Analysis

  • max time kernel
    77s
  • max time network
    79s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2024, 20:23

General

  • Target

    REAPERSGRABBER/reapersgrabber.exe

  • Size

    6.6MB

  • MD5

    a8771e7e3c8e5487bfe7cc420e45805d

  • SHA1

    083dd0dafd61c78d3fc385d6d6d20274c4fbc52f

  • SHA256

    c877050dc8ce4a7abef92b2bfb49b5dc9da50edc0da31f27c7389d2aed2919e5

  • SHA512

    6029d31a8beb0a8f696adb91ca33c393e37ca5020abc6eb7819b8d2a129c32e1ed996c06f1bda0dfc1a0db697f176b8c8953302ff51800013d9cd72d68247d0d

  • SSDEEP

    196608:2P9X2sC/cRUfNyW6yLr217ohh0vQFPOoh:2hC0+N9qVxvQIo

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 12 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Drops file in Drivers directory 2 IoCs
  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 50 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of FindShellTrayWindow 52 IoCs
  • Suspicious use of SendNotifyMessage 51 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\REAPERSGRABBER\reapersgrabber.exe
    "C:\Users\Admin\AppData\Local\Temp\REAPERSGRABBER\reapersgrabber.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4032
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGYAawBuACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGcAdwBiACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAeAB3ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAYwBwACMAPgA="
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5068
    • C:\Users\Admin\AppData\Local\Temp\ReapersGrabber.exe
      "C:\Users\Admin\AppData\Local\Temp\ReapersGrabber.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      PID:3696
    • C:\Users\Admin\AppData\Local\Temp\setup.exe
      "C:\Users\Admin\AppData\Local\Temp\setup.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      PID:884
      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1044
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2808
        • C:\Windows\system32\wusa.exe
          wusa /uninstall /kb:890830 /quiet /norestart
          4⤵
            PID:1148
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop UsoSvc
          3⤵
          • Launches sc.exe
          PID:3304
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop WaaSMedicSvc
          3⤵
          • Launches sc.exe
          PID:760
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop wuauserv
          3⤵
          • Launches sc.exe
          PID:4820
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop bits
          3⤵
          • Launches sc.exe
          PID:3580
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop dosvc
          3⤵
          • Launches sc.exe
          PID:1652
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
          3⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:1456
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
          3⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:4116
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
          3⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:3740
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
          3⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:2824
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"
          3⤵
          • Launches sc.exe
          PID:4712
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"
          3⤵
          • Launches sc.exe
          PID:4104
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop eventlog
          3⤵
          • Launches sc.exe
          PID:2380
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"
          3⤵
          • Launches sc.exe
          PID:1540
    • C:\ProgramData\Google\Chrome\updater.exe
      C:\ProgramData\Google\Chrome\updater.exe
      1⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3132
      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:208
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4460
        • C:\Windows\system32\wusa.exe
          wusa /uninstall /kb:890830 /quiet /norestart
          3⤵
            PID:1752
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop UsoSvc
          2⤵
          • Launches sc.exe
          PID:1596
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop WaaSMedicSvc
          2⤵
          • Launches sc.exe
          PID:2316
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop wuauserv
          2⤵
          • Launches sc.exe
          PID:3084
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop bits
          2⤵
          • Launches sc.exe
          PID:5052
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop dosvc
          2⤵
          • Launches sc.exe
          PID:3724
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
          2⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:320
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
          2⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:2276
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
          2⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:3748
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
          2⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:2232
        • C:\Windows\system32\conhost.exe
          C:\Windows\system32\conhost.exe
          2⤵
            PID:1252
          • C:\Windows\explorer.exe
            explorer.exe
            2⤵
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5032
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:1900
          • C:\Windows\system32\taskmgr.exe
            "C:\Windows\system32\taskmgr.exe" /7
            1⤵
            • Checks SCSI registry key(s)
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:3372

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            18KB

            MD5

            c2383f3a2b8316322901dce161e16766

            SHA1

            81f393b0f30720e6cc7ab1f6a623597e72105c93

            SHA256

            30e701a0d1d2b2c716dac0691a7d81b074d3f57dbdbdb00e04ec43ce5f7ccf2e

            SHA512

            afcea56b3e758de6f9388e31c7d9b13d6310bd9a6518fa2e76862542c37ab18e3abc4e0002e92885cccd43ab55c3a8cd2faf159c1bcd0deb39a0c98d4bd9e134

          • C:\Users\Admin\AppData\Local\Temp\ReapersGrabber.exe

            Filesize

            1.5MB

            MD5

            0ac146eea5afbf197168614f257b783e

            SHA1

            afa3b961ab09e2685c32d558e3429c71bf43b195

            SHA256

            da8ab91f378cb595d8a809aba371442d943f211d7c1497adccd5824be669d91b

            SHA512

            9188b00e1170a3f0b2976b8787fb58927fb5b866af4628c105365b73869ec8197be7fae70fa9d2bd1a464ad95c278555476f1fd102a672b862fb4998505ee3e1

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3g1pp5kr.soy.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\setup.exe

            Filesize

            5.1MB

            MD5

            cc6be6cc21ca6263b2712d5f4f5c8cd5

            SHA1

            2f0fe6f8e6279b7bf44c22babf0dacc01a0c0d8e

            SHA256

            03ea65b939174a81675352dbe889f1f6835eb119741f698b05d56073faeeed36

            SHA512

            422b5d0fc740db845d6bbf465451a744e3a9d8878a0f86aedb65736c98610ecaebda5e93737e7c5b16c1f64aa765bacf1d104d61bfd042f1274d0d19ffb1a7d5

          • C:\Windows\system32\drivers\etc\hosts

            Filesize

            3KB

            MD5

            00930b40cba79465b7a38ed0449d1449

            SHA1

            4b25a89ee28b20ba162f23772ddaf017669092a5

            SHA256

            eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01

            SHA512

            cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62

          • memory/208-110-0x000001E9F77C0000-0x000001E9F7875000-memory.dmp

            Filesize

            724KB

          • memory/208-117-0x000001E9F7A20000-0x000001E9F7A2A000-memory.dmp

            Filesize

            40KB

          • memory/208-113-0x000001E9F7550000-0x000001E9F755A000-memory.dmp

            Filesize

            40KB

          • memory/208-114-0x000001E9F7A00000-0x000001E9F7A1A000-memory.dmp

            Filesize

            104KB

          • memory/208-115-0x000001E9F79C0000-0x000001E9F79C8000-memory.dmp

            Filesize

            32KB

          • memory/208-109-0x000001E9F77A0000-0x000001E9F77BC000-memory.dmp

            Filesize

            112KB

          • memory/208-116-0x000001E9F79D0000-0x000001E9F79D6000-memory.dmp

            Filesize

            24KB

          • memory/208-112-0x000001E9F79E0000-0x000001E9F79FC000-memory.dmp

            Filesize

            112KB

          • memory/208-111-0x000001E9F7540000-0x000001E9F754A000-memory.dmp

            Filesize

            40KB

          • memory/1044-78-0x0000016050050000-0x0000016050072000-memory.dmp

            Filesize

            136KB

          • memory/1252-125-0x0000000140000000-0x000000014000E000-memory.dmp

            Filesize

            56KB

          • memory/1252-124-0x0000000140000000-0x000000014000E000-memory.dmp

            Filesize

            56KB

          • memory/1252-123-0x0000000140000000-0x000000014000E000-memory.dmp

            Filesize

            56KB

          • memory/1252-122-0x0000000140000000-0x000000014000E000-memory.dmp

            Filesize

            56KB

          • memory/1252-126-0x0000000140000000-0x000000014000E000-memory.dmp

            Filesize

            56KB

          • memory/1252-129-0x0000000140000000-0x000000014000E000-memory.dmp

            Filesize

            56KB

          • memory/3372-157-0x000002E0E6CE0000-0x000002E0E6CE1000-memory.dmp

            Filesize

            4KB

          • memory/3372-155-0x000002E0E6CE0000-0x000002E0E6CE1000-memory.dmp

            Filesize

            4KB

          • memory/3372-153-0x000002E0E6CE0000-0x000002E0E6CE1000-memory.dmp

            Filesize

            4KB

          • memory/3372-148-0x000002E0E6CE0000-0x000002E0E6CE1000-memory.dmp

            Filesize

            4KB

          • memory/3372-154-0x000002E0E6CE0000-0x000002E0E6CE1000-memory.dmp

            Filesize

            4KB

          • memory/3372-147-0x000002E0E6CE0000-0x000002E0E6CE1000-memory.dmp

            Filesize

            4KB

          • memory/3372-149-0x000002E0E6CE0000-0x000002E0E6CE1000-memory.dmp

            Filesize

            4KB

          • memory/3372-159-0x000002E0E6CE0000-0x000002E0E6CE1000-memory.dmp

            Filesize

            4KB

          • memory/3372-158-0x000002E0E6CE0000-0x000002E0E6CE1000-memory.dmp

            Filesize

            4KB

          • memory/3372-156-0x000002E0E6CE0000-0x000002E0E6CE1000-memory.dmp

            Filesize

            4KB

          • memory/3696-28-0x00000000055E0000-0x0000000005672000-memory.dmp

            Filesize

            584KB

          • memory/3696-26-0x0000000005B90000-0x0000000006134000-memory.dmp

            Filesize

            5.6MB

          • memory/3696-24-0x0000000005490000-0x000000000552C000-memory.dmp

            Filesize

            624KB

          • memory/3696-38-0x00000000057D0000-0x0000000005826000-memory.dmp

            Filesize

            344KB

          • memory/3696-22-0x0000000000980000-0x0000000000B0C000-memory.dmp

            Filesize

            1.5MB

          • memory/3696-72-0x0000000073C50000-0x0000000074400000-memory.dmp

            Filesize

            7.7MB

          • memory/3696-73-0x0000000073C50000-0x0000000074400000-memory.dmp

            Filesize

            7.7MB

          • memory/3696-21-0x0000000073C50000-0x0000000074400000-memory.dmp

            Filesize

            7.7MB

          • memory/3696-43-0x0000000073C50000-0x0000000074400000-memory.dmp

            Filesize

            7.7MB

          • memory/3696-30-0x0000000005590000-0x000000000559A000-memory.dmp

            Filesize

            40KB

          • memory/5032-135-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/5032-146-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/5032-160-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/5032-145-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/5032-144-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/5032-143-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/5032-142-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/5032-137-0x0000000000B60000-0x0000000000B80000-memory.dmp

            Filesize

            128KB

          • memory/5032-131-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/5032-132-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/5032-139-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/5032-138-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/5032-141-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/5032-140-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/5032-130-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/5032-133-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/5032-134-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/5032-136-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/5068-67-0x0000000007D60000-0x0000000007D7A000-memory.dmp

            Filesize

            104KB

          • memory/5068-23-0x0000000073C50000-0x0000000074400000-memory.dmp

            Filesize

            7.7MB

          • memory/5068-59-0x0000000007700000-0x00000000077A3000-memory.dmp

            Filesize

            652KB

          • memory/5068-60-0x0000000008070000-0x00000000086EA000-memory.dmp

            Filesize

            6.5MB

          • memory/5068-47-0x00000000076B0000-0x00000000076E2000-memory.dmp

            Filesize

            200KB

          • memory/5068-61-0x0000000007A30000-0x0000000007A4A000-memory.dmp

            Filesize

            104KB

          • memory/5068-62-0x0000000007AA0000-0x0000000007AAA000-memory.dmp

            Filesize

            40KB

          • memory/5068-63-0x0000000007CC0000-0x0000000007D56000-memory.dmp

            Filesize

            600KB

          • memory/5068-46-0x00000000067A0000-0x00000000067EC000-memory.dmp

            Filesize

            304KB

          • memory/5068-64-0x0000000007C30000-0x0000000007C41000-memory.dmp

            Filesize

            68KB

          • memory/5068-65-0x0000000007C70000-0x0000000007C7E000-memory.dmp

            Filesize

            56KB

          • memory/5068-66-0x0000000007C80000-0x0000000007C94000-memory.dmp

            Filesize

            80KB

          • memory/5068-58-0x0000000007690000-0x00000000076AE000-memory.dmp

            Filesize

            120KB

          • memory/5068-45-0x0000000006710000-0x000000000672E000-memory.dmp

            Filesize

            120KB

          • memory/5068-48-0x0000000070860000-0x00000000708AC000-memory.dmp

            Filesize

            304KB

          • memory/5068-44-0x0000000006120000-0x0000000006474000-memory.dmp

            Filesize

            3.3MB

          • memory/5068-37-0x00000000060B0000-0x0000000006116000-memory.dmp

            Filesize

            408KB

          • memory/5068-36-0x0000000006040000-0x00000000060A6000-memory.dmp

            Filesize

            408KB

          • memory/5068-29-0x0000000005940000-0x0000000005962000-memory.dmp

            Filesize

            136KB

          • memory/5068-27-0x0000000073C50000-0x0000000074400000-memory.dmp

            Filesize

            7.7MB

          • memory/5068-25-0x0000000005A10000-0x0000000006038000-memory.dmp

            Filesize

            6.2MB

          • memory/5068-71-0x0000000073C50000-0x0000000074400000-memory.dmp

            Filesize

            7.7MB

          • memory/5068-20-0x0000000003120000-0x0000000003156000-memory.dmp

            Filesize

            216KB

          • memory/5068-19-0x0000000073C5E000-0x0000000073C5F000-memory.dmp

            Filesize

            4KB

          • memory/5068-68-0x0000000007CB0000-0x0000000007CB8000-memory.dmp

            Filesize

            32KB