Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 14:11

General

  • Target

    ce8141764d0fe24260b72481084805f24c2b5743a03919aec543bc2b72d3c59b.exe

  • Size

    1.3MB

  • MD5

    8e8d7096df65d94b02acdc011a664d5a

  • SHA1

    d30da133e8735b797963b793c7892ee192be23de

  • SHA256

    ce8141764d0fe24260b72481084805f24c2b5743a03919aec543bc2b72d3c59b

  • SHA512

    9101c09f11dafc2f71953997f013ea8abe9e10a43f437fe6a4ef26f6b4ed37441ae85c55792b20bf99487a5b65343e3fc082602758790ad0d2fc35635d95555f

  • SSDEEP

    24576:GyzJeTXDe+PJs+m8SLYuAjfg0bULq3IpBnnpD0wY68J8HbJ/FtQ4bzPPDYcR:VzJerDXPJsqJuAjfg0gLq3IvJRl/Ft1j

Malware Config

Extracted

Family

redline

Botnet

darts

C2

77.91.124.82:19071

Attributes
  • auth_value

    3c8818da7045365845f15ec0946ebf11

Extracted

Family

redline

Botnet

kendo

C2

77.91.124.82:19071

Attributes
  • auth_value

    5a22a881561d49941415902859b51f14

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 10 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce8141764d0fe24260b72481084805f24c2b5743a03919aec543bc2b72d3c59b.exe
    "C:\Users\Admin\AppData\Local\Temp\ce8141764d0fe24260b72481084805f24c2b5743a03919aec543bc2b72d3c59b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3784
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5186576.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5186576.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2720
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8889412.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8889412.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3732
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4453593.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4453593.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3064
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4759311.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4759311.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:3944
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v8632504.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v8632504.exe
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:3768
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a6273483.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a6273483.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:5060
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                    PID:1624
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    8⤵
                    • Modifies Windows Defender Real-time Protection settings
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1484
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 556
                    8⤵
                    • Program crash
                    PID:1128
                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b6983880.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b6983880.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:2824
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    8⤵
                      PID:3824
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 3824 -s 540
                        9⤵
                        • Program crash
                        PID:1948
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 564
                      8⤵
                      • Program crash
                      PID:2104
                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c6755582.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c6755582.exe
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:2116
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    7⤵
                      PID:2920
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 184
                      7⤵
                      • Program crash
                      PID:3112
                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d2897441.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d2897441.exe
                  5⤵
                  • Executes dropped EXE
                  PID:1196
              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e4438520.exe
                C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e4438520.exe
                4⤵
                • Executes dropped EXE
                PID:2544
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5060 -ip 5060
          1⤵
            PID:5036
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2824 -ip 2824
            1⤵
              PID:2680
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3824 -ip 3824
              1⤵
                PID:2312
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2116 -ip 2116
                1⤵
                  PID:4388

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5186576.exe

                  Filesize

                  1.2MB

                  MD5

                  58b8f7ecf9d0a3a289221e1c5233def4

                  SHA1

                  f0c9e29027abcca6dd91d51d696f11aeb0943c8f

                  SHA256

                  76f00d21ca61af3776f6fd2f7f551e43db412bf6ef9ed3556a3f768c69b7a586

                  SHA512

                  26ef68788e3fd6dd7e6f534f32e222cfd4144f7fcf8ce4fe752b5eacf669fdc3d9d27f94f6be6826b0db7076c99cae727cd8bef54d2b47794bb1d2d504a5d50d

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5186576.exe

                  Filesize

                  1.2MB

                  MD5

                  58b8f7ecf9d0a3a289221e1c5233def4

                  SHA1

                  f0c9e29027abcca6dd91d51d696f11aeb0943c8f

                  SHA256

                  76f00d21ca61af3776f6fd2f7f551e43db412bf6ef9ed3556a3f768c69b7a586

                  SHA512

                  26ef68788e3fd6dd7e6f534f32e222cfd4144f7fcf8ce4fe752b5eacf669fdc3d9d27f94f6be6826b0db7076c99cae727cd8bef54d2b47794bb1d2d504a5d50d

