Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 20:50

General

  • Target

    4cdd112fcec3a06ca471941a426b22f59431c210ee3cbbfa42aad61343e63e19.exe

  • Size

    992KB

  • MD5

    a4d7b240c1a9b7b6f807bb3cf4ade2a6

  • SHA1

    c63e9a191d31e713bb2f957c2796f015437f92eb

  • SHA256

    4cdd112fcec3a06ca471941a426b22f59431c210ee3cbbfa42aad61343e63e19

  • SHA512

    4ccb4bdf6a42ab4887f467b43ba43d8fe239218ebd1b21cebd063d47f46631c3ae1cd7f80a559cb55228542317e37b84a5edec808ffd9f0cc3586bbb3a8c75c5

  • SSDEEP

    24576:qyGJq0IrHNWStqsO2s9pPWXGz2HkkhUQKEtg5NPwPWS:xMq1rtWStY2+ph6HzhvKEtg+W

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cdd112fcec3a06ca471941a426b22f59431c210ee3cbbfa42aad61343e63e19.exe
    "C:\Users\Admin\AppData\Local\Temp\4cdd112fcec3a06ca471941a426b22f59431c210ee3cbbfa42aad61343e63e19.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:380
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0709470.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0709470.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5854622.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5854622.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2644
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9282105.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9282105.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2792
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6233666.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6233666.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2764
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3031715.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3031715.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2544
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1648068.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1648068.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1820
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1632
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 268
                  8⤵
                  • Program crash
                  PID:872
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 36
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0709470.exe

    Filesize

    891KB

    MD5

    1f65ab4da30e9b04d84b7915db39f4a1

    SHA1

    f96ec434ae23935d5162ac498cc33345c1da0694

    SHA256

    fcf8b3334a4c5863aa1006ca4674c344f1f39c2ca19a010722671494c14e985b

    SHA512

    a381f4389b98da13e9fc4fe68cf80d059b4e014bbadb1329738717051d9c0fc1b4dc4915354b8cbb5728363e553a891b62522b8e66083ad3bc656d552eaa3af9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0709470.exe

    Filesize

    891KB

    MD5

    1f65ab4da30e9b04d84b7915db39f4a1

    SHA1

    f96ec434ae23935d5162ac498cc33345c1da0694

    SHA256

    fcf8b3334a4c5863aa1006ca4674c344f1f39c2ca19a010722671494c14e985b

    SHA512

    a381f4389b98da13e9fc4fe68cf80d059b4e014bbadb1329738717051d9c0fc1b4dc4915354b8cbb5728363e553a891b62522b8e66083ad3bc656d552eaa3af9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5854622.exe

    Filesize

    709KB

    MD5

    f71f837667812889e57db8b786a0aff0

    SHA1

    d8e6d16463e2bec441ed50cda36966f7022672dc

    SHA256

    ad6b5ffcb6755d42ddd1e043bfd03819ad3302cffcc3952745fe23d39401510e

    SHA512

    3088f89372f7053310a9c0c9ca7f7857d12685a3b3d97bf62c705e32b1cdee036c81bec8e46c773506930b45d82cc8645d3855e7fc1f5f210b8ac996196b8f53

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5854622.exe

    Filesize

    709KB

    MD5

    f71f837667812889e57db8b786a0aff0

    SHA1

    d8e6d16463e2bec441ed50cda36966f7022672dc

    SHA256

    ad6b5ffcb6755d42ddd1e043bfd03819ad3302cffcc3952745fe23d39401510e

    SHA512

    3088f89372f7053310a9c0c9ca7f7857d12685a3b3d97bf62c705e32b1cdee036c81bec8e46c773506930b45d82cc8645d3855e7fc1f5f210b8ac996196b8f53

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9282105.exe

    Filesize

    527KB

    MD5

    78f56ae5dee9a413331cd6702404e8ce

    SHA1

    2f565fa995f2e53f6c700c8ac8e830fa35439d83

    SHA256

    fa71d82a3b1712e0cfeac0f07682a21ac77dcc8f137cbf7533cebf4515dbe7ef

    SHA512

    745250e52bf9a1415178255b758946a2677b39d5f64268cd8318be9961c969cd0212f41bbac19cb0d4854e7381824ad013438592ff626df86df5c51e7c9ecb79

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9282105.exe

    Filesize

    527KB

    MD5

    78f56ae5dee9a413331cd6702404e8ce

    SHA1

    2f565fa995f2e53f6c700c8ac8e830fa35439d83

    SHA256

    fa71d82a3b1712e0cfeac0f07682a21ac77dcc8f137cbf7533cebf4515dbe7ef

    SHA512

    745250e52bf9a1415178255b758946a2677b39d5f64268cd8318be9961c969cd0212f41bbac19cb0d4854e7381824ad013438592ff626df86df5c51e7c9ecb79

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6233666.exe

    Filesize

    296KB

    MD5

    5aef654b484faa27b1663dd681a48aa3

    SHA1

    927481059577b28bfa7990ef927650c22872e903

    SHA256

    16e4f640c04b005f712bb451d0f9156061aef98854ab0b22e00407c425dda9cb

    SHA512

    b91850153ccec3239fd870f9bb42604ab20af8b5314c00999be2dce491f5c8e95e0b7d97040feb8fbc41fc38cc6eee6f6b01cf70dd55b90107b833b786e784f3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6233666.exe

    Filesize

    296KB

    MD5

    5aef654b484faa27b1663dd681a48aa3

    SHA1

    927481059577b28bfa7990ef927650c22872e903

    SHA256

    16e4f640c04b005f712bb451d0f9156061aef98854ab0b22e00407c425dda9cb

    SHA512

    b91850153ccec3239fd870f9bb42604ab20af8b5314c00999be2dce491f5c8e95e0b7d97040feb8fbc41fc38cc6eee6f6b01cf70dd55b90107b833b786e784f3

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3031715.exe

    Filesize

    11KB

    MD5

    ba5afc363bb86d0b1288238fe497d0c8

    SHA1

    edf08b6fd20be6ab8eb76fdd81b1992033d30d25

    SHA256

    25652893318851800c1473c6f4be6e27808926c5e1736a176e93903e5bf9cdfe

    SHA512

    35b4f8885b2fcdff38439ca28ce3bc4ee9eec64f20e4c036e61ca4ab330e8b9965b98247c22ffc25de094ece2fe34f4ec06a5cd7597c4f6d778aa56bd01ab26a

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3031715.exe

    Filesize

    11KB

    MD5

    ba5afc363bb86d0b1288238fe497d0c8

    SHA1

    edf08b6fd20be6ab8eb76fdd81b1992033d30d25

    SHA256

    25652893318851800c1473c6f4be6e27808926c5e1736a176e93903e5bf9cdfe

    SHA512

    35b4f8885b2fcdff38439ca28ce3bc4ee9eec64f20e4c036e61ca4ab330e8b9965b98247c22ffc25de094ece2fe34f4ec06a5cd7597c4f6d778aa56bd01ab26a

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1648068.exe

    Filesize

    276KB

    MD5

    75bb5293eb4a112efd242fdc1ee652a6

    SHA1

    f6bc7886d3288b8dd16a9ccf9df122f0edb637e0

    SHA256

    f4ba030ddff0482c1a86ac362b9528457653b848a24c17c8d477131979ab9466

    SHA512

    59d9bd0084f88b800b2f738b85eee6b328ff33a5c6cfbd4008801c9520278429718e7ef3fee1502ce6534d7ded00b279750421a32e1340fcd9ac73b52df3e7cb

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1648068.exe

    Filesize

    276KB

    MD5

    75bb5293eb4a112efd242fdc1ee652a6

    SHA1

    f6bc7886d3288b8dd16a9ccf9df122f0edb637e0

    SHA256

    f4ba030ddff0482c1a86ac362b9528457653b848a24c17c8d477131979ab9466

    SHA512

    59d9bd0084f88b800b2f738b85eee6b328ff33a5c6cfbd4008801c9520278429718e7ef3fee1502ce6534d7ded00b279750421a32e1340fcd9ac73b52df3e7cb

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1648068.exe

    Filesize

    276KB

    MD5

    75bb5293eb4a112efd242fdc1ee652a6

    SHA1

    f6bc7886d3288b8dd16a9ccf9df122f0edb637e0

    SHA256

    f4ba030ddff0482c1a86ac362b9528457653b848a24c17c8d477131979ab9466

    SHA512

    59d9bd0084f88b800b2f738b85eee6b328ff33a5c6cfbd4008801c9520278429718e7ef3fee1502ce6534d7ded00b279750421a32e1340fcd9ac73b52df3e7cb

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0709470.exe

    Filesize

    891KB

    MD5

    1f65ab4da30e9b04d84b7915db39f4a1

    SHA1

    f96ec434ae23935d5162ac498cc33345c1da0694

    SHA256

    fcf8b3334a4c5863aa1006ca4674c344f1f39c2ca19a010722671494c14e985b

    SHA512

    a381f4389b98da13e9fc4fe68cf80d059b4e014bbadb1329738717051d9c0fc1b4dc4915354b8cbb5728363e553a891b62522b8e66083ad3bc656d552eaa3af9

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0709470.exe

    Filesize

    891KB

    MD5

    1f65ab4da30e9b04d84b7915db39f4a1

    SHA1

    f96ec434ae23935d5162ac498cc33345c1da0694

    SHA256

    fcf8b3334a4c5863aa1006ca4674c344f1f39c2ca19a010722671494c14e985b

    SHA512

    a381f4389b98da13e9fc4fe68cf80d059b4e014bbadb1329738717051d9c0fc1b4dc4915354b8cbb5728363e553a891b62522b8e66083ad3bc656d552eaa3af9

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z5854622.exe

    Filesize

    709KB

    MD5

    f71f837667812889e57db8b786a0aff0

    SHA1

    d8e6d16463e2bec441ed50cda36966f7022672dc

    SHA256

    ad6b5ffcb6755d42ddd1e043bfd03819ad3302cffcc3952745fe23d39401510e

    SHA512

    3088f89372f7053310a9c0c9ca7f7857d12685a3b3d97bf62c705e32b1cdee036c81bec8e46c773506930b45d82cc8645d3855e7fc1f5f210b8ac996196b8f53

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z5854622.exe

    Filesize

    709KB

    MD5

    f71f837667812889e57db8b786a0aff0

    SHA1

    d8e6d16463e2bec441ed50cda36966f7022672dc

    SHA256

    ad6b5ffcb6755d42ddd1e043bfd03819ad3302cffcc3952745fe23d39401510e

    SHA512

    3088f89372f7053310a9c0c9ca7f7857d12685a3b3d97bf62c705e32b1cdee036c81bec8e46c773506930b45d82cc8645d3855e7fc1f5f210b8ac996196b8f53

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z9282105.exe

    Filesize

    527KB

    MD5

    78f56ae5dee9a413331cd6702404e8ce

    SHA1

    2f565fa995f2e53f6c700c8ac8e830fa35439d83

    SHA256

    fa71d82a3b1712e0cfeac0f07682a21ac77dcc8f137cbf7533cebf4515dbe7ef

    SHA512

    745250e52bf9a1415178255b758946a2677b39d5f64268cd8318be9961c969cd0212f41bbac19cb0d4854e7381824ad013438592ff626df86df5c51e7c9ecb79

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z9282105.exe

    Filesize

    527KB

    MD5

    78f56ae5dee9a413331cd6702404e8ce

    SHA1

    2f565fa995f2e53f6c700c8ac8e830fa35439d83

    SHA256

    fa71d82a3b1712e0cfeac0f07682a21ac77dcc8f137cbf7533cebf4515dbe7ef

    SHA512

    745250e52bf9a1415178255b758946a2677b39d5f64268cd8318be9961c969cd0212f41bbac19cb0d4854e7381824ad013438592ff626df86df5c51e7c9ecb79

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6233666.exe

    Filesize

    296KB

    MD5

    5aef654b484faa27b1663dd681a48aa3

    SHA1

    927481059577b28bfa7990ef927650c22872e903

    SHA256

    16e4f640c04b005f712bb451d0f9156061aef98854ab0b22e00407c425dda9cb

    SHA512

    b91850153ccec3239fd870f9bb42604ab20af8b5314c00999be2dce491f5c8e95e0b7d97040feb8fbc41fc38cc6eee6f6b01cf70dd55b90107b833b786e784f3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6233666.exe

    Filesize

    296KB

    MD5

    5aef654b484faa27b1663dd681a48aa3

    SHA1

    927481059577b28bfa7990ef927650c22872e903

    SHA256

    16e4f640c04b005f712bb451d0f9156061aef98854ab0b22e00407c425dda9cb

    SHA512

    b91850153ccec3239fd870f9bb42604ab20af8b5314c00999be2dce491f5c8e95e0b7d97040feb8fbc41fc38cc6eee6f6b01cf70dd55b90107b833b786e784f3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3031715.exe

    Filesize

    11KB

    MD5

    ba5afc363bb86d0b1288238fe497d0c8

    SHA1

    edf08b6fd20be6ab8eb76fdd81b1992033d30d25

    SHA256

    25652893318851800c1473c6f4be6e27808926c5e1736a176e93903e5bf9cdfe

    SHA512

    35b4f8885b2fcdff38439ca28ce3bc4ee9eec64f20e4c036e61ca4ab330e8b9965b98247c22ffc25de094ece2fe34f4ec06a5cd7597c4f6d778aa56bd01ab26a

