Analysis

  • max time kernel
    120s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 20:26

General

  • Target

    0690efd356ed29c86279ff4a0f431bc973d07314cbf666a1804cfb1018221be9.exe

  • Size

    989KB

  • MD5

    221e84447fbd0b1f06b59dac88d063c9

  • SHA1

    e87126e77ce0eb2fca682985c157746b7b73e5cd

  • SHA256

    0690efd356ed29c86279ff4a0f431bc973d07314cbf666a1804cfb1018221be9

  • SHA512

    60818b6001e82d5aef6fc4395b2f886acce60a5cb156c85a1ec3a95bcf71b0076bd8706bc1b12c26fc042b1099a49efbfc55871c3d9d8f76d42fc92a548f10b2

  • SSDEEP

    24576:ayyy5n++lhWbZfidM42S7Oc+1f+78EiAMJRw/edQItF:ht5nrhqUqGj7FdI

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0690efd356ed29c86279ff4a0f431bc973d07314cbf666a1804cfb1018221be9.exe
    "C:\Users\Admin\AppData\Local\Temp\0690efd356ed29c86279ff4a0f431bc973d07314cbf666a1804cfb1018221be9.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2673335.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2673335.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2332
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2451699.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2451699.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2372
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5779253.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5779253.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2736
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2385855.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2385855.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2780
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8696735.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8696735.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2796
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4925822.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4925822.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2672
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2552
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                    PID:2572
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 268
                      8⤵
                      • Program crash
                      PID:1624
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 276
                    7⤵
                    • Loads dropped DLL
                    • Program crash
                    PID:2012

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2673335.exe

        Filesize

        893KB

        MD5

        6b5e45e36d7a23e1f6f88ea7abaeb74b

        SHA1

        7c07487968639236d186c5ab6b87a4425f609cd7

        SHA256

        e5355f0283c3f78b0724a5cd0997ee9e18ca54942afada4e8a313656727ccec8

        SHA512

        ee02ff4d5fabd19ec119353e2dee531ea14d981a728e9a064d472767cb416363a10b4cdf751628af09692c541110d9547a046d02e2966379788a6235f6d507b6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2673335.exe

        Filesize

        893KB

        MD5

        6b5e45e36d7a23e1f6f88ea7abaeb74b

        SHA1

        7c07487968639236d186c5ab6b87a4425f609cd7

        SHA256

        e5355f0283c3f78b0724a5cd0997ee9e18ca54942afada4e8a313656727ccec8

        SHA512

        ee02ff4d5fabd19ec119353e2dee531ea14d981a728e9a064d472767cb416363a10b4cdf751628af09692c541110d9547a046d02e2966379788a6235f6d507b6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2451699.exe

        Filesize

        709KB

        MD5

        55ff2c875715c445c30733d7908202ee

        SHA1

        916f04161821c22c845417e5b49de924e9aa0737

        SHA256

        a86b0e334ce856e9df76a201f6181c4deff64d2eafd69ba1962bc6050b4b9ebc

        SHA512

        b672d52ac718326bf130df6d26741c4b5a6154a15fffa089dd9ea6804515ac3613635fa10bcbb9dbe8e36b82b34183a4e0322e89a51edff26f05b4167c041eb8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2451699.exe

        Filesize

        709KB

        MD5

        55ff2c875715c445c30733d7908202ee

        SHA1

        916f04161821c22c845417e5b49de924e9aa0737

        SHA256

        a86b0e334ce856e9df76a201f6181c4deff64d2eafd69ba1962bc6050b4b9ebc

        SHA512

        b672d52ac718326bf130df6d26741c4b5a6154a15fffa089dd9ea6804515ac3613635fa10bcbb9dbe8e36b82b34183a4e0322e89a51edff26f05b4167c041eb8

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5779253.exe

        Filesize

        527KB

        MD5

        498f70984ebd7edc3c6471a4b8fde35f

        SHA1

        8c98593aa95b807bcaadcb19cd5242ef274d26f2

        SHA256

        8919bfd15fa90e06a492b5964b36551bac794f676e46b9b1463db27cc43d9fa3

        SHA512

        106e8f7f9dba7488855d88840c20a69ae602f4837b6b66176e6179ab143f39d71fa60f8c654a693aa195ef4d6b5836db0acc2160f520f45d4fd3e1fe5e7d00c7

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5779253.exe

        Filesize

        527KB

        MD5

        498f70984ebd7edc3c6471a4b8fde35f

        SHA1

        8c98593aa95b807bcaadcb19cd5242ef274d26f2

        SHA256

        8919bfd15fa90e06a492b5964b36551bac794f676e46b9b1463db27cc43d9fa3

        SHA512

        106e8f7f9dba7488855d88840c20a69ae602f4837b6b66176e6179ab143f39d71fa60f8c654a693aa195ef4d6b5836db0acc2160f520f45d4fd3e1fe5e7d00c7

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2385855.exe

        Filesize

        296KB

        MD5

        c208e414fd53d8ee7fca66008c5334b7

        SHA1

        d364cb597e5f7b32df4af531075fe421c5c49b5b

        SHA256

        6731e6088259d4025cd2a6fa7bc0ee472b6a35428f9caddc994fc27e569cd187

        SHA512

        bfc9b8f79177715079ebbf7d974f0f1c2b4ced60303a2d623d7012a5ada01834b2ac87f55b17ea6a05fe16dfdf1c5f060ce63ff6d99feedf0fa670b6bb8107af

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2385855.exe

        Filesize

        296KB

        MD5

        c208e414fd53d8ee7fca66008c5334b7

        SHA1

        d364cb597e5f7b32df4af531075fe421c5c49b5b

        SHA256

        6731e6088259d4025cd2a6fa7bc0ee472b6a35428f9caddc994fc27e569cd187

        SHA512

        bfc9b8f79177715079ebbf7d974f0f1c2b4ced60303a2d623d7012a5ada01834b2ac87f55b17ea6a05fe16dfdf1c5f060ce63ff6d99feedf0fa670b6bb8107af

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8696735.exe

        Filesize

        11KB

        MD5

        8d065a934aa14e7a4c566aa07a9552f5

        SHA1

        437e9f21c8c4494a592dc69156d6cfbc0ddac274

        SHA256

        c6bd73b444713d5dad1a46526140c5043a7ec234336a9b34c67c38e84f5b8a8b

        SHA512

        0454b9aee685bd730b7730fa151cf36434897779f3be758b45fbc772449cdac0bb882ac14a6dd57a2b09dc812023e80a5a7422c7ce346b0a468f9222f6c260e0

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8696735.exe

        Filesize

        11KB

        MD5

        8d065a934aa14e7a4c566aa07a9552f5

        SHA1

        437e9f21c8c4494a592dc69156d6cfbc0ddac274

        SHA256

        c6bd73b444713d5dad1a46526140c5043a7ec234336a9b34c67c38e84f5b8a8b

        SHA512

        0454b9aee685bd730b7730fa151cf36434897779f3be758b45fbc772449cdac0bb882ac14a6dd57a2b09dc812023e80a5a7422c7ce346b0a468f9222f6c260e0

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4925822.exe

        Filesize

        276KB

        MD5

        555a5900572bcc7f90ba500db7bd1820

        SHA1

        c89897ce52b7c4b2cda8544f5c3680387e01faba

        SHA256

        4cb940f2e77a195b74b29f40128ed22fe4c95c16390422bff367597066bab5cb

        SHA512

        498cc65144efa2167245b529c40639f91fc63fa1bbaec628110efff776570f6d1c93012f0bcd1084e93f9a430ed608b31f81788c87e81f2bf6a162d04188ee8d

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4925822.exe

        Filesize

        276KB

        MD5

        555a5900572bcc7f90ba500db7bd1820

        SHA1

        c89897ce52b7c4b2cda8544f5c3680387e01faba

        SHA256

        4cb940f2e77a195b74b29f40128ed22fe4c95c16390422bff367597066bab5cb

        SHA512

        498cc65144efa2167245b529c40639f91fc63fa1bbaec628110efff776570f6d1c93012f0bcd1084e93f9a430ed608b31f81788c87e81f2bf6a162d04188ee8d

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4925822.exe

        Filesize

        276KB

        MD5

        555a5900572bcc7f90ba500db7bd1820

        SHA1

        c89897ce52b7c4b2cda8544f5c3680387e01faba

        SHA256

        4cb940f2e77a195b74b29f40128ed22fe4c95c16390422bff367597066bab5cb

        SHA512

        498cc65144efa2167245b529c40639f91fc63fa1bbaec628110efff776570f6d1c93012f0bcd1084e93f9a430ed608b31f81788c87e81f2bf6a162d04188ee8d

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z2673335.exe

        Filesize

        893KB

        MD5

        6b5e45e36d7a23e1f6f88ea7abaeb74b

        SHA1

        7c07487968639236d186c5ab6b87a4425f609cd7

        SHA256

        e5355f0283c3f78b0724a5cd0997ee9e18ca54942afada4e8a313656727ccec8

        SHA512

        ee02ff4d5fabd19ec119353e2dee531ea14d981a728e9a064d472767cb416363a10b4cdf751628af09692c541110d9547a046d02e2966379788a6235f6d507b6

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z2673335.exe

        Filesize

        893KB

        MD5

        6b5e45e36d7a23e1f6f88ea7abaeb74b

        SHA1

        7c07487968639236d186c5ab6b87a4425f609cd7

        SHA256

        e5355f0283c3f78b0724a5cd0997ee9e18ca54942afada4e8a313656727ccec8

        SHA512

        ee02ff4d5fabd19ec119353e2dee531ea14d981a728e9a064d472767cb416363a10b4cdf751628af09692c541110d9547a046d02e2966379788a6235f6d507b6

      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2451699.exe

        Filesize

        709KB

        MD5

        55ff2c875715c445c30733d7908202ee

        SHA1

        916f04161821c22c845417e5b49de924e9aa0737

        SHA256

        a86b0e334ce856e9df76a201f6181c4deff64d2eafd69ba1962bc6050b4b9ebc

        SHA512

        b672d52ac718326bf130df6d26741c4b5a6154a15fffa089dd9ea6804515ac3613635fa10bcbb9dbe8e36b82b34183a4e0322e89a51edff26f05b4167c041eb8

      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2451699.exe

        Filesize

        709KB

        MD5

        55ff2c875715c445c30733d7908202ee

        SHA1

        916f04161821c22c845417e5b49de924e9aa0737

        SHA256

        a86b0e334ce856e9df76a201f6181c4deff64d2eafd69ba1962bc6050b4b9ebc

        SHA512

        b672d52ac718326bf130df6d26741c4b5a6154a15fffa089dd9ea6804515ac3613635fa10bcbb9dbe8e36b82b34183a4e0322e89a51edff26f05b4167c041eb8

      • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z5779253.exe

        Filesize

        527KB

        MD5

        498f70984ebd7edc3c6471a4b8fde35f

        SHA1

        8c98593aa95b807bcaadcb19cd5242ef274d26f2

        SHA256

        8919bfd15fa90e06a492b5964b36551bac794f676e46b9b1463db27cc43d9fa3

        SHA512

        106e8f7f9dba7488855d88840c20a69ae602f4837b6b66176e6179ab143f39d71fa60f8c654a693aa195ef4d6b5836db0acc2160f520f45d4fd3e1fe5e7d00c7

      • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z5779253.exe

        Filesize

        527KB

        MD5

        498f70984ebd7edc3c6471a4b8fde35f

        SHA1

        8c98593aa95b807bcaadcb19cd5242ef274d26f2

        SHA256

        8919bfd15fa90e06a492b5964b36551bac794f676e46b9b1463db27cc43d9fa3

        SHA512

        106e8f7f9dba7488855d88840c20a69ae602f4837b6b66176e6179ab143f39d71fa60f8c654a693aa195ef4d6b5836db0acc2160f520f45d4fd3e1fe5e7d00c7

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2385855.exe

        Filesize

        296KB

        MD5

        c208e414fd53d8ee7fca66008c5334b7

        SHA1

        d364cb597e5f7b32df4af531075fe421c5c49b5b

        SHA256

        6731e6088259d4025cd2a6fa7bc0ee472b6a35428f9caddc994fc27e569cd187

        SHA512

        bfc9b8f79177715079ebbf7d974f0f1c2b4ced60303a2d623d7012a5ada01834b2ac87f55b17ea6a05fe16dfdf1c5f060ce63ff6d99feedf0fa670b6bb8107af

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2385855.exe

        Filesize

        296KB

        MD5

        c208e414fd53d8ee7fca66008c5334b7

        SHA1

        d364cb597e5f7b32df4af531075fe421c5c49b5b

        SHA256

        6731e6088259d4025cd2a6fa7bc0ee472b6a35428f9caddc994fc27e569cd187

        SHA512

        bfc9b8f79177715079ebbf7d974f0f1c2b4ced60303a2d623d7012a5ada01834b2ac87f55b17ea6a05fe16dfdf1c5f060ce63ff6d99feedf0fa670b6bb8107af

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8696735.exe

        Filesize

        11KB

        MD5

        8d065a934aa14e7a4c566aa07a9552f5

        SHA1

        437e9f21c8c4494a592dc69156d6cfbc0ddac274

        SHA256

        c6bd73b444713d5dad1a46526140c5043a7ec234336a9b34c67c38e84f5b8a8b

        SHA512

        0454b9aee685bd730b7730fa151cf36434897779f3be758b45fbc772449cdac0bb882ac14a6dd57a2b09dc812023e80a5a7422c7ce346b0a468f9222f6c260e0

