD50000-memory.dmp

      Filesize

      64KB

    • memory/2500-34-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/2636-123-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/2636-124-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/2768-115-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/2768-114-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/2840-140-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/2840-141-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/3028-83-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/3028-82-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/3460-102-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/3460-101-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/3624-121-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/3624-120-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/3668-47-0x000002402CC30000-0x000002402CC40000-memory.dmp

      Filesize

      64KB

    • memory/3668-49-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/3668-45-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/3668-46-0x000002402CC30000-0x000002402CC40000-memory.dmp

      Filesize

      64KB

    • memory/3904-64-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/3904-55-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/3904-62-0x0000011B44F10000-0x0000011B44F20000-memory.dmp

      Filesize

      64KB

    • memory/3904-56-0x0000011B44F10000-0x0000011B44F20000-memory.dmp

      Filesize

      64KB

    • memory/3940-99-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/3940-98-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/3940-117-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/3940-118-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/4144-13-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/4144-18-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/4144-15-0x000001FDF96F0000-0x000001FDF9700000-memory.dmp

      Filesize

      64KB

    • memory/4144-14-0x000001FDF96F0000-0x000001FDF9700000-memory.dmp

      Filesize

      64KB

    • memory/4144-12-0x000001FDF91B0000-0x000001FDF91D2000-memory.dmp

      Filesize

      136KB

    • memory/4320-105-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/4320-104-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/4400-126-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/4400-127-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/5104-129-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB

    • memory/5104-130-0x00007FF8AEEA0000-0x00007FF8AF961000-memory.dmp

      Filesize

      10.8MB