Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 04:41

General

  • Target

    1c6130b78882d6cb733724309deb3661.exe

  • Size

    1.1MB

  • MD5

    1c6130b78882d6cb733724309deb3661

  • SHA1

    02066c60803e7c40779743500ebbcc9413b816e1

  • SHA256

    02a08e087017fe623c4c21eefc963b5552ef7bafc8c1f7b363e59397d6818645

  • SHA512

    8570076f98bd091ca99499c8da418e1c46bd481fa4579828d8b2eaa187f2580ebd0d8372a0ab02eda3807aa39a859df9f43974a870ac94d3fa4adaad1e19f472

  • SSDEEP

    24576:iyPomn86ydk6mX5IB6vpIqfXz1h5g93XK/OziErBRQajk0:Jp4dk6QKB6vpIkgFK/OOE9yIk

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 8 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c6130b78882d6cb733724309deb3661.exe
    "C:\Users\Admin\AppData\Local\Temp\1c6130b78882d6cb733724309deb3661.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AF8mc68.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AF8mc68.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1692
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\FZ5Vc26.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\FZ5Vc26.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2192
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kg0uu80.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kg0uu80.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2096
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1bM14hK2.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1bM14hK2.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2708
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2iQ8539.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2iQ8539.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1640
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:3040
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 284
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2880

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Create or Modify System Process

    1
    T1543

    Windows Service

    1
    T1543.003

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Create or Modify System Process

    1
    T1543

    Windows Service

    1
    T1543.003

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Modify Registry

    3
    T1112

    Impair Defenses

    2
    T1562

    Disable or Modify Tools

    2
    T1562.001

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AF8mc68.exe
      Filesize

      990KB

      MD5

      67924d5eb80cb5c740fe76da195f3e2e

      SHA1

      bf7106fcf9d9f8af1146ccc6b76d63e7c190380b

      SHA256

      8058641cebf7766f915627ab527db57c459e93f9b2df96cec0cb49f9bdf2acfc

      SHA512

      17f9fafc75614a2ab6fd4ed8818c0df837083ad4aabd9216ce44b003924461c72210f5cfe27646350f788b4e0bf73f4d68a3b2779cb1656d46eee07ee2d47a12

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AF8mc68.exe
      Filesize

      990KB

      MD5

      67924d5eb80cb5c740fe76da195f3e2e

      SHA1

      bf7106fcf9d9f8af1146ccc6b76d63e7c190380b

      SHA256

      8058641cebf7766f915627ab527db57c459e93f9b2df96cec0cb49f9bdf2acfc

      SHA512

      17f9fafc75614a2ab6fd4ed8818c0df837083ad4aabd9216ce44b003924461c72210f5cfe27646350f788b4e0bf73f4d68a3b2779cb1656d46eee07ee2d47a12

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\FZ5Vc26.exe
      Filesize

      696KB

      MD5

      b87cad063f33eaf7c3a2aa3a34f9ef27

      SHA1

      848379decb99e9e3c292079e927fde9a2447c651

      SHA256

      43fd821e5ad96413cda38ff785cedf9fc7a392bff933b9efeb5260cba1d8a68a

      SHA512

      016d6858faa7ece9c81a9572888a606aea6df28dc32fd3c6979395e2c639fbe08f3dd256680e77787c66fcdbcf552d7e1f01d5c5cddc71f047704909cd45c9e6

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\FZ5Vc26.exe
      Filesize

      696KB

      MD5

      b87cad063f33eaf7c3a2aa3a34f9ef27

      SHA1

      848379decb99e9e3c292079e927fde9a2447c651

      SHA256

      43fd821e5ad96413cda38ff785cedf9fc7a392bff933b9efeb5260cba1d8a68a

      SHA512

      016d6858faa7ece9c81a9572888a606aea6df28dc32fd3c6979395e2c639fbe08f3dd256680e77787c66fcdbcf552d7e1f01d5c5cddc71f047704909cd45c9e6

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kg0uu80.exe
      Filesize

      452KB

      MD5

      dc4ebcce859eb1860b5cf43313420324

      SHA1

      2fc4ca1d3d50419192a1e949faa84a5f8ba2a52f

      SHA256

      40dcba0baabf30bbc3fb711f871e35eb2eadd86cb017b84980cbf166c0221854

      SHA512

      a7fb110fc1bdf070c86c81f7b96f886326ebfa3184668888e204a0eb4d4037829afee2dbcafc31b78c457dbd76cb5429324a6144cb569fd826e419f75cd6c42f