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r4925822.exe

        Filesize

        276KB

        MD5

        555a5900572bcc7f90ba500db7bd1820

        SHA1

        c89897ce52b7c4b2cda8544f5c3680387e01faba

        SHA256

        4cb940f2e77a195b74b29f40128ed22fe4c95c16390422bff367597066bab5cb

        SHA512

        498cc65144efa2167245b529c40639f91fc63fa1bbaec628110efff776570f6d1c93012f0bcd1084e93f9a430ed608b31f81788c87e81f2bf6a162d04188ee8d

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r4925822.exe

        Filesize

        276KB

        MD5

        555a5900572bcc7f90ba500db7bd1820

        SHA1

        c89897ce52b7c4b2cda8544f5c3680387e01faba

        SHA256

        4cb940f2e77a195b74b29f40128ed22fe4c95c16390422bff367597066bab5cb

        SHA512

        498cc65144efa2167245b529c40639f91fc63fa1bbaec628110efff776570f6d1c93012f0bcd1084e93f9a430ed608b31f81788c87e81f2bf6a162d04188ee8d

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r4925822.exe

        Filesize

        276KB

        MD5

        555a5900572bcc7f90ba500db7bd1820

        SHA1

        c89897ce52b7c4b2cda8544f5c3680387e01faba

        SHA256

        4cb940f2e77a195b74b29f40128ed22fe4c95c16390422bff367597066bab5cb

        SHA512

        498cc65144efa2167245b529c40639f91fc63fa1bbaec628110efff776570f6d1c93012f0bcd1084e93f9a430ed608b31f81788c87e81f2bf6a162d04188ee8d

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r4925822.exe

        Filesize

        276KB

        MD5

        555a5900572bcc7f90ba500db7bd1820

        SHA1

        c89897ce52b7c4b2cda8544f5c3680387e01faba

        SHA256

        4cb940f2e77a195b74b29f40128ed22fe4c95c16390422bff367597066bab5cb

        SHA512

        498cc65144efa2167245b529c40639f91fc63fa1bbaec628110efff776570f6d1c93012f0bcd1084e93f9a430ed608b31f81788c87e81f2bf6a162d04188ee8d

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r4925822.exe

        Filesize

        276KB

        MD5

        555a5900572bcc7f90ba500db7bd1820

        SHA1

        c89897ce52b7c4b2cda8544f5c3680387e01faba

        SHA256

        4cb940f2e77a195b74b29f40128ed22fe4c95c16390422bff367597066bab5cb

        SHA512

        498cc65144efa2167245b529c40639f91fc63fa1bbaec628110efff776570f6d1c93012f0bcd1084e93f9a430ed608b31f81788c87e81f2bf6a162d04188ee8d

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r4925822.exe

        Filesize

        276KB

        MD5

        555a5900572bcc7f90ba500db7bd1820

        SHA1

        c89897ce52b7c4b2cda8544f5c3680387e01faba

        SHA256

        4cb940f2e77a195b74b29f40128ed22fe4c95c16390422bff367597066bab5cb

        SHA512

        498cc65144efa2167245b529c40639f91fc63fa1bbaec628110efff776570f6d1c93012f0bcd1084e93f9a430ed608b31f81788c87e81f2bf6a162d04188ee8d

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r4925822.exe

        Filesize

        276KB

        MD5

        555a5900572bcc7f90ba500db7bd1820

        SHA1

        c89897ce52b7c4b2cda8544f5c3680387e01faba

        SHA256

        4cb940f2e77a195b74b29f40128ed22fe4c95c16390422bff367597066bab5cb

        SHA512

        498cc65144efa2167245b529c40639f91fc63fa1bbaec628110efff776570f6d1c93012f0bcd1084e93f9a430ed608b31f81788c87e81f2bf6a162d04188ee8d

      • memory/2572-62-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2572-61-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2572-63-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2572-64-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2572-65-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2572-66-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2572-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

        Filesize

        4KB

      • memory/2572-68-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2572-70-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2572-72-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2796-51-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

        Filesize

        9.9MB

      • memory/2796-50-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

        Filesize

        9.9MB

      • memory/2796-49-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

        Filesize

        9.9MB

      • memory/2796-48-0x0000000000180000-0x000000000018A000-memory.dmp

        Filesize

        40KB