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8889412.exe

                  Filesize

                  953KB

                  MD5

                  92251bc0276dc69126d95bd184bca40d

                  SHA1

                  01626cd1273a6768152c9ff10f9b75545035a9ec

                  SHA256

                  bfa9c5d122bb671c0fc69b28548ab48fd60a8b312d435f6b19c80fd0271e838f

                  SHA512

                  c7980aac0eee77b6f5749ef09719f3a236d9147a077a8465842a74184cc20926d6ef6d53fc4613f5debc4f2c06fbdf11553838845c9b282676253538fd47f74a

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8889412.exe

                  Filesize

                  953KB

                  MD5

                  92251bc0276dc69126d95bd184bca40d

                  SHA1

                  01626cd1273a6768152c9ff10f9b75545035a9ec

                  SHA256

                  bfa9c5d122bb671c0fc69b28548ab48fd60a8b312d435f6b19c80fd0271e838f

                  SHA512

                  c7980aac0eee77b6f5749ef09719f3a236d9147a077a8465842a74184cc20926d6ef6d53fc4613f5debc4f2c06fbdf11553838845c9b282676253538fd47f74a

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e4438520.exe

                  Filesize

                  174KB

                  MD5

                  a0c7482c126d4d0bb22aa560710af590

                  SHA1

                  8b69ed8f3e88bb964aa6605d04df56bf75a7e5df

                  SHA256

                  fb5791058e3e4cf4e55089ce993ffbb68eac7d5900c96be260de5d9359f94e92

                  SHA512

                  68bb5c0d13cfceb017edb6064450b968af660d233f9658c603fe1dd0560bb61cfe7239693a6de6eb26b70ce0d2317df0fbb5ae451438de4c36f46adb5b1682c5

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e4438520.exe

                  Filesize

                  174KB

                  MD5

                  a0c7482c126d4d0bb22aa560710af590

                  SHA1

                  8b69ed8f3e88bb964aa6605d04df56bf75a7e5df

                  SHA256

                  fb5791058e3e4cf4e55089ce993ffbb68eac7d5900c96be260de5d9359f94e92

                  SHA512

                  68bb5c0d13cfceb017edb6064450b968af660d233f9658c603fe1dd0560bb61cfe7239693a6de6eb26b70ce0d2317df0fbb5ae451438de4c36f46adb5b1682c5

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4453593.exe

                  Filesize

                  797KB

                  MD5

                  ad61f5aa59f23146bcd8318eb90adb7f

                  SHA1

                  60736bf2b87a614eb0db7411c9c43d4f9fd4ef9a

                  SHA256

                  2ac735a2bb8d4a2dcc4d69b64d7296f4c422e8bf00dcba6cf62cc23f876221b2

                  SHA512

                  52c873841150d1c10c234e241a6ad03bcbe7e0b6847ca14a5cad9d8de99d5f456dce521e77552c8b3e06f581ec403734b66aa8e290936d24ee33cece51a8a80f

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4453593.exe

                  Filesize

                  797KB

                  MD5

                  ad61f5aa59f23146bcd8318eb90adb7f

                  SHA1

                  60736bf2b87a614eb0db7411c9c43d4f9fd4ef9a

                  SHA256

                  2ac735a2bb8d4a2dcc4d69b64d7296f4c422e8bf00dcba6cf62cc23f876221b2

                  SHA512

                  52c873841150d1c10c234e241a6ad03bcbe7e0b6847ca14a5cad9d8de99d5f456dce521e77552c8b3e06f581ec403734b66aa8e290936d24ee33cece51a8a80f

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d2897441.exe

                  Filesize

                  140KB

                  MD5

                  206f62d7f748d1a17f5f69c82192a853

                  SHA1

                  5a674fad6ee51727d3acc4170a650e72e7d0c59a

                  SHA256

                  f77403e8c624105ead63c9c53947595f2b46beb2397591f4957af2e78fd21f41

                  SHA512

                  9b66677850493101a922e05afd92f93c0065121c6902b3e9b57d5467cc45786ed382d7881655f2ad41c519b093cbb1c722c8ad3f41826b54756682d509c29b81

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d2897441.exe

                  Filesize

                  140KB

                  MD5

                  206f62d7f748d1a17f5f69c82192a853

                  SHA1

                  5a674fad6ee51727d3acc4170a650e72e7d0c59a

                  SHA256

                  f77403e8c624105ead63c9c53947595f2b46beb2397591f4957af2e78fd21f41

                  SHA512

                  9b66677850493101a922e05afd92f93c0065121c6902b3e9b57d5467cc45786ed382d7881655f2ad41c519b093cbb1c722c8ad3f41826b54756682d509c29b81

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4759311.exe

                  Filesize

                  631KB

                  MD5

                  e40600c5c302e7d7fac52851dad3f344

                  SHA1

                  33665ab36bd2c63af3291f59a9b3f4003018e6a9

                  SHA256

                  778f3ac900c2c3db5453c77d4cd3d93f2ad1f949da1fb6a70757b36560dc685a

                  SHA512

                  372075e1865d3fee8edc2a9bba4313316cbadbe30689be4f20245c43726191ca99489248e5f883fdd63dafce12e1bd81741bd88928b4559fc3ae0316b7521e99

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4759311.exe

                  Filesize

                  631KB

                  MD5

                  e40600c5c302e7d7fac52851dad3f344

                  SHA1

                  33665ab36bd2c63af3291f59a9b3f4003018e6a9

                  SHA256

                  778f3ac900c2c3db5453c77d4cd3d93f2ad1f949da1fb6a70757b36560dc685a

                  SHA512

                  372075e1865d3fee8edc2a9bba4313316cbadbe30689be4f20245c43726191ca99489248e5f883fdd63dafce12e1bd81741bd88928b4559fc3ae0316b7521e99

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c6755582.exe

                  Filesize

                  413KB

                  MD5

                  0ae01c595fdc28efa2eb9a97984d4ae1

                  SHA1

                  b2554f1436b91421c2f4c838a16d1bddc4f4cbab

                  SHA256

                  ca0a6349dcd2f177fbc04da5382b8f5044242a696197ef2c513b9df243857545

                  SHA512

                  e78aae84d00262ae9f517cb32d38712d88fd8a37e1ffe3ddc1581abfe81b8533da3d5bd9a706c891d2639cfe30e5dd9ca224820d367cab6b44c43df6cc54f2a5

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c6755582.exe

                  Filesize

                  413KB

                  MD5

                  0ae01c595fdc28efa2eb9a97984d4ae1

                  SHA1

                  b2554f1436b91421c2f4c838a16d1bddc4f4cbab

                  SHA256

                  ca0a6349dcd2f177fbc04da5382b8f5044242a696197ef2c513b9df243857545

                  SHA512

                  e78aae84d00262ae9f517cb32d38712d88fd8a37e1ffe3ddc1581abfe81b8533da3d5bd9a706c891d2639cfe30e5dd9ca224820d367cab6b44c43df6cc54f2a5

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v8632504.exe

                  Filesize

                  354KB

                  MD5

                  98d4593fd5e91e5366929c3c8d264cb7

                  SHA1

                  78befad15c0b6618c32ccc21ef07502fb12d289e

                  SHA256

                  e507b5aeb8c6265e8a97d05e2e7ce8143c9cabcb722806fe5f71ee3283c28cdb

                  SHA512

                  e65ccab01dc2896c5999ffe75d828eddcc44c86828d94c7a4d2acbb7ea4eb76a80b0219561714c6a0572ed2e542c300c25f91e938af7740b4983ba72278261c5

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v8632504.exe

                  Filesize

                  354KB

                  MD5

                  98d4593fd5e91e5366929c3c8d264cb7

                  SHA1

                  78befad15c0b6618c32ccc21ef07502fb12d289e

                  SHA256

                  e507b5aeb8c6265e8a97d05e2e7ce8143c9cabcb722806fe5f71ee3283c28cdb

                  SHA512

                  e65ccab01dc2896c5999ffe75d828eddcc44c86828d94c7a4d2acbb7ea4eb76a80b0219561714c6a0572ed2e542c300c25f91e938af7740b4983ba72278261c5

                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a6273483.exe

                  Filesize

                  250KB

                  MD5

                  f8e13653e0942ee3e1b340943d54db87

                  SHA1

                  66652ab2e35feba3e9a9381e6d62634e072f135c

                  SHA256

                  fd688b143eddf82ca94379d5a13e4aec496ed36f9be586def1a745586021943f

                  SHA512

                  1ec44bf6720c253a973d0a2d69706851a353d8bfc6b1152231d95f4d8f50afadc43a3f56c2f9857ead9bd9d6c3181dc8fe88e78cc2b871796976eb49e3ec9891

                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a6273483.exe

                  Filesize

                  250KB

                  MD5

                  f8e13653e0942ee3e1b340943d54db87

                  SHA1

                  66652ab2e35feba3e9a9381e6d62634e072f135c

                  SHA256

                  fd688b143eddf82ca94379d5a13e4aec496ed36f9be586def1a745586021943f

                  SHA512

                  1ec44bf6720c253a973d0a2d69706851a353d8bfc6b1152231d95f4d8f50afadc43a3f56c2f9857ead9bd9d6c3181dc8fe88e78cc2b871796976eb49e3ec9891

                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b6983880.exe

                  Filesize

                  379KB

                  MD5

                  5f9e0ccf3c79aef199f1fd1ec1f3a013

                  SHA1

                  37b657a75b88363bc0c1be3928cf5e844499114b

                  SHA256

                  92be3ff33f91046dd922d6d85843060c9a7bd02f88263c554da70e696c3a49cd

                  SHA512

                  9f9eb5322cc864acc1a3811cd0f6b45f1068ca9c1b9f7f1e45d778c52b9caa9e2e2fea92872e7555d05ab5ea6baa8149367d0150c86a8effae4dbadbf56fc974

                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b6983880.exe

                  Filesize

                  379KB

                  MD5

                  5f9e0ccf3c79aef199f1fd1ec1f3a013

                  SHA1

                  37b657a75b88363bc0c1be3928cf5e844499114b

                  SHA256

                  92be3ff33f91046dd922d6d85843060c9a7bd02f88263c554da70e696c3a49cd

                  SHA512

                  9f9eb5322cc864acc1a3811cd0f6b45f1068ca9c1b9f7f1e45d778c52b9caa9e2e2fea92872e7555d05ab5ea6baa8149367d0150c86a8effae4dbadbf56fc974

                • memory/1484-43-0x0000000074650000-0x0000000074E00000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1484-76-0x0000000074650000-0x0000000074E00000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1484-74-0x0000000074650000-0x0000000074E00000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1484-42-0x0000000000400000-0x000000000040A000-memory.dmp

                  Filesize

                  40KB

                • memory/2544-80-0x0000000004F90000-0x0000000004FA0000-memory.dmp

                  Filesize

                  64KB

                • memory/2544-79-0x0000000074650000-0x0000000074E00000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2544-73-0x0000000004F90000-0x0000000004FA0000-memory.dmp

                  Filesize

                  64KB

                • memory/2544-72-0x0000000000C30000-0x0000000000C36000-memory.dmp

                  Filesize

                  24KB

                • memory/2544-71-0x0000000074650000-0x0000000074E00000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2544-70-0x00000000005C0000-0x00000000005F0000-memory.dmp

                  Filesize

                  192KB

                • memory/2920-57-0x0000000000F30000-0x0000000000F36000-memory.dmp

                  Filesize

                  24KB

                • memory/2920-77-0x0000000074650000-0x0000000074E00000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2920-66-0x00000000050A0000-0x00000000050EC000-memory.dmp

                  Filesize

                  304KB

                • memory/2920-64-0x0000000004FF0000-0x0000000005002000-memory.dmp

                  Filesize

                  72KB

                • memory/2920-63-0x0000000005010000-0x0000000005020000-memory.dmp

                  Filesize

                  64KB

                • memory/2920-62-0x0000000005130000-0x000000000523A000-memory.dmp

                  Filesize

                  1.0MB

                • memory/2920-61-0x0000000005640000-0x0000000005C58000-memory.dmp

                  Filesize

                  6.1MB

                • memory/2920-65-0x0000000005060000-0x000000000509C000-memory.dmp

                  Filesize

                  240KB

                • memory/2920-56-0x0000000074650000-0x0000000074E00000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2920-55-0x0000000000400000-0x0000000000430000-memory.dmp

                  Filesize

                  192KB

                • memory/2920-78-0x0000000005010000-0x0000000005020000-memory.dmp

                  Filesize

                  64KB

                • memory/3824-49-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/3824-47-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/3824-48-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/3824-51-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB