Analysis

  • max time kernel
    120s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 20:34

General

  • Target

    174e56bf44835ab2ef1ebf316ffd9e8591bd27bd3c5f2b42661040e141a5d1e2.exe

  • Size

    994KB

  • MD5

    32e015a2b687ced3b6d0ce00dd562a41

  • SHA1

    4bc84dd0ff1fdd313a1a2207483102ff28a3742a

  • SHA256

    174e56bf44835ab2ef1ebf316ffd9e8591bd27bd3c5f2b42661040e141a5d1e2

  • SHA512

    de05738dc72ba1ee17e53720b9a1e6a38a5343c1f236201ee848149b37eb7f3d8fc26b78abd3a2708a1c53cf2c3ca0ae4a3138a03495d2d83d53ab2ca1385eb8

  • SSDEEP

    24576:oy3FZ/thXd23SpgKv5+Fxzt1UuxJePB8HG6:v3XHk/68TzQuxJuB8

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\174e56bf44835ab2ef1ebf316ffd9e8591bd27bd3c5f2b42661040e141a5d1e2.exe
    "C:\Users\Admin\AppData\Local\Temp\174e56bf44835ab2ef1ebf316ffd9e8591bd27bd3c5f2b42661040e141a5d1e2.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3560817.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3560817.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2938605.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2938605.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2736
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2727794.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2727794.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2612
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8439962.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8439962.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2660
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9944549.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9944549.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2824
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2236804.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2236804.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:780
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1504
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 268
                  8⤵
                  • Program crash
                  PID:2556
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 780 -s 36
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3560817.exe

    Filesize

    892KB

    MD5

    8f4c4cd9dea78070268d2e3529a6c9fe

    SHA1

    8662d9d75d9424666c115ed6c1ed2799f28b09fd

    SHA256

    19321addea70bbc5479e48168924899b5dcbece1f38325178cb658f31a9fa778

    SHA512

    ee11565f2c6673b7dfa52f59219e4b2c64751d60b230218f3203e7dfe5d860a8b283fdd6274dfa59d1ee30b3054697d1dad40712f58e7a73b8e923e984040b5e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3560817.exe

    Filesize

    892KB

    MD5

    8f4c4cd9dea78070268d2e3529a6c9fe

    SHA1

    8662d9d75d9424666c115ed6c1ed2799f28b09fd

    SHA256

    19321addea70bbc5479e48168924899b5dcbece1f38325178cb658f31a9fa778

    SHA512

    ee11565f2c6673b7dfa52f59219e4b2c64751d60b230218f3203e7dfe5d860a8b283fdd6274dfa59d1ee30b3054697d1dad40712f58e7a73b8e923e984040b5e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2938605.exe

    Filesize

    709KB

    MD5

    777fda121dc2c05dac6a859bef06fd9f

    SHA1

    45c5e60ba4b6560538655f6bf9d26c9ec7f7b990

    SHA256

    94ef91901cfbee6934713ef56318496400db0d285c4116a2d88067be037d3077

    SHA512

    71f6cbbceefa5c6b3b189bb01be9cfcfdb7198a6a030fb424da2dd0048fb85d7d10947dddc45a75a277a2806bc36644e05b49ff4202cb974df0d85fbc4dcb349

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2938605.exe

    Filesize

    709KB

    MD5

    777fda121dc2c05dac6a859bef06fd9f

    SHA1

    45c5e60ba4b6560538655f6bf9d26c9ec7f7b990

    SHA256

    94ef91901cfbee6934713ef56318496400db0d285c4116a2d88067be037d3077

    SHA512

    71f6cbbceefa5c6b3b189bb01be9cfcfdb7198a6a030fb424da2dd0048fb85d7d10947dddc45a75a277a2806bc36644e05b49ff4202cb974df0d85fbc4dcb349

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2727794.exe

    Filesize

    526KB

    MD5

    8338993f9102c776262f057ca8ee9ad3

    SHA1

    46fde7d02b32d4a14fb50399453b08761905c621

    SHA256

    f0897e28d56dc3c6829ab8c4a35493db94daeb97a9490f95c7d75fb1cc12e6c6

    SHA512

    8a2156fe2e4b916f11f8bae6b545b304472ea3141e68a3ee54c1ca49b2faeeccc415ae4276bf4d08291814aff3fe5ab8d0c2ef07474f2c90ea8b69726a40b457

