Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    54s
  • max time network
    54s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/06/2024, 20:26

General

  • Target

    Acura_Beta.exe

  • Size

    13.3MB

  • MD5

    a389cc231fdee69ed8c2f92469ee45fb

  • SHA1

    d1dd458348ec425a3342ea9017ff40132afb841b

  • SHA256

    0b0f3b2cc17d98ad7b86f6b23ad42a567eda77fec27c6ce59f5c7b49870b4176

  • SHA512

    10b28d1467bf09070095efd27193efee990dc4a03689f4f53a4ecd35ae960aa1a80d4494c7df70064b37bc8168d2e95009f1efc8b595591eacd577295278a74a

  • SSDEEP

    393216:ZqewzZkBoJxJ64xqty07/LEwuqs16bfDalbRNmOtDDObj:ZqDUofJ64stF7/L856ylRNmOt3Q

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 28 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Acura_Beta.exe
    "C:\Users\Admin\AppData\Local\Temp\Acura_Beta.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\Injector-obf.exe
      "C:\Users\Admin\AppData\Local\Temp\Acura_Beta.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4732
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "ver"
        3⤵
          PID:3168
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "ipconfig /all"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2764
          • C:\Windows\system32\ipconfig.exe
            ipconfig /all
            4⤵
            • Gathers network information
            PID:4532
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1832

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_queue.pyd

      Filesize

      30KB

      MD5

      328e41b501a51b58644c7c6930b03234

      SHA1

      bc09f8b62fec750a48bafd9db3494d2f30f7bd54

      SHA256

      2782cf3c04801ede65011be282e99cd34d163b2b2b2333fd3147b33f7d5e72ab

      SHA512

      c6e6e6bca0e9c4e84f7c07541995a7ee4960da095329f69120ba631c3c3e07c0441cf2612d9dcc3d062c779aec7d4e6a00f71f57cc32e2a980a1e3574b67d248

    • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\aiohttp\_helpers.pyd

      Filesize

      54KB

      MD5

      949cbd1361c585174685b7ce1390dc99

      SHA1

      855bd73bfbf4ac5086c6529ad138787c3223816b

      SHA256

      6b4f64d50693d573721c033b85492ad227318c5e15199988f971a9ce32b0e6d7

      SHA512

      3bf66623b8a51ae1b62c93f85e9c0e677652eafbc105926d72ac1edf530f0209156d486f605d61789c8e93c9aa768f96ed98e32c4b2553b32f93b7881b958bed

    • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\win32console.pyd

      Filesize

      58KB

      MD5

      47be1dc9f556bf2d0fe2237e3194e4d8

      SHA1

      18642b8238d5423f9e8dd946bfcb2e990b726dd5

      SHA256

      4a408fe2595f46409a449e17f1f8eaf1f5d0dc3978a594fb4cbf3e90532abbfc

      SHA512

      e5ea98195bc42f2140f04dea8b59fbdff56f67162baf83f7ff9677361f85f2fd87fea81cba0255164d79777dfd6fff228cfc9418fa93cca1b954d559c6571c53

    • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\zstandard\backend_c.pyd

      Filesize

      513KB

      MD5

      336153eb39fad4a319d2f1dc4a612faf

      SHA1

      1866f64f668e01f667b0cf0995f43f771717a596

      SHA256

      20c82ac667e65745d91bb58fec99f8d6f3de57df31079f3980196114fc467d69

      SHA512

      64025cbb60e229d714b7e56b42ef36bf66466186bf8695815d58ae352f0a4a7eee8aa8eeb55f46e5ea81ea46bbd18564db779e95930c1cc76408482b57a8c697

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\Injector-obf.exe

      Filesize

      33.1MB

      MD5

      bd3af1326b619ce084be015c77975079

      SHA1

      d4eb7f17fdb4880bdc60b9450a81898312c74f3e

      SHA256

      60d6acecad71178db41efd084bd44a13fd5398daf1dfad01584160f280cad785

      SHA512

      8954e24d40197fd664fcf986364c964ece6c1e11bcfec68b9dba51fc7456cfc9778fba0bb4c84b3fd329d063b25b5e78a4ebe2087a213d5d754f52ea091e5726