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r1648068.exe

    Filesize

    276KB

    MD5

    75bb5293eb4a112efd242fdc1ee652a6

    SHA1

    f6bc7886d3288b8dd16a9ccf9df122f0edb637e0

    SHA256

    f4ba030ddff0482c1a86ac362b9528457653b848a24c17c8d477131979ab9466

    SHA512

    59d9bd0084f88b800b2f738b85eee6b328ff33a5c6cfbd4008801c9520278429718e7ef3fee1502ce6534d7ded00b279750421a32e1340fcd9ac73b52df3e7cb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r1648068.exe

    Filesize

    276KB

    MD5

    75bb5293eb4a112efd242fdc1ee652a6

    SHA1

    f6bc7886d3288b8dd16a9ccf9df122f0edb637e0

    SHA256

    f4ba030ddff0482c1a86ac362b9528457653b848a24c17c8d477131979ab9466

    SHA512

    59d9bd0084f88b800b2f738b85eee6b328ff33a5c6cfbd4008801c9520278429718e7ef3fee1502ce6534d7ded00b279750421a32e1340fcd9ac73b52df3e7cb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r1648068.exe

    Filesize

    276KB

    MD5

    75bb5293eb4a112efd242fdc1ee652a6

    SHA1

    f6bc7886d3288b8dd16a9ccf9df122f0edb637e0

    SHA256

    f4ba030ddff0482c1a86ac362b9528457653b848a24c17c8d477131979ab9466

    SHA512

    59d9bd0084f88b800b2f738b85eee6b328ff33a5c6cfbd4008801c9520278429718e7ef3fee1502ce6534d7ded00b279750421a32e1340fcd9ac73b52df3e7cb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r1648068.exe

    Filesize

    276KB

    MD5

    75bb5293eb4a112efd242fdc1ee652a6

    SHA1

    f6bc7886d3288b8dd16a9ccf9df122f0edb637e0

    SHA256

    f4ba030ddff0482c1a86ac362b9528457653b848a24c17c8d477131979ab9466

    SHA512

    59d9bd0084f88b800b2f738b85eee6b328ff33a5c6cfbd4008801c9520278429718e7ef3fee1502ce6534d7ded00b279750421a32e1340fcd9ac73b52df3e7cb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r1648068.exe

    Filesize

    276KB

    MD5

    75bb5293eb4a112efd242fdc1ee652a6

    SHA1

    f6bc7886d3288b8dd16a9ccf9df122f0edb637e0

    SHA256

    f4ba030ddff0482c1a86ac362b9528457653b848a24c17c8d477131979ab9466

    SHA512

    59d9bd0084f88b800b2f738b85eee6b328ff33a5c6cfbd4008801c9520278429718e7ef3fee1502ce6534d7ded00b279750421a32e1340fcd9ac73b52df3e7cb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r1648068.exe

    Filesize

    276KB

    MD5

    75bb5293eb4a112efd242fdc1ee652a6

    SHA1

    f6bc7886d3288b8dd16a9ccf9df122f0edb637e0

    SHA256

    f4ba030ddff0482c1a86ac362b9528457653b848a24c17c8d477131979ab9466

    SHA512

    59d9bd0084f88b800b2f738b85eee6b328ff33a5c6cfbd4008801c9520278429718e7ef3fee1502ce6534d7ded00b279750421a32e1340fcd9ac73b52df3e7cb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r1648068.exe

    Filesize

    276KB

    MD5

    75bb5293eb4a112efd242fdc1ee652a6

    SHA1

    f6bc7886d3288b8dd16a9ccf9df122f0edb637e0

    SHA256

    f4ba030ddff0482c1a86ac362b9528457653b848a24c17c8d477131979ab9466

    SHA512

    59d9bd0084f88b800b2f738b85eee6b328ff33a5c6cfbd4008801c9520278429718e7ef3fee1502ce6534d7ded00b279750421a32e1340fcd9ac73b52df3e7cb

  • memory/1632-61-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1632-62-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1632-65-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1632-66-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1632-64-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1632-63-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1632-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/1632-68-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1632-70-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1632-72-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2544-51-0x000007FEF5400000-0x000007FEF5DEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2544-50-0x000007FEF5400000-0x000007FEF5DEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2544-49-0x000007FEF5400000-0x000007FEF5DEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2544-48-0x0000000000FB0000-0x0000000000FBA000-memory.dmp

    Filesize

    40KB