Resubmissions

01-06-2024 21:48

240601-1nsa5age89 10

01-06-2024 21:40

240601-1jd8psff6w 10

01-06-2024 21:33

240601-1elf8agc72 10

01-06-2024 21:10

240601-zz1wzafa7w 10

01-06-2024 20:55

240601-zqex5sef9z 10

Analysis

  • max time kernel
    301s
  • max time network
    262s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-fr
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-frlocale:fr-fros:windows10-2004-x64systemwindows
  • submitted
    01-06-2024 20:55

General

  • Target

    my-app-1.0.0.exe

  • Size

    169.1MB

  • MD5

    b43efe56dd3c84590056c8c87ad3e6f4

  • SHA1

    9e490bbec3f132b7eb8ac39dd4d001da8b275b58

  • SHA256

    d851af974512dc132e8931f8a5d9f443af614e7eb45c140fc8c8971dbb960d78

  • SHA512

    0800a75016ba6b81de945aed51cac599b21fc24fd416ed360599f585d95a20781b7fa11cd9d7225a30b544ae768f0a38da1f427a42d406e21024b1a742fcaf74

  • SSDEEP

    1572864:kKrstWwz6PqazPK3qyBcr35JBNLDD/FaCA7pmLMzCOtoAJnn/N0wIbyraIjR:8W0qr26byra

Score
10/10

Malware Config

Signatures

  • Epsilon Stealer

    Information stealer.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Detects videocard installed 1 TTPs 2 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe
    "C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic bios get smbiosbiosversion
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3716
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:748
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic path win32_VideoController get name
        3⤵
        • Detects videocard installed
        • Suspicious use of AdjustPrivilegeToken
        PID:1872
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"
      2⤵
        PID:1972
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3460
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "wmic CsProduct Get UUID"
        2⤵
          PID:3056
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic CsProduct Get UUID
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2156
        • C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe
          "C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\my-app-1.0.0" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1932,i,17646522489874601240,3285496771034963816,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=1924 /prefetch:2
          2⤵
            PID:4452
          • C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe
            "C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=fr --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\my-app-1.0.0" --field-trial-handle=2324,i,17646522489874601240,3285496771034963816,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2320 /prefetch:3
            2⤵
              PID:4416
            • C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe
              "C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\my-app-1.0.0" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --lang=fr --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --field-trial-handle=2572,i,17646522489874601240,3285496771034963816,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2568 /prefetch:1
              2⤵
              • Checks computer location settings
              PID:4424
            • C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe
              "C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=fr --service-sandbox-type=audio --user-data-dir="C:\Users\Admin\AppData\Roaming\my-app-1.0.0" --field-trial-handle=3444,i,17646522489874601240,3285496771034963816,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=3440 /prefetch:8
              2⤵
                PID:4184
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\screenshot.png" "
                2⤵
                  PID:1988
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /nologo /r:"Microsoft.VisualBasic.dll" /win32manifest:"app.manifest" /out:"screenCapture_1.3.2.exe" "C:\Users\Admin\AppData\Local\Temp\SCREEN~1\SCREEN~1.BAT"
                    3⤵
                      PID:3368
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8F9D.tmp" "c:\Users\Admin\AppData\Local\Temp\screenCapture\CSC2B980750F84E4E809521AB884F17238D.TMP"
                        4⤵
                          PID:4524
                      • C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe
                        screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\screenshot.png"
                        3⤵
                        • Executes dropped EXE
                        PID:852
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions""
                      2⤵
                        PID:4216
                        • C:\Windows\system32\reg.exe
                          C:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions"
                          3⤵
                            PID:4076
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKCU\Software\Valve\Steam" /v SteamPath"
                          2⤵
                            PID:4432
                            • C:\Windows\system32\reg.exe
                              C:\Windows\system32\reg.exe QUERY "HKCU\Software\Valve\Steam" /v SteamPath
                              3⤵
                                PID:1468
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /d /s /c "wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List"
                              2⤵
                                PID:1288
                                • C:\Windows\System32\Wbem\WMIC.exe
                                  wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List
                                  3⤵
                                    PID:4832
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                                  2⤵
                                    PID:1312
                                    • C:\Windows\System32\Wbem\WMIC.exe
                                      wmic path win32_VideoController get name
                                      3⤵
                                      • Detects videocard installed
                                      PID:4012
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /d /s /c "cmd /c chcp 65001>nul && netsh wlan show profiles"
                                    2⤵
                                      PID:2296
                                      • C:\Windows\system32\cmd.exe
                                        cmd /c chcp 65001
                                        3⤵
                                          PID:4168
                                          • C:\Windows\system32\chcp.com
                                            chcp 65001
                                            4⤵
                                              PID:3900
                                          • C:\Windows\system32\netsh.exe
                                            netsh wlan show profiles
                                            3⤵
                                              PID:3376
                                          • C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe
                                            "C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\my-app-1.0.0" --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1400,i,17646522489874601240,3285496771034963816,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=1044 /prefetch:8
                                            2⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:4532
                                        • C:\Windows\system32\AUDIODG.EXE
                                          C:\Windows\system32\AUDIODG.EXE 0x304 0x300
                                          1⤵
                                            PID:1532

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Temp\7c8febbd-e115-430d-bde5-188de67cd69e.tmp.node

                                            Filesize

                                            2.2MB

                                            MD5

                                            8b0ee0b40dc18dd5638c45dd2299ae65

                                            SHA1

                                            83a8b245a64332225d8762d18f661c88df0c4968

                                            SHA256

                                            808ab5e0ca0fb3818e65ed7e689b4b92fbeda82656c9cd714eeede27445c0b4c

                                            SHA512

                                            738d9f92b01df49713122cd5ba6b037b80f4364711c321c348f82bb6efbfa0787575c7594e573e2d26f7aba7dc46b938e8525c113d9dc59d2a5c17ba3d4358ef

                                          • C:\Users\Admin\AppData\Local\Temp\RES8F9D.tmp

                                            Filesize

                                            1KB

                                            MD5

                                            f085e5938969cdb734d83e1d637c7c5c

                                            SHA1

                                            34a8cb7a9c2f89e3a4f6a16450ce600d4bf05d3a

                                            SHA256

                                            71e3f6e449487ed7dc075c63fb187e01bec9154949167b175081f5107c8a87e2

                                            SHA512

                                            eee743bc58cfad0ba51ddb041390cfaa99da1cb3865918e2adfef6b88f9d0dbaf67c291f706538fbf545239fbcf2b8d20a317a8fa1253423258f2d000c504ac5

                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ikcsupyl.rtp.ps1

                                            Filesize

                                            60B

                                            MD5

                                            d17fe0a3f47be24a6453e9ef58c94641

                                            SHA1

                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                            SHA256

                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                            SHA512

                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                          • C:\Users\Admin\AppData\Local\Temp\a0604b1f-9e05-4fb1-90fe-368d790255ef.tmp.node

                                            Filesize

                                            1.6MB

                                            MD5

                                            1e5b6635e09e662d01e9a97c69f1cc27

                                            SHA1

                                            08e3a9e35940ee1ecd37ad762909529c64bc04b5

                                            SHA256

                                            b440ea84c0814e48b20433a8046087b997ab988eef9aacef896a4fd490150c6b

                                            SHA512

                                            1a7f835a51b62d5b512a2008830861bfb3892aa349379e3334c9c8aa5808ac5dd9dfcc5fb2c05736474ca5728347003a60e234e4044dc79d688ab35168b4bbc8

                                          • C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\AutoFill Data\All Autofill Data.txt

                                            Filesize

                                            1KB

                                            MD5

                                            698a35da81736fce6e1521788d24f28c

                                            SHA1

                                            9e5ea5f4de84582507b8081e3e8d51b2972333b3

                                            SHA256

                                            b2d8ddde8a147f931cf5ba65a4afd3ca582107aca8c163b5427b17af9b3a0886

                                            SHA512

                                            09d2bed13c87d3ffcb55a3417de69830d141900289059d601a7a32cbdedd740ad9d239b29e747485efbf70741c03bd9d72b9324b9f0b18c53d5ddb669569b91d

                                          • C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\Credit Cards\All Credit Cards.txt

                                            Filesize

                                            1KB

                                            MD5

                                            9ef0cbfa739a8cd4daa50041e13da0b6

                                            SHA1

                                            f8f96c8ddae556e86c65b14ec96976eb2b11db55

                                            SHA256

                                            168781455be4ffbca7bd2ae3c0b765a5953f52fdf0d8e56f7d817630ae27be21

                                            SHA512

                                            afc76f3026b64041e5d964d6445f627c69b9ad6c2db479f02d157d764e57176ec469ca85226ef3bb22871e00d6ee771f2a4fd2f674aed933f83b03d146bb6e73

                                          • C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\screenshot.png

                                            Filesize

                                            422KB

                                            MD5

                                            dfa0ba674a3655b69bdaaa89278bdcb2

                                            SHA1

                                            741d05c0167bc04aed3b82853fa8ddb1339a3f6e

                                            SHA256

                                            c4bd8c233f125b473df6a89a5e71eab023d477d27a50db0746894f885be97a0a

                                            SHA512

                                            6eaf90bbd01471a0f307cdaaba125b0dd730483150ff56fa89f1d73a2a24e268eb37a56cbc07d85a6b35f6b9a0cd81b6ff5b52a00886d63279e676f2794d5754

                                          • C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat

                                            Filesize

                                            13KB

                                            MD5

                                            da0f40d84d72ae3e9324ad9a040a2e58

                                            SHA1

                                            4ca7f6f90fb67dce8470b67010aa19aa0fd6253f

                                            SHA256

                                            818350a4fb4146072a25f0467c5c99571c854d58bec30330e7db343bceca008b

                                            SHA512

                                            30b7d4921f39c2601d94a3e3bb0e3be79b4b7b505e52523d2562f2e2f32154d555a593df87a71cddb61b98403265f42e0d6705950b37a155dc1d64113c719fd9

                                          • C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

                                            Filesize

                                            12KB

                                            MD5

                                            933782059c920fd1b2a4ed82c337746c

                                            SHA1

                                            eee7d6c9a7d425fbb36c1eb1a2cad4976a355307

                                            SHA256

                                            cb07b18d9143c0ad53c26b89ecfcf0a9f1571a26c8dbe6dd2f59c5f42cdd2824

                                            SHA512

                                            f62947a2a4ace155145b8d8b1a467cd4640a1de62b4f70d750b0ae50e20fc32ef9c85503f35f310e21d2049ecdb73c475f999a9b2ca268e5283ebf4ae9b9b708

                                          • C:\Users\Admin\AppData\Roaming\my-app-1.0.0\Network\Network Persistent State

                                            Filesize

                                            655B

                                            MD5

                                            bc8af5843d5663256834b8b6e21b2dfe

                                            SHA1

                                            5f32e57bb617efd498cf968389443184c98d5e57

                                            SHA256

                                            75c4c94cb477f67a4f7f8d0877f49fea496e3e4677b41c84c0f21cb897a7668a

                                            SHA512

                                            cf5d4f11bca90f96885831d2d05d10175be3fd7d1c11dcff8417ad6147c681e2c668583721ce14396a9885eb720215454daa5e5f468953ec6b4b871d213f8ff5

                                          • C:\Users\Admin\AppData\Roaming\my-app-1.0.0\Network\Network Persistent State~RFe589e1f.TMP

                                            Filesize

                                            59B

                                            MD5

                                            2800881c775077e1c4b6e06bf4676de4

                                            SHA1

                                            2873631068c8b3b9495638c865915be822442c8b

                                            SHA256

                                            226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                            SHA512

                                            e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                                          • \??\c:\Users\Admin\AppData\Local\Temp\screenCapture\CSC2B980750F84E4E809521AB884F17238D.TMP

                                            Filesize

                                            1KB

                                            MD5

                                            a6f2d21624678f54a2abed46e9f3ab17

                                            SHA1

                                            a2a6f07684c79719007d434cbd1cd2164565734a

                                            SHA256

                                            ab96911d094b6070cbfb48e07407371ddb41b86e36628b6a10cdb11478192344

                                            SHA512

                                            0b286df41c3887eecff5c38cbd6818078313b555ef001151b41ac11b80466b2f4f39da518ab9c51eeff35295cb39d52824de13e026c35270917d7274f764c676

                                          • \??\c:\Users\Admin\AppData\Local\Temp\screenCapture\app.manifest

                                            Filesize

                                            350B

                                            MD5

                                            8951565428aa6644f1505edb592ab38f

                                            SHA1

                                            9c4bee78e7338f4f8b2c8b6c0e187f43cfe88bf2

                                            SHA256

                                            8814db9e125d0c2b7489f8c7c3e95adf41f992d4397ed718bda8573cb8fb0e83

                                            SHA512

                                            7577bad37b67bf13a0d7f9b8b7d6c077ecdfb81a5bee94e06dc99e84cb20db2d568f74d1bb2cef906470b4f6859e00214beacca7d82e2b99126d27820bf3b8f5

                                          • memory/852-121-0x0000000000F30000-0x0000000000F3A000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/3460-61-0x00000262B4D80000-0x00000262B4E82000-memory.dmp

                                            Filesize

                                            1.0MB

                                          • memory/3460-57-0x00000262B4A80000-0x00000262B4AA2000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/3460-58-0x00000262B4A60000-0x00000262B4A70000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/3460-47-0x00000262B4AE0000-0x00000262B4B6A000-memory.dmp

                                            Filesize

                                            552KB

                                          • memory/4424-155-0x0000022B47830000-0x0000022B478DC000-memory.dmp

                                            Filesize

                                            688KB

                                          • memory/4424-21-0x00007FF851B80000-0x00007FF851B81000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4424-23-0x00007FF8512F0000-0x00007FF8512F1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4532-178-0x000001D119F20000-0x000001D119F21000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4532-179-0x000001D119F20000-0x000001D119F21000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4532-177-0x000001D119F20000-0x000001D119F21000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4532-183-0x000001D119F20000-0x000001D119F21000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4532-185-0x000001D119F20000-0x000001D119F21000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4532-189-0x000001D119F20000-0x000001D119F21000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4532-188-0x000001D119F20000-0x000001D119F21000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4532-187-0x000001D119F20000-0x000001D119F21000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4532-186-0x000001D119F20000-0x000001D119F21000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4532-184-0x000001D119F20000-0x000001D119F21000-memory.dmp

                                            Filesize

                                            4KB