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\VCRUNTIME140.dll

      Filesize

      95KB

      MD5

      f34eb034aa4a9735218686590cba2e8b

      SHA1

      2bc20acdcb201676b77a66fa7ec6b53fa2644713

      SHA256

      9d2b40f0395cc5d1b4d5ea17b84970c29971d448c37104676db577586d4ad1b1

      SHA512

      d27d5e65e8206bd7923cf2a3c4384fec0fc59e8bc29e25f8c03d039f3741c01d1a8c82979d7b88c10b209db31fbbec23909e976b3ee593dc33481f0050a445af

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\_asyncio.pyd

      Filesize

      65KB

      MD5

      a3f434f6cfd2f339876e7d345fe178fb

      SHA1

      ff71d1a2edc691491394517de2c32f2134925776

      SHA256

      102043b17c20043e4624f60e444131382363b69ff0e683c13fa17af156766483

      SHA512

      6f2d69627a7f01f295add9f1b333bfdba34eae56b04a574227c2ece315ab803683dc3d38b70b095736d2cbc68b3463dd16e54e9c66b757ecb28ad1297e617632

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\_bz2.pyd

      Filesize

      85KB

      MD5

      b024a6f227eafa8d43edfc1a560fe651

      SHA1

      92451be6a2a6bfc4a8de8ad3559ba4a25d409f2e

      SHA256

      c0dd9496b19ba9536a78a43a97704e7d4bef3c901d196ed385e771366682819d

      SHA512

      b9edb6d0f1472dd01969e6f160b41c1e7e935d4eebcaf08554195eb85d91c19ff1bfbc150773f197462e582c6d31f12bd0304f636eb4f189ed3ed976824b283e

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\_ctypes.pyd

      Filesize

      125KB

      MD5

      a1e9b3cc6b942251568e59fd3c342205

      SHA1

      3c5aaa6d011b04250f16986b3422f87a60326834

      SHA256

      a8703f949c9520b76cb1875d1176a23a2b3ef1d652d6dfac6e1de46dc08b2aa3

      SHA512

      2015b2ae1b17afc0f28c4af9cedf7d0b6219c4c257dd0c89328e5bd3eee35e2df63ef4fccb3ee38e7e65f01233d7b97fc363c0eae0cfa7754612c80564360d6f

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\_hashlib.pyd

      Filesize

      64KB

      MD5

      69dc506cf2fa3da9d0caba05fca6a35d

      SHA1

      33b24abb7b1d68d3b0315be7f8f49de50c9bdcb6

      SHA256

      c5b8c4582e201fef2d8cb2c8672d07b86dec31afb4a17b758dbfb2cff163b12f

      SHA512

      0009ec88134e25325a47b8b358da0fed8bb34fe80602e08a60686f6029b80f4287d33adb66ef41435d11d6edff86a88916f776eeaf2d1cb72035783f109ca1ff

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\_lzma.pyd

      Filesize

      160KB

      MD5

      77b78b43d58fe7ce9eb2fbb1420889fa

      SHA1

      de55ce88854e314697fa54703a2cd6cc970f3111

      SHA256

      6e571d93ce55d09583ec91c607883a43c1da3d4d36794d68c6ecd6bea4ab466a

      SHA512

      7b03b7d3f2fd9b51391de08e69ca9156a0232b56f210878a488b9d5a19492ab5880f45d9407331360fbe543a52c03d68f68da4387bf6a13b20ec903a7b081846

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\_overlapped.pyd

      Filesize

      46KB

      MD5

      fa44f2ac914b98bcec6dd102ec612f87

      SHA1

      4840ce511f46ff9523fa1874f70463491282697f

      SHA256

      ac33b6b3aacc31d2db8a502110881b4b711e2fb94983f85581e30953c9ac4721

      SHA512

      e6d691bc8622a616c7ebe98c362b7b9257c1840bee15161941a1e43a228e48985cb81ecdf41a8d4f60b6bf11a1dec16e81c12576d0ca00e6047e621f7dda3538