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2727794.exe

    Filesize

    526KB

    MD5

    8338993f9102c776262f057ca8ee9ad3

    SHA1

    46fde7d02b32d4a14fb50399453b08761905c621

    SHA256

    f0897e28d56dc3c6829ab8c4a35493db94daeb97a9490f95c7d75fb1cc12e6c6

    SHA512

    8a2156fe2e4b916f11f8bae6b545b304472ea3141e68a3ee54c1ca49b2faeeccc415ae4276bf4d08291814aff3fe5ab8d0c2ef07474f2c90ea8b69726a40b457

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8439962.exe

    Filesize

    296KB

    MD5

    fa338af5f5b5ac1cadf87a93bde0efb7

    SHA1

    8da1e51856c3fe9a32e19bfb0e8308b567b526cc

    SHA256

    4f9cdd5df77cfbba55deb15a25f28fbb539b3a7c8e94d8a8769b5ad05e988ea3

    SHA512

    045a7b4eb8ccd6ed819d38b65056d287b0eaa747e332ac8ad603eeede8ce8d0b3e3a2adea63c692a1a3e5699ea065445bd8125e2adbf8b13308a298e24f9790e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8439962.exe

    Filesize

    296KB

    MD5

    fa338af5f5b5ac1cadf87a93bde0efb7

    SHA1

    8da1e51856c3fe9a32e19bfb0e8308b567b526cc

    SHA256

    4f9cdd5df77cfbba55deb15a25f28fbb539b3a7c8e94d8a8769b5ad05e988ea3

    SHA512

    045a7b4eb8ccd6ed819d38b65056d287b0eaa747e332ac8ad603eeede8ce8d0b3e3a2adea63c692a1a3e5699ea065445bd8125e2adbf8b13308a298e24f9790e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9944549.exe

    Filesize

    11KB

    MD5

    cb3f3a4d067169ce76c05db6de8ee8bd

    SHA1

    96ddcc0df2e979c6306c57689eddcc0dd5acbe10

    SHA256

    61fbd77ed4a94b1888a04324b477e70d8a347d361862f743921a0ab81ae3d802

    SHA512

    6f48dc353b47084c4c9a5b5d2d8a1dca41f497bc64b22c98fb9390998a39060258ffae154bb3e765e313475c7f6aef63226870b8f3407278cd71a59d8ea080c4

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9944549.exe

    Filesize

    11KB

    MD5

    cb3f3a4d067169ce76c05db6de8ee8bd

    SHA1

    96ddcc0df2e979c6306c57689eddcc0dd5acbe10

    SHA256

    61fbd77ed4a94b1888a04324b477e70d8a347d361862f743921a0ab81ae3d802

    SHA512

    6f48dc353b47084c4c9a5b5d2d8a1dca41f497bc64b22c98fb9390998a39060258ffae154bb3e765e313475c7f6aef63226870b8f3407278cd71a59d8ea080c4

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2236804.exe

    Filesize

    276KB

    MD5

    8821f3fdb6c4e06871bb3a4e4ac83492

    SHA1

    707c070a44bb747aa9e40156899a2b3a396797be

    SHA256

    1f41754a4416206cd608f89ea14631d287e54d3e7d9fff8d3f7fb2510878a98a

    SHA512

    d542aa865bc50105746beb39acb8ac63a307d328442c47ec97706527f6abeef1ff731ba9ced77d105b30f109da395e8311c51b78279de34c0174876ae053edf7

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2236804.exe

    Filesize

    276KB

    MD5

    8821f3fdb6c4e06871bb3a4e4ac83492

    SHA1

    707c070a44bb747aa9e40156899a2b3a396797be

    SHA256

    1f41754a4416206cd608f89ea14631d287e54d3e7d9fff8d3f7fb2510878a98a

    SHA512

    d542aa865bc50105746beb39acb8ac63a307d328442c47ec97706527f6abeef1ff731ba9ced77d105b30f109da395e8311c51b78279de34c0174876ae053edf7

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2236804.exe

    Filesize

    276KB

    MD5

    8821f3fdb6c4e06871bb3a4e4ac83492

    SHA1

    707c070a44bb747aa9e40156899a2b3a396797be

    SHA256

    1f41754a4416206cd608f89ea14631d287e54d3e7d9fff8d3f7fb2510878a98a

    SHA512

    d542aa865bc50105746beb39acb8ac63a307d328442c47ec97706527f6abeef1ff731ba9ced77d105b30f109da395e8311c51b78279de34c0174876ae053edf7