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kg0uu80.exe
      Filesize

      452KB

      MD5

      dc4ebcce859eb1860b5cf43313420324

      SHA1

      2fc4ca1d3d50419192a1e949faa84a5f8ba2a52f

      SHA256

      40dcba0baabf30bbc3fb711f871e35eb2eadd86cb017b84980cbf166c0221854

      SHA512

      a7fb110fc1bdf070c86c81f7b96f886326ebfa3184668888e204a0eb4d4037829afee2dbcafc31b78c457dbd76cb5429324a6144cb569fd826e419f75cd6c42f

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1bM14hK2.exe
      Filesize

      192KB

      MD5

      8904f85abd522c7d0cb5789d9583ccff

      SHA1

      5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

      SHA256

      7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

      SHA512

      04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1bM14hK2.exe
      Filesize

      192KB

      MD5

      8904f85abd522c7d0cb5789d9583ccff

      SHA1

      5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

      SHA256

      7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

      SHA512

      04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2iQ8539.exe
      Filesize

      378KB

      MD5

      ad92cb9e663b66e6a185f29daf9a29ba

      SHA1

      94b0fe6a9248b6ea257fb6f06dd8ffd16e86bb88

      SHA256

      07d2211b12435653a8d496df65f9513837c9e77f4d446d2c1a408d48d9841fa4

      SHA512

      730ec03e674b1d3c613fe6b88f9e66001a8f96f54a735c0b3473065cb338c1f9977318eb6e67468443f197b67586d3b143fe65f6b365b1c74a394828f96fa641

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2iQ8539.exe
      Filesize

      378KB

      MD5

      ad92cb9e663b66e6a185f29daf9a29ba

      SHA1

      94b0fe6a9248b6ea257fb6f06dd8ffd16e86bb88

      SHA256

      07d2211b12435653a8d496df65f9513837c9e77f4d446d2c1a408d48d9841fa4

      SHA512

      730ec03e674b1d3c613fe6b88f9e66001a8f96f54a735c0b3473065cb338c1f9977318eb6e67468443f197b67586d3b143fe65f6b365b1c74a394828f96fa641

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2iQ8539.exe
      Filesize

      378KB

      MD5

      ad92cb9e663b66e6a185f29daf9a29ba

      SHA1

      94b0fe6a9248b6ea257fb6f06dd8ffd16e86bb88

      SHA256

      07d2211b12435653a8d496df65f9513837c9e77f4d446d2c1a408d48d9841fa4

      SHA512

      730ec03e674b1d3c613fe6b88f9e66001a8f96f54a735c0b3473065cb338c1f9977318eb6e67468443f197b67586d3b143fe65f6b365b1c74a394828f96fa641

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\AF8mc68.exe
      Filesize

      990KB

      MD5

      67924d5eb80cb5c740fe76da195f3e2e

      SHA1

      bf7106fcf9d9f8af1146ccc6b76d63e7c190380b

      SHA256

      8058641cebf7766f915627ab527db57c459e93f9b2df96cec0cb49f9bdf2acfc

      SHA512

      17f9fafc75614a2ab6fd4ed8818c0df837083ad4aabd9216ce44b003924461c72210f5cfe27646350f788b4e0bf73f4d68a3b2779cb1656d46eee07ee2d47a12

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\AF8mc68.exe
      Filesize

      990KB

      MD5

      67924d5eb80cb5c740fe76da195f3e2e

      SHA1

      bf7106fcf9d9f8af1146ccc6b76d63e7c190380b

      SHA256

      8058641cebf7766f915627ab527db57c459e93f9b2df96cec0cb49f9bdf2acfc

      SHA512

      17f9fafc75614a2ab6fd4ed8818c0df837083ad4aabd9216ce44b003924461c72210f5cfe27646350f788b4e0bf73f4d68a3b2779cb1656d46eee07ee2d47a12

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\FZ5Vc26.exe
      Filesize

      696KB

      MD5

      b87cad063f33eaf7c3a2aa3a34f9ef27

      SHA1

      848379decb99e9e3c292079e927fde9a2447c651

      SHA256

      43fd821e5ad96413cda38ff785cedf9fc7a392bff933b9efeb5260cba1d8a68a

      SHA512

      016d6858faa7ece9c81a9572888a606aea6df28dc32fd3c6979395e2c639fbe08f3dd256680e77787c66fcdbcf552d7e1f01d5c5cddc71f047704909cd45c9e6

