Analysis

  • max time kernel
    168s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 06:28

General

  • Target

    RapeLay.exe

  • Size

    40.0MB

  • MD5

    7e55060259826a2e7dfee398bd4d7967

  • SHA1

    5c63ef51411f38ecdf57dd08d17a14c783f4a6bf

  • SHA256

    792fbb40f785c5b0036351061fffdc52da4313a44df5cae2599d9ab09912e15a

  • SHA512

    570bdb47699f6f0a6ea6c582912339360c70a8b9b043edb2bb59a58fa1dfb5474f14f387464815c4b3e459c57b0cb2326c72a8dd701d68ecaa36b728df6fed50

  • SSDEEP

    786432:VnH60LGTVMaIHuu7/JKq8FueSZa6UUxKe61Hqmmke+EgCjpAv0sfdlNWIan0:h6wGTmtH9JKq8FuRlUa6HqKeRuT1f3+0

Score
5/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RapeLay.exe
    "C:\Users\Admin\AppData\Local\Temp\RapeLay.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3240
    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\VLTD App Executable.exe
      "C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\VLTD App Executable.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\VLTD App Executable.exe
        "C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\VLTD App Executable.exe" --type=gpu-process --field-trial-handle=1840,12656749937173507009,9972415535527682297,131072 --disable-features=LayoutNG,SpareRendererForSitePerProcess --gpu-preferences=IAAAAAAAAADgAAAgAAAAAAAAYAAAAAAACAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAABQAAABAAAAAAAAAAAAAAAAYAAAAQAAAAAAAAAAEAAAAFAAAAEAAAAAAAAAABAAAABgAAAA== --service-request-channel-token=5721649235525286520 --mojo-platform-channel-handle=1848 --ignored=" --type=renderer " /prefetch:2
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:4796
      • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\VLTD App Executable.exe
        "C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\VLTD App Executable.exe" --type=renderer --field-trial-handle=1840,12656749937173507009,9972415535527682297,131072 --disable-features=LayoutNG,SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\resources\app.asar" --node-integration --no-sandbox --no-zygote --background-color=#fff --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --service-request-channel-token=14421038330877986736 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2120 /prefetch:1
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:4908
      • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\VLTD App Executable.exe
        "C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\VLTD App Executable.exe" --type=gpu-process --field-trial-handle=1840,12656749937173507009,9972415535527682297,131072 --disable-features=LayoutNG,SpareRendererForSitePerProcess --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=IAAAAAAAAADgAAAgAAAAAAAAYAAAAAAACAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAABQAAABAAAAAAAAAAAAAAAAYAAAAQAAAAAAAAAAEAAAAFAAAAEAAAAAAAAAABAAAABgAAAA== --service-request-channel-token=2344179458887157697 --mojo-platform-channel-handle=2564 /prefetch:2
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:2724
  • C:\Windows\System32\CompPkgSrv.exe
    C:\Windows\System32\CompPkgSrv.exe -Embedding
    1⤵
      PID:4540

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\D3DCompiler_47.dll

      Filesize

      4.3MB

      MD5

      6b5bb94b78cf044771f32fb2c3981218

      SHA1

      ad151bb649205fb93d91dbd87d13066ae60c64b6

      SHA256

      68c188cc4ac779677b72948cc5613b537023f51139754a510e5e7337fd09142f

      SHA512

      ff8fb15d68effc34bbb020aa188c7ade4426d249356266c8ac540bba4ccdb82e941dfb9c02a661f9e755ff5ce5df0737b257b97ced434f5ae6fdb9420760eb94

    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\VLTD App Executable.exe

      Filesize

      95.6MB

      MD5

      dec072b6951615021f304118eee5c31e

      SHA1

      119453b0f0045c8bb6ff2792a190d77024dd992d

      SHA256

      134bc86ac53d5a7512971d67611372ef5f9e7ae9da5e31d62463911ee9138c79

      SHA512

      c1f052804d897c2924d8fb25455227b3a5bd00c1536808cec4f78e2411476f66128eb38bc9628a513c2549db0f8711640a0ce50b7eb4b9f77d0b328befcbf5e5

    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\VLTD App Executable.exe

      Filesize

      95.6MB

      MD5

      dec072b6951615021f304118eee5c31e

      SHA1

      119453b0f0045c8bb6ff2792a190d77024dd992d

      SHA256

      134bc86ac53d5a7512971d67611372ef5f9e7ae9da5e31d62463911ee9138c79

      SHA512

      c1f052804d897c2924d8fb25455227b3a5bd00c1536808cec4f78e2411476f66128eb38bc9628a513c2549db0f8711640a0ce50b7eb4b9f77d0b328befcbf5e5

    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\VLTD App Executable.exe

      Filesize

      95.6MB

      MD5

      dec072b6951615021f304118eee5c31e

      SHA1

      119453b0f0045c8bb6ff2792a190d77024dd992d

      SHA256

      134bc86ac53d5a7512971d67611372ef5f9e7ae9da5e31d62463911ee9138c79

      SHA512

      c1f052804d897c2924d8fb25455227b3a5bd00c1536808cec4f78e2411476f66128eb38bc9628a513c2549db0f8711640a0ce50b7eb4b9f77d0b328befcbf5e5

    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\VLTD App Executable.exe

      Filesize

      95.6MB

      MD5

      dec072b6951615021f304118eee5c31e

      SHA1

      119453b0f0045c8bb6ff2792a190d77024dd992d

      SHA256

      134bc86ac53d5a7512971d67611372ef5f9e7ae9da5e31d62463911ee9138c79

      SHA512

      c1f052804d897c2924d8fb25455227b3a5bd00c1536808cec4f78e2411476f66128eb38bc9628a513c2549db0f8711640a0ce50b7eb4b9f77d0b328befcbf5e5

    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\VLTD App Executable.exe

      Filesize

      95.6MB

      MD5

      dec072b6951615021f304118eee5c31e

      SHA1

      119453b0f0045c8bb6ff2792a190d77024dd992d

      SHA256

      134bc86ac53d5a7512971d67611372ef5f9e7ae9da5e31d62463911ee9138c79

      SHA512

      c1f052804d897c2924d8fb25455227b3a5bd00c1536808cec4f78e2411476f66128eb38bc9628a513c2549db0f8711640a0ce50b7eb4b9f77d0b328befcbf5e5

    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\chrome_100_percent.pak

      Filesize

      142KB

      MD5

      8d56d44c318d122f7931d03ba435f00b

      SHA1

      387f530e06f79a2a9f7fbf4446c71c31db08e7e0

      SHA256

      fcb4faaa82d13d90c42dfa0669f67391b3124d30310d0f4c510f31412974cab2

      SHA512

      03bd2f56f73ad06fe22ebd94fb0de4e37d1771f8a9d82a47ea93002ba4696d906b59d0e25db63e98af10a169a8c3dc9d047cfcbca01030924bf93abe7bce1590

    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\chrome_200_percent.pak

      Filesize

      204KB

      MD5

      879f88cafa5714994744bde20e7bd2c2

      SHA1

      d63b55f9f7c0e40f9585cac8a5cb28c0ea9f32ee

      SHA256

      76126341d0dc2b4b6ddccf30559709e6a856cd47148107808bd18ceb16ed1df3

      SHA512

      4d70ae16c2656cf3a8aaad00e2ce0ddcc030bf1ad29bbb1d0e90c03f866c413f893b273b8b03aa12c9ea5ae01537ad1d2d1b2c52b35bf7773278121a09a3af9c

    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\d3dcompiler_47.dll

      Filesize

      4.3MB

      MD5

      6b5bb94b78cf044771f32fb2c3981218

      SHA1

      ad151bb649205fb93d91dbd87d13066ae60c64b6

      SHA256

      68c188cc4ac779677b72948cc5613b537023f51139754a510e5e7337fd09142f

      SHA512

      ff8fb15d68effc34bbb020aa188c7ade4426d249356266c8ac540bba4ccdb82e941dfb9c02a661f9e755ff5ce5df0737b257b97ced434f5ae6fdb9420760eb94

    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\ffmpeg.dll

      Filesize

      2.0MB

      MD5

      96299c1f15b403ae10beea4fa1bbb12a

      SHA1

      60acde85f2f6742d95479c76405f1138494a8f1b

      SHA256

      732429461be97b6968d34f7c1dc4f58e31cff5f009ea1bca8f4564ef49b16b3d

      SHA512

      8a1e8551e244784b022bb1f218752cb47edfe15a453cf9fe2cd1a00c82703bc737bd481d3c316c3580b178d8dbeab63e938226b8eb586ce3621d0a4690d3d199

    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\ffmpeg.dll

      Filesize

      2.0MB

      MD5

      96299c1f15b403ae10beea4fa1bbb12a

      SHA1

      60acde85f2f6742d95479c76405f1138494a8f1b

      SHA256

      732429461be97b6968d34f7c1dc4f58e31cff5f009ea1bca8f4564ef49b16b3d

      SHA512

      8a1e8551e244784b022bb1f218752cb47edfe15a453cf9fe2cd1a00c82703bc737bd481d3c316c3580b178d8dbeab63e938226b8eb586ce3621d0a4690d3d199

    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\ffmpeg.dll

      Filesize

      2.0MB

      MD5

      96299c1f15b403ae10beea4fa1bbb12a

      SHA1

      60acde85f2f6742d95479c76405f1138494a8f1b

      SHA256

      732429461be97b6968d34f7c1dc4f58e31cff5f009ea1bca8f4564ef49b16b3d

      SHA512

      8a1e8551e244784b022bb1f218752cb47edfe15a453cf9fe2cd1a00c82703bc737bd481d3c316c3580b178d8dbeab63e938226b8eb586ce3621d0a4690d3d199

    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\ffmpeg.dll

      Filesize

      2.0MB

      MD5

      96299c1f15b403ae10beea4fa1bbb12a

      SHA1

      60acde85f2f6742d95479c76405f1138494a8f1b

      SHA256

      732429461be97b6968d34f7c1dc4f58e31cff5f009ea1bca8f4564ef49b16b3d

      SHA512

      8a1e8551e244784b022bb1f218752cb47edfe15a453cf9fe2cd1a00c82703bc737bd481d3c316c3580b178d8dbeab63e938226b8eb586ce3621d0a4690d3d199

    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\ffmpeg.dll

      Filesize

      2.0MB

      MD5

      96299c1f15b403ae10beea4fa1bbb12a

      SHA1

      60acde85f2f6742d95479c76405f1138494a8f1b

      SHA256

      732429461be97b6968d34f7c1dc4f58e31cff5f009ea1bca8f4564ef49b16b3d

      SHA512

      8a1e8551e244784b022bb1f218752cb47edfe15a453cf9fe2cd1a00c82703bc737bd481d3c316c3580b178d8dbeab63e938226b8eb586ce3621d0a4690d3d199

    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\icudtl.dat

      Filesize

      9.9MB

      MD5

      4c8a9e9c260dc5a6fee2a3c37520f5bf

      SHA1

      5a9883dbeb5314a98e7ab5326f9868e78ba387dc

      SHA256

      8c2df1f6e2ea8df2e5fc5e4b016b0cddd64a7ce6985189ca45be3c0ec99472c2

      SHA512

      c0da0b08a0b0eaa898f96c6e6c6fb65bc7f773f5814fc0d612a40e2fcaea4049c67cd2812716a564dbc16d609677ee62eaa9f9747d2a7bc5c9bce43cd2208aa7

    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\locales\en-US.pak

      Filesize

      69KB

      MD5

      15e8556f737d17bd4d645513ee190990

      SHA1

      a24844d68fe3e9f4c57d14e6091a06f5e6b5f327

      SHA256

      12e4fd083a49e038578ea2993e6c88239083c8d098231527eee861299a4e1c99

      SHA512

      4e5c423b2b14def0e6ebb9c7844bdc050198064c9db69d3a880c1444314211995b1f0dec6fcbb12c6d5e59f690c3ffc893c2265bf7168d1ecbc8d83dfa5e1465

    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\natives_blob.bin

      Filesize

      81KB

      MD5

      f8ac49858ca8739658ff44c296f8aba6

      SHA1

      427b4da3bd619d85381c36d61daf2ce392e07909

      SHA256

      354ff502a0e1ed73df4e5c7b52970356b04777461f6e169f72a8567ab5f4c317

      SHA512

      52e875aedbdc5dad21e01a42e333ff5aefed9ae6468a00e80f2bb373b871196f9a82bc3f43a6c72c9dd6be0e4fbc591d3ede41ca47b23a806b788db5aa9bf313

    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\resources.pak

      Filesize

      8.1MB

      MD5

      978e8122033961585e14c65949d15e11

      SHA1

      3097d04bbcdfc6ff9e0bb52c2d38f6395e4bb631

      SHA256

      a435fa0e07a9124b0d457811de5e2245aeb225ad55ab99186cb665c6ec6e30ef

      SHA512

      5f6706116b7eaec70213f7343cac44eea2dc735de6262524b5508a659b150d8a5ad7f449fec984b45a2e5c170e1cb4feb927a19530c94841f3e6429a2fcaa1c0

    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\resources\app.asar

      Filesize

      11.2MB

      MD5

      be503e444672d3bcda4603da047d83e7

      SHA1

      37bebef8aa249a47647bc6a9df0d5ac31ad2d8a6

      SHA256

      299fd49af796a8b647215d997ff9b6a182edb6cac7752c1bcc8d9524be1046d6

      SHA512

      5a045be53f0f6c4bb156fa97ba3800ba0665852e16479e509352ec95d6826944b32a069048fcf99e726a7f632705ec5027559337fe591bab8b2e6442cb6f50f8

    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\resources\electron.asar

      Filesize

      347KB

      MD5

      1362f92031875676f4b082ff249abe1f

      SHA1

      bc9a9b6b08e28d8a33c5d388662b0fb3535af8ef

      SHA256

      5acf0deb20455487cb0f39cc4c752e7740137ab6adf8c049e62f092174310ca9

      SHA512

      2fc75d23c61b18b0537c0b5d889766fc51ad37b3a283f64c5edfc0c6abeff21123c055410c15f5d9c5945cba204937983409c865816669442ad8b165ab185d90

    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\swiftshader\libEGL.dll

      Filesize

      333KB

      MD5

      9232de137c209d803ab5aee9f9b54d97

      SHA1

      614bfbf9583d61801785f64886a88aac2d3b5dd2

      SHA256

      4d752716e4837aa50f538f2d05bd79edcf829340adadfe1bda7337c0e7dec504

      SHA512

      58b73c6a93f1d2389ba53c33ca7dc801ef74f27a38bcb65d95de31c6125b70a879e02e3553998ffc9f0152fa4b67b24e34bfbb8864b33c4d41bb5e9218a902b7

    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\swiftshader\libGLESv2.dll

      Filesize

      3.7MB

      MD5

      71f7d33b4c9d5e4260d041f0e0fd724e

      SHA1

      e671ed5ad823f798e792094e7ffa413549c52208

      SHA256

      8897c0001374eeec95a38f3e8915c652852f7d5f33151b6bda2a9584c9c2158c

      SHA512

      4c5d3d251d6956d8813c870f8900242318037de09335cdd2382a1c3fd9b2909da8f113394d8fdc71166c0673366c8c8dae4c5d0efb1eeaf26b0fb07bb98256b5

    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\swiftshader\libegl.dll

      Filesize

      333KB

      MD5

      9232de137c209d803ab5aee9f9b54d97

      SHA1

      614bfbf9583d61801785f64886a88aac2d3b5dd2

      SHA256

      4d752716e4837aa50f538f2d05bd79edcf829340adadfe1bda7337c0e7dec504

      SHA512

      58b73c6a93f1d2389ba53c33ca7dc801ef74f27a38bcb65d95de31c6125b70a879e02e3553998ffc9f0152fa4b67b24e34bfbb8864b33c4d41bb5e9218a902b7

    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\swiftshader\libglesv2.dll

      Filesize

      3.7MB

      MD5

      71f7d33b4c9d5e4260d041f0e0fd724e

      SHA1

      e671ed5ad823f798e792094e7ffa413549c52208

      SHA256

      8897c0001374eeec95a38f3e8915c652852f7d5f33151b6bda2a9584c9c2158c

      SHA512

      4c5d3d251d6956d8813c870f8900242318037de09335cdd2382a1c3fd9b2909da8f113394d8fdc71166c0673366c8c8dae4c5d0efb1eeaf26b0fb07bb98256b5

    • C:\Users\Admin\AppData\Local\Temp\1uhIm0y014xPOY57fF8b9rs2C8b\v8_context_snapshot.bin

      Filesize

      685KB

      MD5

      25bee133a55efa9756b25ba25ba3cfa7

      SHA1

      6980de30de3d8e6ae81b4b3a14954ca67f58f9de

      SHA256

      156f90f0a8c6748716428786dca9cb53d1275f4510ebae2be5502f3fd94b7dc1

      SHA512

      c80232eda1bc9a7dc52fac538b99cc9a9805c00b455661bd493c12e620286e1983afe37814b0941d90c9e4be970b63108e1f9428c1a7d6fc5ab083acc0ee2aa6

    • C:\Users\Admin\AppData\Local\Temp\nshB080.tmp\StdUtils.dll

      Filesize

      100KB

      MD5

      c6a6e03f77c313b267498515488c5740

      SHA1

      3d49fc2784b9450962ed6b82b46e9c3c957d7c15

      SHA256

      b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e

      SHA512

      9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

    • C:\Users\Admin\AppData\Local\Temp\nshB080.tmp\System.dll

      Filesize

      12KB

      MD5

      0d7ad4f45dc6f5aa87f606d0331c6901

      SHA1

      48df0911f0484cbe2a8cdd5362140b63c41ee457

      SHA256

      3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

      SHA512

      c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

    • C:\Users\Admin\AppData\Local\Temp\nshB080.tmp\nsis7z.dll

      Filesize

      424KB

      MD5

      80e44ce4895304c6a3a831310fbf8cd0

      SHA1

      36bd49ae21c460be5753a904b4501f1abca53508

      SHA256

      b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592

      SHA512

      c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df

    • memory/4796-190-0x00007FF88B0F0000-0x00007FF88B0F1000-memory.dmp

      Filesize

      4KB

    • memory/4796-211-0x0000023A75D80000-0x0000023A75E2C000-memory.dmp

      Filesize

      688KB