Analysis

  • max time kernel
    172s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    09-02-2023 00:13

General

  • Target

    TLauncher-2.871-Installer-1.0.6-global.exe

  • Size

    23.6MB

  • MD5

    7a4472a78d0651e11d20aa08e43cc045

  • SHA1

    aab1d5f80d7399ae2c1982201733be7681d100b1

  • SHA256

    318df7404e6c4d5538a6d31997b95af52bbb8d40caf5553b3cbd9b1bc4f6db96

  • SHA512

    c152c9d21b0615548173dcc61accb1a1afd5b6f98e6ec21f6a7119536397f07a54ad4087669716c3344dd338ce4f24cecf9989d472f65eaa18c87d496f23c681

  • SSDEEP

    393216:gXQLpnUN/n8IPfs/dQETVlOBbpFEj9GZ1GphRqV56Hpk7IXOzDnKI17fyVS:ggLFUp8aHExiTI3qqHp6zvKcfyVS

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 19 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TLauncher-2.871-Installer-1.0.6-global.exe
    "C:\Users\Admin\AppData\Local\Temp\TLauncher-2.871-Installer-1.0.6-global.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3352
    • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe
      "C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:1910546 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\TLauncher-2.871-Installer-1.0.6-global.exe" "__IRCT:3" "__IRTSS:24771453" "__IRSID:S-1-5-21-2971393436-602173351-1645505021-1000"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1392
      • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\AdditionalExecuteTL.exe
        "C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\AdditionalExecuteTL.exe" /S:C:\Users\Admin\AppData\Local\Temp\setuparguments.ini
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1288
        • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\irsetup.exe
          "C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\irsetup.exe" /S:C:\Users\Admin\AppData\Local\Temp\setuparguments.ini __IRAOFF:1816850 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\AdditionalExecuteTL.exe" "__IRCT:3" "__IRTSS:1840872" "__IRSID:S-1-5-21-2971393436-602173351-1645505021-1000"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1616
          • C:\Users\Admin\AppData\Local\Temp\opera-installer-bro.exe
            "C:\Users\Admin\AppData\Local\Temp\opera-installer-bro.exe" --silent --allusers=0
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Enumerates connected drives
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:5032
            • C:\Users\Admin\AppData\Local\Temp\opera-installer-bro.exe
              C:\Users\Admin\AppData\Local\Temp\opera-installer-bro.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=95.0.4635.37 --initial-client-data=0x344,0x348,0x34c,0x320,0x350,0x6ef0e428,0x6ef0e438,0x6ef0e444
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:3592
            • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera-installer-bro.exe
              "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera-installer-bro.exe" --version
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:3124
            • C:\Users\Admin\AppData\Local\Temp\opera-installer-bro.exe
              "C:\Users\Admin\AppData\Local\Temp\opera-installer-bro.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=es --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --pin-additional-shortcuts=1 --run-at-startup=1 --server-tracking-data=server_tracking_data --initial-pid=5032 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20230209011709" --session-guid=3ea9619e-6692-47e7-8dcc-bd21c57927f9 --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=DC05000000000000
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:4044

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_ADE4E4D3A3BCBCA5C39C54D362D88565

    Filesize

    471B

    MD5

    82ae431bf893b686dd15e0cdf2e721b0

    SHA1

    f46d3e1395ecfac8082ed22a506bfb039a1f61bc

    SHA256

    cfc472afb3ac25ca05be2c3c94147c8e86d5ad5d922ba13a3125fe3d7bdfcce2

    SHA512

    e886d1ef3386e8eebe6ab677fc726802e3e23f678c5a0e8d8d8d566af402cfdd966247e5d67be3f340161606bc69b2d111c6b0c1c75918a9fbf3dd31aab6b376

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_ADE4E4D3A3BCBCA5C39C54D362D88565

    Filesize

    434B

    MD5

    6b380427cd87f503526ead4810d4be89

    SHA1

    6d65aa0d9e7d62dee1bf4297dd422618695bb58b

    SHA256

    01754db7994965320707879c87da98be7bd7272070b43743de7236e2b7c9d30a

    SHA512

    bc4ce43e0fa445480dde9d64f86d2e7596134a1248d4e73b2806f0ddd6cb49da9e41e68e4d1422c802fd8a2f69f69f7fc28382acf244e5308c28f8e9b2cdfc2f

  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera-installer-bro.exe

    Filesize

    2.7MB

    MD5

    b1185776d4161be2b73132581f2184cc

    SHA1

    0eac25cf4ecb1709ae2126b7c1d17b15d84bd448

    SHA256

    bfb14c615884bf203e94d00f1e8a601c88b3bc190c1bb236dc9aa455262218ad

    SHA512

    594f25d40f9f49ef70f631ec6c190742b31fe5a054c4cccd6671b6e6c77c151d321337fbd23dad8e46df0e95b4615966da5a64d54dc08b792a7ec052e29dadf8

  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera-installer-bro.exe

    Filesize

    2.7MB

    MD5

    b1185776d4161be2b73132581f2184cc

    SHA1

    0eac25cf4ecb1709ae2126b7c1d17b15d84bd448

    SHA256

    bfb14c615884bf203e94d00f1e8a601c88b3bc190c1bb236dc9aa455262218ad

    SHA512

    594f25d40f9f49ef70f631ec6c190742b31fe5a054c4cccd6671b6e6c77c151d321337fbd23dad8e46df0e95b4615966da5a64d54dc08b792a7ec052e29dadf8

  • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2302090117084525032.dll

    Filesize

    4.6MB

    MD5

    5ff9275c5cee292fff9034f03bd847e1

    SHA1

    37bf88e062278882492823c7039b7cf374756ae0

    SHA256

    2309501e723a011f4bf2b505e178cbb97af4d798a8720d344f2730c4d756ee08

    SHA512

    f58e5981e25cd6cdd5edb9d9974f137615dee7516d221bf0df08a7425ec68361f29d7b5ca1b835c476fcbcee0df4a028bfa5308867fb3976aaba67cbf8b8dd02

  • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2302090117090303592.dll

    Filesize

    4.6MB

    MD5

    5ff9275c5cee292fff9034f03bd847e1

    SHA1

    37bf88e062278882492823c7039b7cf374756ae0

    SHA256

    2309501e723a011f4bf2b505e178cbb97af4d798a8720d344f2730c4d756ee08

    SHA512

    f58e5981e25cd6cdd5edb9d9974f137615dee7516d221bf0df08a7425ec68361f29d7b5ca1b835c476fcbcee0df4a028bfa5308867fb3976aaba67cbf8b8dd02

  • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2302090117094203124.dll

    Filesize

    4.6MB

    MD5

    5ff9275c5cee292fff9034f03bd847e1

    SHA1

    37bf88e062278882492823c7039b7cf374756ae0

    SHA256

    2309501e723a011f4bf2b505e178cbb97af4d798a8720d344f2730c4d756ee08

    SHA512

    f58e5981e25cd6cdd5edb9d9974f137615dee7516d221bf0df08a7425ec68361f29d7b5ca1b835c476fcbcee0df4a028bfa5308867fb3976aaba67cbf8b8dd02

  • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2302090117233764044.dll

    Filesize

    576KB

    MD5

    3bf5dccfcd6ab11ec5b35910d1ef7d7a

    SHA1

    d34383d76b43bfea5044b1f8be6a94fdd48149aa

    SHA256

    d6c527b93db81bd03870e45b5f4e6fc7725872cf596e6a7ff21e2e6772827f7d

    SHA512

    a1499ce5b1a5afef4d91c34ef07c26a32ee4e631594bd37b51cf17c31a57f4137c4e3b1df6069dd98685580587e2a3d199023c91ca72d539d6b1ffdad4980218

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\AdditionalExecuteTL.exe

    Filesize

    1.8MB

    MD5

    aa4de04ccc16b74a4c2301da8d621ec1

    SHA1

    d05c6d8200f6e6b1283df82d24d687adc47d9664

    SHA256

    e2b0c8e54983b6fcd847a891c5443cb321fb4f0c9106ec8ed6a37cab5ebcc81b

    SHA512

    28d62bbe394bc2300d60263971cdee15fa417c6fcc7e44ecd2b3b567821e99953377383d137b0827f3f904d30deb508732bcb77cd37d444032d6ffc25c60712e

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\AdditionalExecuteTL.exe

    Filesize

    1.8MB

    MD5

    aa4de04ccc16b74a4c2301da8d621ec1

    SHA1

    d05c6d8200f6e6b1283df82d24d687adc47d9664

    SHA256

    e2b0c8e54983b6fcd847a891c5443cb321fb4f0c9106ec8ed6a37cab5ebcc81b

    SHA512

    28d62bbe394bc2300d60263971cdee15fa417c6fcc7e44ecd2b3b567821e99953377383d137b0827f3f904d30deb508732bcb77cd37d444032d6ffc25c60712e

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\IRZip.lmd

    Filesize

    1.7MB

    MD5

    1bbf5dd0b6ca80e4c7c77495c3f33083

    SHA1

    e0520037e60eb641ec04d1e814394c9da0a6a862

    SHA256

    bc6bd19ab0977ac794e18e2c82ace3116bf0537711a352638efd2d8d847c140b

    SHA512

    97bc810871868217f944bc5e60ab642f161c1f082bc9e4122094f10b4e309a6d96e3dd695553a20907cb8fea5aef4802f5a2f0a852328c1a1cd85944022abaab

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\Wow64.lmd

    Filesize

    97KB

    MD5

    da1d0cd400e0b6ad6415fd4d90f69666

    SHA1

    de9083d2902906cacf57259cf581b1466400b799

    SHA256

    7a79b049bdc3b6e4d101691888360f4f993098f3e3a8beefff4ac367430b1575

    SHA512

    f12f64670f158c2e846e78b7b5d191158268b45ecf3c288f02bbee15ae10c4a62e67fb3481da304ba99da2c68ac44d713a44a458ef359db329b6fef3d323382a

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe

    Filesize

    1.3MB

    MD5

    7e08af319c9eb3297e09ca7bb8387de4

    SHA1

    4cf091f77a3eb9437ef33985e64bd10c1257284f

    SHA256

    6c006c982746826a613bc0f09890955a1cdca309d9d98572aed35ad782dd11c8

    SHA512

    bb7aaebd3f6c1ff18bd0cb9eb9347894f0785dc011ec9765d9bc180de9b60769c891151626fdef88aa3fd53ae6246c1cb91f723933da54920bfbc8a5a24f8851

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe

    Filesize

    1.3MB

    MD5

    7e08af319c9eb3297e09ca7bb8387de4

    SHA1

    4cf091f77a3eb9437ef33985e64bd10c1257284f

    SHA256

    6c006c982746826a613bc0f09890955a1cdca309d9d98572aed35ad782dd11c8

    SHA512

    bb7aaebd3f6c1ff18bd0cb9eb9347894f0785dc011ec9765d9bc180de9b60769c891151626fdef88aa3fd53ae6246c1cb91f723933da54920bfbc8a5a24f8851

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\lua5.1.dll

    Filesize

    326KB

    MD5

    80d93d38badecdd2b134fe4699721223

    SHA1

    e829e58091bae93bc64e0c6f9f0bac999cfda23d

    SHA256

    c572a6103af1526f97e708a229a532fd02100a52b949f721052107f1f55e0c59

    SHA512

    9f28073cc186b55ef64661c2e4f6fe1c112785a262b9d8e9a431703fdb1000f1d8cc0b2a3c153c822cfd48782ae945742ccb07beae4d6388d5d0b4df03103bd4

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\lua5.1.dll

    Filesize

    326KB

    MD5

    80d93d38badecdd2b134fe4699721223

    SHA1

    e829e58091bae93bc64e0c6f9f0bac999cfda23d

    SHA256

    c572a6103af1526f97e708a229a532fd02100a52b949f721052107f1f55e0c59

    SHA512

    9f28073cc186b55ef64661c2e4f6fe1c112785a262b9d8e9a431703fdb1000f1d8cc0b2a3c153c822cfd48782ae945742ccb07beae4d6388d5d0b4df03103bd4

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\irsetup.exe

    Filesize

    1.3MB

    MD5

    e801c5847f5f9d207db53aaaf5c6f3a2

    SHA1

    8e6818ce66555e2cca92e5c5f32551fb4a91645e

    SHA256

    196eb4b81988326f6b44b1efcc4fa7a31a289bcf3893a16c3db6f889aa439b03

    SHA512

    303ab54112fd38a36c10484037f8ff4eeadd0c6f7dde18cf4f3b7f64bf7f7756b30f634427be1cf596ec995f41923c8678040a9a06244129f2337a3fe2f9bab3

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\irsetup.exe

    Filesize

    1.3MB

    MD5

    e801c5847f5f9d207db53aaaf5c6f3a2

    SHA1

    8e6818ce66555e2cca92e5c5f32551fb4a91645e

    SHA256

    196eb4b81988326f6b44b1efcc4fa7a31a289bcf3893a16c3db6f889aa439b03

    SHA512

    303ab54112fd38a36c10484037f8ff4eeadd0c6f7dde18cf4f3b7f64bf7f7756b30f634427be1cf596ec995f41923c8678040a9a06244129f2337a3fe2f9bab3

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\lua5.1.dll

    Filesize

    326KB

    MD5

    80d93d38badecdd2b134fe4699721223

    SHA1

    e829e58091bae93bc64e0c6f9f0bac999cfda23d

    SHA256

    c572a6103af1526f97e708a229a532fd02100a52b949f721052107f1f55e0c59

    SHA512

    9f28073cc186b55ef64661c2e4f6fe1c112785a262b9d8e9a431703fdb1000f1d8cc0b2a3c153c822cfd48782ae945742ccb07beae4d6388d5d0b4df03103bd4

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\lua5.1.dll

    Filesize

    326KB

    MD5

    80d93d38badecdd2b134fe4699721223

    SHA1

    e829e58091bae93bc64e0c6f9f0bac999cfda23d

    SHA256

    c572a6103af1526f97e708a229a532fd02100a52b949f721052107f1f55e0c59

    SHA512

    9f28073cc186b55ef64661c2e4f6fe1c112785a262b9d8e9a431703fdb1000f1d8cc0b2a3c153c822cfd48782ae945742ccb07beae4d6388d5d0b4df03103bd4

  • C:\Users\Admin\AppData\Local\Temp\opera-installer-bro.exe

    Filesize

    2.7MB

    MD5

    b1185776d4161be2b73132581f2184cc

    SHA1

    0eac25cf4ecb1709ae2126b7c1d17b15d84bd448

    SHA256

    bfb14c615884bf203e94d00f1e8a601c88b3bc190c1bb236dc9aa455262218ad

    SHA512

    594f25d40f9f49ef70f631ec6c190742b31fe5a054c4cccd6671b6e6c77c151d321337fbd23dad8e46df0e95b4615966da5a64d54dc08b792a7ec052e29dadf8

  • C:\Users\Admin\AppData\Local\Temp\opera-installer-bro.exe

    Filesize

    2.7MB

    MD5

    b1185776d4161be2b73132581f2184cc

    SHA1

    0eac25cf4ecb1709ae2126b7c1d17b15d84bd448

    SHA256

    bfb14c615884bf203e94d00f1e8a601c88b3bc190c1bb236dc9aa455262218ad

    SHA512

    594f25d40f9f49ef70f631ec6c190742b31fe5a054c4cccd6671b6e6c77c151d321337fbd23dad8e46df0e95b4615966da5a64d54dc08b792a7ec052e29dadf8

  • C:\Users\Admin\AppData\Local\Temp\opera-installer-bro.exe

    Filesize

    2.7MB

    MD5

    b1185776d4161be2b73132581f2184cc

    SHA1

    0eac25cf4ecb1709ae2126b7c1d17b15d84bd448

    SHA256

    bfb14c615884bf203e94d00f1e8a601c88b3bc190c1bb236dc9aa455262218ad

    SHA512

    594f25d40f9f49ef70f631ec6c190742b31fe5a054c4cccd6671b6e6c77c151d321337fbd23dad8e46df0e95b4615966da5a64d54dc08b792a7ec052e29dadf8

  • C:\Users\Admin\AppData\Local\Temp\opera-installer-bro.exe

    Filesize

    2.7MB

    MD5

    b1185776d4161be2b73132581f2184cc

    SHA1

    0eac25cf4ecb1709ae2126b7c1d17b15d84bd448

    SHA256

    bfb14c615884bf203e94d00f1e8a601c88b3bc190c1bb236dc9aa455262218ad

    SHA512

    594f25d40f9f49ef70f631ec6c190742b31fe5a054c4cccd6671b6e6c77c151d321337fbd23dad8e46df0e95b4615966da5a64d54dc08b792a7ec052e29dadf8

  • C:\Users\Admin\AppData\Local\Temp\setuparguments.ini

    Filesize

    647B

    MD5

    5b1546999d118035895a96a2368bab67

    SHA1

    dde803e2029941af8c0f06ed0da00f17b300a62a

    SHA256

    2c019f8c2ba11976f382c899dccecfa1efc46d0c7596e7866a95dd22a33d543b

    SHA512

    c9ec4cf70ae121d3476b33b1284666c1509a9b3e5b8264c2f50ca9ddbe004e4e2f41bc6cc2db37ef52df00e0bb7ab39ae30dfdbc0917cc699a57fa33802bcde4

  • memory/1392-143-0x0000000010000000-0x0000000010051000-memory.dmp

    Filesize

    324KB

  • memory/1392-135-0x00000000009D0000-0x0000000000DB8000-memory.dmp

    Filesize

    3.9MB

  • memory/1392-140-0x0000000010000000-0x0000000010051000-memory.dmp

    Filesize

    324KB

  • memory/1392-141-0x0000000006BB0000-0x0000000006BB3000-memory.dmp

    Filesize

    12KB

  • memory/1392-142-0x00000000009D0000-0x0000000000DB8000-memory.dmp

    Filesize

    3.9MB

  • memory/1616-152-0x0000000000D60000-0x0000000001148000-memory.dmp

    Filesize

    3.9MB

  • memory/1616-170-0x0000000000D60000-0x0000000001148000-memory.dmp

    Filesize

    3.9MB

  • memory/1616-174-0x0000000000D60000-0x0000000001148000-memory.dmp

    Filesize

    3.9MB

  • memory/3124-166-0x0000000000400000-0x0000000000947000-memory.dmp

    Filesize

    5.3MB

  • memory/3592-172-0x0000000000400000-0x0000000000947000-memory.dmp

    Filesize

    5.3MB

  • memory/4044-173-0x0000000000400000-0x0000000000947000-memory.dmp

    Filesize

    5.3MB

  • memory/5032-159-0x0000000000400000-0x0000000000947000-memory.dmp

    Filesize

    5.3MB