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\FZ5Vc26.exe
      Filesize

      696KB

      MD5

      b87cad063f33eaf7c3a2aa3a34f9ef27

      SHA1

      848379decb99e9e3c292079e927fde9a2447c651

      SHA256

      43fd821e5ad96413cda38ff785cedf9fc7a392bff933b9efeb5260cba1d8a68a

      SHA512

      016d6858faa7ece9c81a9572888a606aea6df28dc32fd3c6979395e2c639fbe08f3dd256680e77787c66fcdbcf552d7e1f01d5c5cddc71f047704909cd45c9e6

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\kg0uu80.exe
      Filesize

      452KB

      MD5

      dc4ebcce859eb1860b5cf43313420324

      SHA1

      2fc4ca1d3d50419192a1e949faa84a5f8ba2a52f

      SHA256

      40dcba0baabf30bbc3fb711f871e35eb2eadd86cb017b84980cbf166c0221854

      SHA512

      a7fb110fc1bdf070c86c81f7b96f886326ebfa3184668888e204a0eb4d4037829afee2dbcafc31b78c457dbd76cb5429324a6144cb569fd826e419f75cd6c42f

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\kg0uu80.exe
      Filesize

      452KB

      MD5

      dc4ebcce859eb1860b5cf43313420324

      SHA1

      2fc4ca1d3d50419192a1e949faa84a5f8ba2a52f

      SHA256

      40dcba0baabf30bbc3fb711f871e35eb2eadd86cb017b84980cbf166c0221854

      SHA512

      a7fb110fc1bdf070c86c81f7b96f886326ebfa3184668888e204a0eb4d4037829afee2dbcafc31b78c457dbd76cb5429324a6144cb569fd826e419f75cd6c42f

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1bM14hK2.exe
      Filesize

      192KB

      MD5

      8904f85abd522c7d0cb5789d9583ccff

      SHA1

      5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

      SHA256

      7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

      SHA512

      04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1bM14hK2.exe
      Filesize

      192KB

      MD5

      8904f85abd522c7d0cb5789d9583ccff

      SHA1

      5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

      SHA256

      7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

      SHA512

      04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2iQ8539.exe
      Filesize

      378KB

      MD5

      ad92cb9e663b66e6a185f29daf9a29ba

      SHA1

      94b0fe6a9248b6ea257fb6f06dd8ffd16e86bb88

      SHA256

      07d2211b12435653a8d496df65f9513837c9e77f4d446d2c1a408d48d9841fa4

      SHA512

      730ec03e674b1d3c613fe6b88f9e66001a8f96f54a735c0b3473065cb338c1f9977318eb6e67468443f197b67586d3b143fe65f6b365b1c74a394828f96fa641

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2iQ8539.exe
      Filesize

      378KB

      MD5

      ad92cb9e663b66e6a185f29daf9a29ba

      SHA1

      94b0fe6a9248b6ea257fb6f06dd8ffd16e86bb88

      SHA256

      07d2211b12435653a8d496df65f9513837c9e77f4d446d2c1a408d48d9841fa4

      SHA512

      730ec03e674b1d3c613fe6b88f9e66001a8f96f54a735c0b3473065cb338c1f9977318eb6e67468443f197b67586d3b143fe65f6b365b1c74a394828f96fa641

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2iQ8539.exe
      Filesize

      378KB

      MD5

      ad92cb9e663b66e6a185f29daf9a29ba

      SHA1

      94b0fe6a9248b6ea257fb6f06dd8ffd16e86bb88

      SHA256

      07d2211b12435653a8d496df65f9513837c9e77f4d446d2c1a408d48d9841fa4

      SHA512

      730ec03e674b1d3c613fe6b88f9e66001a8f96f54a735c0b3473065cb338c1f9977318eb6e67468443f197b67586d3b143fe65f6b365b1c74a394828f96fa641