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\_socket.pyd

      Filesize

      79KB

      MD5

      cd56f508e7c305d4bfdeb820ecf3a323

      SHA1

      711c499bcf780611a815afa7374358bbfd22fcc9

      SHA256

      9e97b782b55400e5a914171817714bbbc713c0a396e30496c645fc82835e4b34

      SHA512

      e937c322c78e40947c70413404beba52d3425945b75255590dedf84ee429f685e0e5bc86ad468044925fbc59cf7ec8698a5472dd4f05b4363da30de04f9609a5

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\_ssl.pyd

      Filesize

      153KB

      MD5

      70014e88ecf3133b7be097536f77b459

      SHA1

      5d75675bb35ba6fae774937789491e051e62a252

      SHA256

      d318795c98c5f3c127c8e47220a92acba0736daf31bab0dc9c7e6c3513bb2aa3

      SHA512

      aa59b32c9164afca1b799e389c7087e95eeaa543790b6f590f9e30aa13b7fdb8cc83d0ef6351f0b578a4da636f4ca1e6dfe4558dcf3a813b744a80f7392aa462

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\_uuid.pyd

      Filesize

      24KB

      MD5

      d7074a9d35ed4ff90b93660ed4f1ba75

      SHA1

      418f4e62c61b30aece854551a5b629d23eaad010

      SHA256

      c4ce019fbd541918d3e7ddf7845bf0449068fc7eee3b57da730860fc7741d561

      SHA512

      6cf06012683aa4fbd85341e496434add21eaa6c72b8100a4ea2539702062860f97ab8b324064ad0689faa81762f4961d956047130d8a14a543ccf0c57a05173c

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\aiohttp\_http_parser.pyd

      Filesize

      256KB

      MD5

      e229b3acfea367783a493e3b9abc5f90

      SHA1

      9425a3c653d1ea5994569b2530d322bfb9176f1a

      SHA256

      e0334c4abc181ab13d4935cba2d0a731fffda042eff9317ef0e11163ec2bb266

      SHA512

      7614a688b66684c77d69d41eca0aadf4ddd3dd23be41b020a183f177cc6b0dfb14ea0a98dc27d369c33973ab1feb235cef4cda6e0bb5931d0d7abdf0420aebd2

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\aiohttp\_http_writer.pyd

      Filesize

      47KB

      MD5

      b9367d021a51117a01d20589617230d7

      SHA1

      11d6aefba3dd6c56954de369bd37e253394a2174

      SHA256

      6d3c35d4cf85f01d85c9a5d400174ee8863c5b5193f20307a9db7f03e5b5a497

      SHA512

      3e4f51a7493e2e44f53cd7f2952f1f424d48b85e7013956e2b1bc27cdea7aa5ecccbd207a065197a33f11994244464bae6fc2e0998c2d6b6439dbaf3e05a47f5

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\aiohttp\_websocket.pyd

      Filesize

      35KB

      MD5

      85cc9587e773b72dd53a8c4c2d83cc47

      SHA1

      0cfff13bf7e1eafb64bf10de84f7e90955aae635

      SHA256

      3acbafdeb39e0fa243ea207f0ad9d584f877f6afed4add6d71831cb734433456

      SHA512

      f65334560128cc0cdd31f93fb3fe5e8ad4dd9f3e49cbe8337aeb3d2f137863f1b489cdcfd5d5aff8e2d17033c17b1b48381bc57a1faa1f700ad070e88b7ece3d

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\frozenlist\_frozenlist.pyd

      Filesize

      84KB

      MD5

      74ce6c9fa79d68f28e71542b6748d852

      SHA1

      7cde0ebacfc077381bbcc89ab7c765061dac86a0

      SHA256

      2d9ca84489306acfb5fa47944279dbad1b1c7fea201d8dd0f2ea81381476eacb

      SHA512

      bc4c1509ac5cbcbdae23e2f9c03ad345ef3f7e53f78698c24f6a44b618878f955b7cd03105b779270e7a8ac587c948d159671fdfbd31d85a0a505677979a2423

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\libcrypto-1_1.dll

      Filesize

      3.3MB

      MD5

      ab01c808bed8164133e5279595437d3d

      SHA1

      0f512756a8db22576ec2e20cf0cafec7786fb12b

      SHA256

      9c0a0a11629cced6a064932e95a0158ee936739d75a56338702fed97cb0bad55

      SHA512

      4043cda02f6950abdc47413cfd8a0ba5c462f16bcd4f339f9f5a690823f4d0916478cab5cae81a3d5b03a8a196e17a716b06afee3f92dec3102e3bbc674774f2

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\libffi-7.dll

      Filesize

      32KB

      MD5

      eef7981412be8ea459064d3090f4b3aa

      SHA1

      c60da4830ce27afc234b3c3014c583f7f0a5a925

      SHA256

      f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

      SHA512

      dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\libssl-1_1.dll

      Filesize

      682KB

      MD5

      de72697933d7673279fb85fd48d1a4dd

      SHA1

      085fd4c6fb6d89ffcc9b2741947b74f0766fc383

      SHA256

      ed1c8769f5096afd000fc730a37b11177fcf90890345071ab7fbceac684d571f

      SHA512

      0fd4678c65da181d7c27b19056d5ab0e5dd0e9714e9606e524cdad9e46ec4d0b35fe22d594282309f718b30e065f6896674d3edce6b3b0c8eb637a3680715c2c

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\multidict\_multidict.pyd

      Filesize

      46KB

      MD5

      e6d83eb8c1c2b1a059fadc423b426f5e

      SHA1

      65756e478193b39acda38847702f05d4dbaded34

      SHA256

      dfe88ee3498bdadec52d3502dcd073106028efee76c0ab4559269aecfcf31211

      SHA512

      edb3191ada44f54a37a12f94558eea29d020ad09e75b038a050286d11f49a4b1fdb2f78575453c32e080f1f784709dc92dee7c544b78f9f55f67eb58bc07e029

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\psutil\_psutil_windows.pyd

      Filesize

      65KB

      MD5

      3cba71b6bc59c26518dc865241add80a

      SHA1

      7e9c609790b1de110328bbbcbb4cd09b7150e5bd

      SHA256

      e10b73d6e13a5ae2624630f3d8535c5091ef403db6a00a2798f30874938ee996

      SHA512

      3ef7e20e382d51d93c707be930e12781636433650d0a2c27e109ebebeba1f30ea3e7b09af985f87f67f6b9d2ac6a7a717435f94b9d1585a9eb093a83771b43f2

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\python3.dll

      Filesize

      59KB

      MD5

      4a776941c0aa723c50223cb1a19e6d02

      SHA1

      08e4cdf06f3b9ee5f9d5c865b49c808d20938583

      SHA256

      5a2f39ed041d35bb48e89c72c1ad16a5a24a3674f8eb34bfbc6310fd75128f16

      SHA512

      0319030bd2b51bf605c8ef4324eacf3a1f2e2315c92bc0cfc8e9eb7df72038f6c377b9537fec16470363499e6e0dbb7ca164169ae43601294310f84e53a06881

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\python39.dll

      Filesize

      4.3MB

      MD5

      2135da9f78a8ef80850fa582df2c7239

      SHA1

      aac6ad3054de6566851cae75215bdeda607821c4

      SHA256

      324963a39b8fd045ff634bb3271508dab5098b4d99e85e7648d0b47c32dc85c3

      SHA512

      423b03990d6aa9375ce10e6b62ffdb7e1e2f20a62d248aac822eb9d973ae2bf35deddd2550a4a0e17c51ad9f1e4f86443ca8f94050e0986daa345d30181a2369

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\pywintypes39.dll

      Filesize

      131KB

      MD5

      f20fd2e2ac9058a9fd227172f8ff2c12

      SHA1

      89eba891352be46581b94a17db7c2ede9a39ab01

      SHA256

      20bde8e50e42f7aabf59106eea238fcc0dece0c6e362c0a7feeb004ab981db8a

      SHA512

      42a86fa192aea7adb4283dc48a323a4f687dad40060ea3ffddcd8fd7670bb535d31a7764706e5c5473da28399fec048ae714a111ee238bb25e1aad03e12078d4

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\select.pyd

      Filesize

      29KB

      MD5

      35bb285678b249770dda3f8a15724593

      SHA1

      a91031d56097a4cbf800a6960e229e689ba63099

      SHA256

      71ed480da28968a7fd07934e222ae87d943677468936fd419803280d0cad07f3

      SHA512

      956759742b4b47609a57273b1ea7489ce39e29ebced702245a9665bb0479ba7d42c053e40c6dc446d5b0f95f8cc3f2267af56ccaaaf06e6875c94d4e3f3b6094

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\unicodedata.pyd

      Filesize

      1.1MB

      MD5

      3ba2a20dda6d1b4670767455bbe32870

      SHA1

      7c98221bc6ed763030087b1f33fb83eac2823ea4

      SHA256

      3a0987025f1cf2111dc6e4f59402073ba123d7436d809ee4198b4e7bfb8cb868

      SHA512

      0688f8af3359a8571bef2a89efabc2dbf26f3f5c6220932a4e7df2e33fac95cafee8b80796346ba698e6bf43630b8069f56538b95a8ff62ec21d629787ca5cd1

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\vcruntime140_1.dll

      Filesize

      36KB

      MD5

      135359d350f72ad4bf716b764d39e749

      SHA1

      2e59d9bbcce356f0fece56c9c4917a5cacec63d7

      SHA256

      34048abaa070ecc13b318cea31425f4ca3edd133d350318ac65259e6058c8b32

      SHA512

      cf23513d63ab2192c78cae98bd3fea67d933212b630be111fa7e03be3e92af38e247eb2d3804437fd0fda70fdc87916cd24cf1d3911e9f3bfb2cc4ab72b459ba

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\win32gui.pyd

      Filesize

      212KB

      MD5

      54ef413eb71819191995af2f6343d5dd

      SHA1

      991819d574752465b5463600d30f0014ca9fe0ba

      SHA256

      8fe4d4e5b7ecdc791f54f009e17c516d43bc6abd4cd3a3108a6a1f29768ac8fa

      SHA512

      49a534df98c7c9abb7c04bc1df900fe3f11602c069cc01bb051aae59847005ec79609c44eb5cb1715dd02f7c1b7f3cb2effe3afad41ad0b83c1499c73ad66c62

    • C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\yarl\_quoting_c.pyd

      Filesize

      94KB

      MD5

      d9271cb2648677d0972b555db8293adb

      SHA1

      a794bb805baed0a98fa466f2531921c57cb28eba

      SHA256

      fac45025a426c238cb38bf8d2b0eed90308df09d83020eeef0b82d72ba7cc48b

      SHA512

      a9422851b0171501acbae97923dac85b47ee6455e85905d836543a1dbd68bf36bcbf388dd28bbc34712f9b09ba03fcf71f20805e37a5aef54611ea87657a642d

    • memory/1832-185-0x000001BBA6E30000-0x000001BBA6E31000-memory.dmp

      Filesize

      4KB

    • memory/1832-173-0x000001BBA6E30000-0x000001BBA6E31000-memory.dmp

      Filesize

      4KB

    • memory/1832-174-0x000001BBA6E30000-0x000001BBA6E31000-memory.dmp

      Filesize

      4KB

    • memory/1832-175-0x000001BBA6E30000-0x000001BBA6E31000-memory.dmp

      Filesize

      4KB

    • memory/1832-184-0x000001BBA6E30000-0x000001BBA6E31000-memory.dmp

      Filesize

      4KB

    • memory/1832-183-0x000001BBA6E30000-0x000001BBA6E31000-memory.dmp

      Filesize

      4KB

    • memory/1832-182-0x000001BBA6E30000-0x000001BBA6E31000-memory.dmp

      Filesize

      4KB

    • memory/1832-181-0x000001BBA6E30000-0x000001BBA6E31000-memory.dmp

      Filesize

      4KB

    • memory/1832-180-0x000001BBA6E30000-0x000001BBA6E31000-memory.dmp

      Filesize

      4KB

    • memory/1832-179-0x000001BBA6E30000-0x000001BBA6E31000-memory.dmp

      Filesize

      4KB

    • memory/2904-172-0x00007FF732DC0000-0x00007FF733B19000-memory.dmp

      Filesize

      13.3MB

    • memory/4732-158-0x00007FF646000000-0x00007FF6481BB000-memory.dmp

      Filesize

      33.7MB