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3560817.exe

    Filesize

    892KB

    MD5

    8f4c4cd9dea78070268d2e3529a6c9fe

    SHA1

    8662d9d75d9424666c115ed6c1ed2799f28b09fd

    SHA256

    19321addea70bbc5479e48168924899b5dcbece1f38325178cb658f31a9fa778

    SHA512

    ee11565f2c6673b7dfa52f59219e4b2c64751d60b230218f3203e7dfe5d860a8b283fdd6274dfa59d1ee30b3054697d1dad40712f58e7a73b8e923e984040b5e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3560817.exe

    Filesize

    892KB

    MD5

    8f4c4cd9dea78070268d2e3529a6c9fe

    SHA1

    8662d9d75d9424666c115ed6c1ed2799f28b09fd

    SHA256

    19321addea70bbc5479e48168924899b5dcbece1f38325178cb658f31a9fa778

    SHA512

    ee11565f2c6673b7dfa52f59219e4b2c64751d60b230218f3203e7dfe5d860a8b283fdd6274dfa59d1ee30b3054697d1dad40712f58e7a73b8e923e984040b5e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2938605.exe

    Filesize

    709KB

    MD5

    777fda121dc2c05dac6a859bef06fd9f

    SHA1

    45c5e60ba4b6560538655f6bf9d26c9ec7f7b990

    SHA256

    94ef91901cfbee6934713ef56318496400db0d285c4116a2d88067be037d3077

    SHA512

    71f6cbbceefa5c6b3b189bb01be9cfcfdb7198a6a030fb424da2dd0048fb85d7d10947dddc45a75a277a2806bc36644e05b49ff4202cb974df0d85fbc4dcb349

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2938605.exe

    Filesize

    709KB

    MD5

    777fda121dc2c05dac6a859bef06fd9f

    SHA1

    45c5e60ba4b6560538655f6bf9d26c9ec7f7b990

    SHA256

    94ef91901cfbee6934713ef56318496400db0d285c4116a2d88067be037d3077

    SHA512

    71f6cbbceefa5c6b3b189bb01be9cfcfdb7198a6a030fb424da2dd0048fb85d7d10947dddc45a75a277a2806bc36644e05b49ff4202cb974df0d85fbc4dcb349

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z2727794.exe

    Filesize

    526KB

    MD5

    8338993f9102c776262f057ca8ee9ad3

    SHA1

    46fde7d02b32d4a14fb50399453b08761905c621

    SHA256

    f0897e28d56dc3c6829ab8c4a35493db94daeb97a9490f95c7d75fb1cc12e6c6

    SHA512

    8a2156fe2e4b916f11f8bae6b545b304472ea3141e68a3ee54c1ca49b2faeeccc415ae4276bf4d08291814aff3fe5ab8d0c2ef07474f2c90ea8b69726a40b457

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z2727794.exe

    Filesize

    526KB

    MD5

    8338993f9102c776262f057ca8ee9ad3

    SHA1

    46fde7d02b32d4a14fb50399453b08761905c621

    SHA256

    f0897e28d56dc3c6829ab8c4a35493db94daeb97a9490f95c7d75fb1cc12e6c6

    SHA512

    8a2156fe2e4b916f11f8bae6b545b304472ea3141e68a3ee54c1ca49b2faeeccc415ae4276bf4d08291814aff3fe5ab8d0c2ef07474f2c90ea8b69726a40b457

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8439962.exe

    Filesize

    296KB

    MD5

    fa338af5f5b5ac1cadf87a93bde0efb7

    SHA1

    8da1e51856c3fe9a32e19bfb0e8308b567b526cc

    SHA256

    4f9cdd5df77cfbba55deb15a25f28fbb539b3a7c8e94d8a8769b5ad05e988ea3

    SHA512

    045a7b4eb8ccd6ed819d38b65056d287b0eaa747e332ac8ad603eeede8ce8d0b3e3a2adea63c692a1a3e5699ea065445bd8125e2adbf8b13308a298e24f9790e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8439962.exe

    Filesize

    296KB

    MD5

    fa338af5f5b5ac1cadf87a93bde0efb7

    SHA1

    8da1e51856c3fe9a32e19bfb0e8308b567b526cc

    SHA256

    4f9cdd5df77cfbba55deb15a25f28fbb539b3a7c8e94d8a8769b5ad05e988ea3

    SHA512

    045a7b4eb8ccd6ed819d38b65056d287b0eaa747e332ac8ad603eeede8ce8d0b3e3a2adea63c692a1a3e5699ea065445bd8125e2adbf8b13308a298e24f9790e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9944549.exe