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2iQ8539.exe
      Filesize

      378KB

      MD5

      ad92cb9e663b66e6a185f29daf9a29ba

      SHA1

      94b0fe6a9248b6ea257fb6f06dd8ffd16e86bb88

      SHA256

      07d2211b12435653a8d496df65f9513837c9e77f4d446d2c1a408d48d9841fa4

      SHA512

      730ec03e674b1d3c613fe6b88f9e66001a8f96f54a735c0b3473065cb338c1f9977318eb6e67468443f197b67586d3b143fe65f6b365b1c74a394828f96fa641

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2iQ8539.exe
      Filesize

      378KB

      MD5

      ad92cb9e663b66e6a185f29daf9a29ba

      SHA1

      94b0fe6a9248b6ea257fb6f06dd8ffd16e86bb88

      SHA256

      07d2211b12435653a8d496df65f9513837c9e77f4d446d2c1a408d48d9841fa4

      SHA512

      730ec03e674b1d3c613fe6b88f9e66001a8f96f54a735c0b3473065cb338c1f9977318eb6e67468443f197b67586d3b143fe65f6b365b1c74a394828f96fa641

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2iQ8539.exe
      Filesize

      378KB

      MD5

      ad92cb9e663b66e6a185f29daf9a29ba

      SHA1

      94b0fe6a9248b6ea257fb6f06dd8ffd16e86bb88

      SHA256

      07d2211b12435653a8d496df65f9513837c9e77f4d446d2c1a408d48d9841fa4

      SHA512

      730ec03e674b1d3c613fe6b88f9e66001a8f96f54a735c0b3473065cb338c1f9977318eb6e67468443f197b67586d3b143fe65f6b365b1c74a394828f96fa641

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2iQ8539.exe
      Filesize

      378KB

      MD5

      ad92cb9e663b66e6a185f29daf9a29ba

      SHA1

      94b0fe6a9248b6ea257fb6f06dd8ffd16e86bb88

      SHA256

      07d2211b12435653a8d496df65f9513837c9e77f4d446d2c1a408d48d9841fa4

      SHA512

      730ec03e674b1d3c613fe6b88f9e66001a8f96f54a735c0b3473065cb338c1f9977318eb6e67468443f197b67586d3b143fe65f6b365b1c74a394828f96fa641

    • memory/2708-69-0x0000000000540000-0x0000000000556000-memory.dmp
      Filesize

      88KB

    • memory/2708-51-0x0000000000540000-0x0000000000556000-memory.dmp
      Filesize

      88KB

    • memory/2708-63-0x0000000000540000-0x0000000000556000-memory.dmp
      Filesize

      88KB

    • memory/2708-61-0x0000000000540000-0x0000000000556000-memory.dmp
      Filesize

      88KB

    • memory/2708-57-0x0000000000540000-0x0000000000556000-memory.dmp
      Filesize

      88KB

    • memory/2708-55-0x0000000000540000-0x0000000000556000-memory.dmp
      Filesize

      88KB

    • memory/2708-53-0x0000000000540000-0x0000000000556000-memory.dmp
      Filesize

      88KB

    • memory/2708-65-0x0000000000540000-0x0000000000556000-memory.dmp
      Filesize

      88KB

    • memory/2708-59-0x0000000000540000-0x0000000000556000-memory.dmp
      Filesize

      88KB

    • memory/2708-43-0x0000000000540000-0x0000000000556000-memory.dmp
      Filesize

      88KB

    • memory/2708-49-0x0000000000540000-0x0000000000556000-memory.dmp
      Filesize

      88KB

    • memory/2708-47-0x0000000000540000-0x0000000000556000-memory.dmp
      Filesize

      88KB

    • memory/2708-45-0x0000000000540000-0x0000000000556000-memory.dmp
      Filesize

      88KB

    • memory/2708-40-0x00000000003E0000-0x00000000003FE000-memory.dmp
      Filesize

      120KB

    • memory/2708-41-0x0000000000540000-0x000000000055C000-memory.dmp
      Filesize

      112KB

    • memory/2708-67-0x0000000000540000-0x0000000000556000-memory.dmp
      Filesize

      88KB

    • memory/2708-42-0x0000000000540000-0x0000000000556000-memory.dmp
      Filesize

      88KB

    • memory/3040-83-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/3040-89-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/3040-91-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
      Filesize

      4KB

    • memory/3040-92-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/3040-96-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/3040-94-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/3040-97-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/3040-87-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/3040-85-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/3040-81-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/3040-101-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/3040-79-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB