Analysis

  • max time kernel
    72s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-11-2024 10:34

General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    33a6d4422ab7fca37fda9fba8dbb17ed

  • SHA1

    a1d5dc523efc2f4628e108d74b1dc20e94538b4b

  • SHA256

    9ddcf3eed4a29ef0050c9b77bd628e28cfc3588ec945ded0bf8b88459397521a

  • SHA512

    925066affa561283f4be08b5be479d4b7bc847000a0c31945bc00e961bec252532ae61fea2e2536c90aa9a45e2fd0967a6a5b4e5a75e0b67de461fd9f6f706ba

  • SSDEEP

    384:O+OIiu/jtD+P3V+y0bFwRktv7ms2cPPrAF+rMRTyN/0L+EcoinblneHQM3epzXos:nXmV10bFwRktalc3rM+rMRa8NuaEt

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 50 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Server.exe
    "C:\Users\Admin\AppData\Local\Temp\Server.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2380
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Server.exe" "Server.exe" ENABLE
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:2032
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6ff9758,0x7fef6ff9768,0x7fef6ff9778
      2⤵
        PID:2432
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1168 --field-trial-handle=1380,i,963829136026105601,16448652979941935669,131072 /prefetch:2
        2⤵
          PID:2896
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1480 --field-trial-handle=1380,i,963829136026105601,16448652979941935669,131072 /prefetch:8
          2⤵
            PID:2892
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1644 --field-trial-handle=1380,i,963829136026105601,16448652979941935669,131072 /prefetch:8
            2⤵
              PID:2884
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2296 --field-trial-handle=1380,i,963829136026105601,16448652979941935669,131072 /prefetch:1
              2⤵
                PID:3068
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2300 --field-trial-handle=1380,i,963829136026105601,16448652979941935669,131072 /prefetch:1
                2⤵
                  PID:460
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1456 --field-trial-handle=1380,i,963829136026105601,16448652979941935669,131072 /prefetch:2
                  2⤵
                    PID:2960
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2996 --field-trial-handle=1380,i,963829136026105601,16448652979941935669,131072 /prefetch:1
                    2⤵
                      PID:1268
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3504 --field-trial-handle=1380,i,963829136026105601,16448652979941935669,131072 /prefetch:8
                      2⤵
                        PID:2084
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3616 --field-trial-handle=1380,i,963829136026105601,16448652979941935669,131072 /prefetch:8
                        2⤵
                          PID:1948
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3676 --field-trial-handle=1380,i,963829136026105601,16448652979941935669,131072 /prefetch:8
                          2⤵
                            PID:2388
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3756 --field-trial-handle=1380,i,963829136026105601,16448652979941935669,131072 /prefetch:1
                            2⤵
                              PID:2008
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3348 --field-trial-handle=1380,i,963829136026105601,16448652979941935669,131072 /prefetch:1
                              2⤵
                                PID:2920
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3468 --field-trial-handle=1380,i,963829136026105601,16448652979941935669,131072 /prefetch:1
                                2⤵
                                  PID:376
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3412 --field-trial-handle=1380,i,963829136026105601,16448652979941935669,131072 /prefetch:1
                                  2⤵
                                    PID:1800
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3704 --field-trial-handle=1380,i,963829136026105601,16448652979941935669,131072 /prefetch:1
                                    2⤵
                                      PID:1096
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3400 --field-trial-handle=1380,i,963829136026105601,16448652979941935669,131072 /prefetch:1
                                      2⤵
                                        PID:2008
                                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                      1⤵
                                        PID:376

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        342B

                                        MD5

                                        3cc9419126a8f76b92cb12fe7f2c2b6d

                                        SHA1

                                        7f12c07a3194a7e18e1d167f3b25e1d9621df203

                                        SHA256

                                        159eac1d3bc726bd6d349c34ab7d2fb70d67a7040efe75a435d6fc2600390ec5

                                        SHA512

                                        4dc776e9ad9507b459e23c83edcbbbcc299d3dc18a2ef3692417aec6320eba452dff174ab2acba9d74da595fb70bc2bea686dbefe14a43d8e2c3f833d1fa286b

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        342B

                                        MD5

                                        70aeabee83888bf426c7ddad642ba088

                                        SHA1

                                        246abd6e394945cc90d254ff2205738bc7ffbd21

                                        SHA256

                                        d06143c2d8fb02d0ba87d285794035ca1143206dbbf885cce68b391194d8402b

                                        SHA512

                                        72f7ec844fe23eb3ea3611dd53d31eb34d91f5105716c3f3dddee01077ec2d82cae023f183563b8497271a32cf27e2b68e3710b3d591852ff709f3509b1fcb5f

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        342B

                                        MD5

                                        fc9f25d628817400183bad13dc302670

                                        SHA1

                                        081a5039b952a954933e30053af4ed57bdb84e93

                                        SHA256

                                        b04182a3c39ae2347d5d01416ef8e6bcb8464a9696ee1273ce0093d09e727ce3

                                        SHA512

                                        6f9fd034d3eb2aa83ddf7e76cc851a2ab02510e8027fb4bd452787af499153567ddaecba05f2b4a2952d9babc7dab40c1d4d1d5c96d7c99bc4248c82ea52670a

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        342B

                                        MD5

                                        6ce577705c9fb04b19b3c7e91aaf8a6c

                                        SHA1

                                        f139766c30012083c2a631a585512aadf7c26b23

                                        SHA256

                                        d3fbdb21dc953462612a1e7bfe924e5abe4fc30034815f3f1fe43b0619af0464

                                        SHA512

                                        80889405e5d664813e9b11b1c480a1b0d0b81501297067249afdbb17c88f7c57d0e0b7f778d4789a0c4a64bb4062c7a75412333623052c24a9a96cebc97c8a64

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        342B

                                        MD5

                                        bf35e4f3ec1d729a9f113339acdba470

                                        SHA1

                                        45e984fd4529dc4f7fc92e96c04c1dfd5b4e7ace

                                        SHA256

                                        f09b91d0c5f65f16c32b3792c3d4e35bf02d9176da61584dc1afba26fc5a5f14

                                        SHA512

                                        b5136c28c65312a2fc423f2d3582099cd218a4e3e4017955e57c851a2fa2d9e77ffc60ad79cdafb5a2dd0607e0817716bf8fe6dc583f0e7a3692822299ccce0b

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        342B

                                        MD5

                                        d16b6ca1524c2e8c125f4610874f3d98

                                        SHA1

                                        4078af7b3a1752f4583c6f62d21fae458b603757

                                        SHA256

                                        2b9bf49f161a37a4805adf6b2332c33025fbbe12ec662a46f76c89e63db940c6

                                        SHA512

                                        fa82103e17be09df5395900fc87b8266dbcdf0eebc17d7f01f705116855016901a4a4062c21f7fc87ce97186c8179f3851d62fd26ca82bdb4fafd5ce4c25c608

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        342B

                                        MD5

                                        eddf36b69e21ef1faf9148caa3c67d0a

                                        SHA1

                                        ae7fefe2aea3516d934b16a6bf4abcd7241f3c05

                                        SHA256

                                        efab77ccb93525d21cdb3914bf8db7c0fb4fe777a494016fffcad1ffc08917cf

                                        SHA512

                                        26659369213162fbf029d285c0d30134466d48fb0febf76f74fd3efa4592be78fdedfe20f7da402ae7364439f74bea11858c16a2f7dca2ff7cfa97015267b98c

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                                        Filesize

                                        16B

                                        MD5

                                        aefd77f47fb84fae5ea194496b44c67a

                                        SHA1

                                        dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                        SHA256

                                        4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                        SHA512

                                        b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                        Filesize

                                        264KB

                                        MD5

                                        f50f89a0a91564d0b8a211f8921aa7de

                                        SHA1

                                        112403a17dd69d5b9018b8cede023cb3b54eab7d

                                        SHA256

                                        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                        SHA512

                                        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                        Filesize

                                        2KB

                                        MD5

                                        299dad950e47846f75892dc9e94f5f7f

                                        SHA1

                                        007db07578c1f5b42399cf733b3c460c7b1a3835

                                        SHA256

                                        0d905d2aa438d2b450c0163f0cbada17cda03cea01a38b3442f8e3601e9acd8a

                                        SHA512

                                        9de2ad536a9c8f506d97adae56c3d8e7aa46dde593e2d2230260029a89c6ab938bb0699a80b8612a10ae9e2a02041c2fb85e8bcfab4469dfc8ec6b78eb16fdf3

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                        Filesize

                                        361B

                                        MD5

                                        34c7fc4e5d0076b2a297e43131f1ced4

                                        SHA1

                                        713a7365e2cf3be730c41f0551344b29a6f52d96

                                        SHA256

                                        bd685ca1e4ee79ab6f24be508ccc2fae6608b8a0a4de1784b6bf183ecebc4d9c

                                        SHA512

                                        d67d060a788b318f932077ef201732435329572dabe41e7f552528df207fb582ac1684b122f4c33d4cf5dfdb79cc5e59c806965266d01ec80169cadf4b7ada77

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        2751e4bb680a58c1aaeb2eddec0bc0c5

                                        SHA1

                                        15faf6cce4ca6af7c63bb3c7f9c0d3d47eb5b581

                                        SHA256

                                        ee6633d200a4d4999f4054425b3326a44c38c90714e71c7540489b8e19037253

                                        SHA512

                                        a39f55e3a7283e700f59314af6a2c654c923cbb9ee9c453eceafa40ce50daa9d2d9d67699ac12e132ed963b69261c5975f5f6916e7c6bbb9a3781f8e461cb308

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                        Filesize

                                        16B

                                        MD5

                                        18e723571b00fb1694a3bad6c78e4054

                                        SHA1

                                        afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                        SHA256

                                        8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                        SHA512

                                        43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\cfa29a85-42f5-48e1-ae22-8cb3a7211ec0.tmp

                                        Filesize

                                        6KB

                                        MD5

                                        83abbc7ed241b15244ea6859007589a7

                                        SHA1

                                        b98d9247cffec8424786001e58e90e925dd0ad69

                                        SHA256

                                        872d9d0751aa61297c781a0005e9a84f05f283e5ca177d209f41872db4104008

                                        SHA512

                                        77fee4d221ea13347f121abbdbdf83021b57de468fb02d0924a4f4f02e004e732933cbc3a92183deacecfaa298a81181622a6dd90ab641b475c60a2d04b63179

                                      • C:\Users\Admin\AppData\Local\Temp\CabFEFA.tmp

                                        Filesize

                                        70KB

                                        MD5

                                        49aebf8cbd62d92ac215b2923fb1b9f5

                                        SHA1

                                        1723be06719828dda65ad804298d0431f6aff976

                                        SHA256

                                        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                        SHA512

                                        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                      • C:\Users\Admin\AppData\Local\Temp\TarFF3B.tmp

                                        Filesize

                                        181KB

                                        MD5

                                        4ea6026cf93ec6338144661bf1202cd1

                                        SHA1

                                        a1dec9044f750ad887935a01430bf49322fbdcb7

                                        SHA256

                                        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                        SHA512

                                        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                      • memory/2380-2-0x0000000074B10000-0x00000000750BB000-memory.dmp

                                        Filesize

                                        5.7MB

                                      • memory/2380-1-0x0000000074B10000-0x00000000750BB000-memory.dmp

                                        Filesize

                                        5.7MB

                                      • memory/2380-0-0x0000000074B11000-0x0000000074B12000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/2380-61-0x0000000074B10000-0x00000000750BB000-memory.dmp

                                        Filesize

                                        5.7MB

                                      • memory/2380-523-0x0000000074B10000-0x00000000750BB000-memory.dmp

                                        Filesize

                                        5.7MB

                                      • memory/2380-526-0x0000000074B10000-0x00000000750BB000-memory.dmp

                                        Filesize

                                        5.7MB