    Filesize

    11KB

    MD5

    cb3f3a4d067169ce76c05db6de8ee8bd

    SHA1

    96ddcc0df2e979c6306c57689eddcc0dd5acbe10

    SHA256

    61fbd77ed4a94b1888a04324b477e70d8a347d361862f743921a0ab81ae3d802

    SHA512

    6f48dc353b47084c4c9a5b5d2d8a1dca41f497bc64b22c98fb9390998a39060258ffae154bb3e765e313475c7f6aef63226870b8f3407278cd71a59d8ea080c4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2236804.exe

    Filesize

    276KB

    MD5

    8821f3fdb6c4e06871bb3a4e4ac83492

    SHA1

    707c070a44bb747aa9e40156899a2b3a396797be

    SHA256

    1f41754a4416206cd608f89ea14631d287e54d3e7d9fff8d3f7fb2510878a98a

    SHA512

    d542aa865bc50105746beb39acb8ac63a307d328442c47ec97706527f6abeef1ff731ba9ced77d105b30f109da395e8311c51b78279de34c0174876ae053edf7

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2236804.exe

    Filesize

    276KB

    MD5

    8821f3fdb6c4e06871bb3a4e4ac83492

    SHA1

    707c070a44bb747aa9e40156899a2b3a396797be

    SHA256

    1f41754a4416206cd608f89ea14631d287e54d3e7d9fff8d3f7fb2510878a98a

    SHA512

    d542aa865bc50105746beb39acb8ac63a307d328442c47ec97706527f6abeef1ff731ba9ced77d105b30f109da395e8311c51b78279de34c0174876ae053edf7

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2236804.exe

    Filesize

    276KB

    MD5

    8821f3fdb6c4e06871bb3a4e4ac83492

    SHA1

    707c070a44bb747aa9e40156899a2b3a396797be

    SHA256

    1f41754a4416206cd608f89ea14631d287e54d3e7d9fff8d3f7fb2510878a98a

    SHA512

    d542aa865bc50105746beb39acb8ac63a307d328442c47ec97706527f6abeef1ff731ba9ced77d105b30f109da395e8311c51b78279de34c0174876ae053edf7

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2236804.exe

    Filesize

    276KB

    MD5

    8821f3fdb6c4e06871bb3a4e4ac83492

    SHA1

    707c070a44bb747aa9e40156899a2b3a396797be

    SHA256

    1f41754a4416206cd608f89ea14631d287e54d3e7d9fff8d3f7fb2510878a98a

    SHA512

    d542aa865bc50105746beb39acb8ac63a307d328442c47ec97706527f6abeef1ff731ba9ced77d105b30f109da395e8311c51b78279de34c0174876ae053edf7

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2236804.exe

    Filesize

    276KB

    MD5

    8821f3fdb6c4e06871bb3a4e4ac83492

    SHA1

    707c070a44bb747aa9e40156899a2b3a396797be

    SHA256

    1f41754a4416206cd608f89ea14631d287e54d3e7d9fff8d3f7fb2510878a98a

    SHA512

    d542aa865bc50105746beb39acb8ac63a307d328442c47ec97706527f6abeef1ff731ba9ced77d105b30f109da395e8311c51b78279de34c0174876ae053edf7

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2236804.exe

    Filesize

    276KB

    MD5

    8821f3fdb6c4e06871bb3a4e4ac83492

    SHA1

    707c070a44bb747aa9e40156899a2b3a396797be

    SHA256

    1f41754a4416206cd608f89ea14631d287e54d3e7d9fff8d3f7fb2510878a98a

    SHA512

    d542aa865bc50105746beb39acb8ac63a307d328442c47ec97706527f6abeef1ff731ba9ced77d105b30f109da395e8311c51b78279de34c0174876ae053edf7

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2236804.exe

    Filesize

    276KB

    MD5

    8821f3fdb6c4e06871bb3a4e4ac83492

    SHA1

    707c070a44bb747aa9e40156899a2b3a396797be

    SHA256

    1f41754a4416206cd608f89ea14631d287e54d3e7d9fff8d3f7fb2510878a98a

    SHA512

    d542aa865bc50105746beb39acb8ac63a307d328442c47ec97706527f6abeef1ff731ba9ced77d105b30f109da395e8311c51b78279de34c0174876ae053edf7

  • memory/1504-62-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1504-61-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1504-63-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1504-65-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1504-64-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1504-68-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1504-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/1504-66-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1504-70-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1504-72-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2824-51-0x000007FEF5030000-0x000007FEF5A1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2824-50-0x000007FEF5030000-0x000007FEF5A1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2824-49-0x000007FEF5030000-0x000007FEF5A1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2824-48-0x0000000000E50000-0x0000000000E5A000-memory.dmp

    Filesize

    40KB