Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 13:20

General

  • Target

    2141803ac1964b3aac1d8dc536d28ccc.exe

  • Size

    1.2MB

  • MD5

    2141803ac1964b3aac1d8dc536d28ccc

  • SHA1

    131856598cb6dea55ef0f6e3f555825a9f7655c3

  • SHA256

    7a4f56266c0894612e9c289a19c63d46ab615679cade1ea9b8f7edb31e200e51

  • SHA512

    25917c129040a652f8d11def20193d972b4ae54ed72e8792b4f323da50531f2805a906d36c2597b13e700d34390a9a09d585a16cccf6c0a24cee568fecbed113

  • SSDEEP

    24576:wm5TW9b2aHLlc5nVK3kSLcOY1MdF5MfSe54pXl88M69DTLx:Z5Tqbtrl4nVK3kS+14F5i54pyN6DXx

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 51 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 9 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 16 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 56 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2141803ac1964b3aac1d8dc536d28ccc.exe
    "C:\Users\Admin\AppData\Local\Temp\2141803ac1964b3aac1d8dc536d28ccc.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Windows\SysWOW64\explorer.exe
      explorer C:\Users\Admin\AppData\Local\Temp\2141803ac1964b3aac1d8dc536d28ccc
      2⤵
        PID:2920
      • C:\Windows\SysWOW64\XP-AB9DB5FA.EXE
        C:\Windows\system32\XP-AB9DB5FA.EXE
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Writes to the Master Boot Record (MBR)
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2820
        • C:\Windows\SysWOW64\explorer.exe
          explorer C:\Windows\SysWOW64\XP-AB9DB5FA
          3⤵
            PID:1640
          • C:\Windows\SysWOW64\XP-AB9DB5FA.EXE
            C:\Windows\system32\XP-AB9DB5FA.EXE
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Writes to the Master Boot Record (MBR)
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3060
            • C:\Windows\SysWOW64\explorer.exe
              explorer C:\Windows\SysWOW64\XP-AB9DB5FA
              4⤵
                PID:628
              • C:\Windows\SysWOW64\XP-AB9DB5FA.EXE
                C:\Windows\system32\XP-AB9DB5FA.EXE
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Writes to the Master Boot Record (MBR)
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2876
                • C:\Windows\SysWOW64\explorer.exe
                  explorer C:\Windows\SysWOW64\XP-AB9DB5FA
                  5⤵
                    PID:2472
                  • C:\Windows\SysWOW64\XP-AB9DB5FA.EXE
                    C:\Windows\system32\XP-AB9DB5FA.EXE
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Writes to the Master Boot Record (MBR)
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:1968
                    • C:\Windows\SysWOW64\XP-AB9DB5FA.EXE
                      C:\Windows\system32\XP-AB9DB5FA.EXE
                      6⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Writes to the Master Boot Record (MBR)
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:2656
                      • C:\Windows\SysWOW64\explorer.exe
                        explorer C:\Windows\SysWOW64\XP-AB9DB5FA
                        7⤵
                          PID:2300
                        • C:\Windows\SysWOW64\XP-AB9DB5FA.EXE
                          C:\Windows\system32\XP-AB9DB5FA.EXE
                          7⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Writes to the Master Boot Record (MBR)
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:2056
                          • C:\Windows\SysWOW64\explorer.exe
                            explorer C:\Windows\SysWOW64\XP-AB9DB5FA
                            8⤵
                              PID:1080
                            • C:\Windows\SysWOW64\XP-AB9DB5FA.EXE
                              C:\Windows\system32\XP-AB9DB5FA.EXE
                              8⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Writes to the Master Boot Record (MBR)
                              • Suspicious use of SetWindowsHookEx
                              • Suspicious use of WriteProcessMemory
                              PID:832
                              • C:\Windows\SysWOW64\explorer.exe
                                explorer C:\Windows\SysWOW64\XP-AB9DB5FA
                                9⤵
                                  PID:1112
                                • C:\Windows\SysWOW64\XP-AB9DB5FA.EXE
                                  C:\Windows\system32\XP-AB9DB5FA.EXE
                                  9⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Writes to the Master Boot Record (MBR)
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2528
                          • C:\Windows\SysWOW64\explorer.exe
                            explorer C:\Windows\SysWOW64\XP-AB9DB5FA
                            6⤵
                              PID:1644
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                    1⤵
                    • Modifies Internet Explorer settings
                    • Modifies registry class
                    PID:2824
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                    1⤵
                    • Modifies Internet Explorer settings
                    • Modifies registry class
                    PID:760
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                    1⤵
                    • Modifies Internet Explorer settings
                    • Modifies registry class
                    PID:1040
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                    1⤵
                    • Modifies Internet Explorer settings
                    • Modifies registry class
                    PID:2028
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                    1⤵
                    • Modifies Internet Explorer settings
                    • Modifies registry class
                    PID:1116
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                    1⤵
                    • Modifies Internet Explorer settings
                    • Modifies registry class
                    • Suspicious use of SetWindowsHookEx
                    PID:1676
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                    1⤵
                    • Modifies Internet Explorer settings
                    • Modifies registry class
                    PID:2100
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                    1⤵
                    • Modifies Internet Explorer settings
                    • Modifies registry class
                    PID:868

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\E_4\RegEx.fne

                    Filesize

                    164KB

                    MD5

                    a85d63acefa7a6fa639787e364c16892

                    SHA1

                    86ec32360c7ec9941b9411009de6aad0c83de46f

                    SHA256

                    d0b26b744a94a6dc22eba1b79089c4e1f45db18a68a9b02f58f017b94873dcb8

                    SHA512

                    fd12fbeab738358b47836badaf635511ea819fb5a35de4065b68d9b6f7e0f5eb443a7363164f32e8308701e78f2279c9c481038d09a2aa92a4ec184a91a2b9e8

                  • C:\Users\Admin\AppData\Local\Temp\E_4\eAPI.fne

                    Filesize

                    316KB

                    MD5

                    25b794b18bd8d03dc9530111cbce4173

                    SHA1

                    a6774d62bd1e9497fdfe6c61c495011fc6c274c6

                    SHA256

                    81757b48f2caecd6fd4f6699906e9320704c10b5c5dadc6c796b9809f0359ee4

                    SHA512

                    5892dc3c681571b2130695c4e8f598e732462746b9f5b8e7689108e393fb6d4edc32c97ef1f39f0c0abc901a590677f92c1abd1b809e5a875d025f4131d831ac

                  • C:\Users\Admin\AppData\Local\Temp\E_4\internet.fne

                    Filesize

                    180KB

                    MD5

                    56e9e121d68b5631a360d56b2ef4777f

                    SHA1

                    e9d11a2baf46769c90ee1671cd17072efd8cfb52

                    SHA256

                    c247997b04fc5535bb07ab43c3628326c6365aa6a0bd82a6f380b8ab66a09d2f

                    SHA512

                    1ef52e0283d286a308fa1c927ff12aa43975a49d94d9386ee4a02b7e4f47de2e239a340a4427534c73c0039ea2c249e91b68f2dce1dfebf13c9879c4ea60b97e

                  • C:\Users\Admin\AppData\Local\Temp\E_4\spec.fne

                    Filesize

                    72KB

                    MD5

                    c4337f54ceb6765fda33f96b8408c013

                    SHA1

                    242e447d71a346366526a721532b0d47d5d62239

                    SHA256

                    a3525832c5922696002c33ca8658a53a3bbcdd46a1e172ee1f5e815f037b7c08

                    SHA512

                    2bc2d4648b971f94e789815ce946578d412b585158056f10d2be147e194dfa8f4bd211eecb86b76aa78233da72b2544398945ca2850268109c6f3ef7e44a8c9c

                  • C:\Windows\SysWOW64\XP-AB9DB5FA.EXE

                    Filesize

                    128KB

                    MD5

                    da4271fe109cb1b3838a9b2bc234b9c3

                    SHA1

                    71e920619329b417fd6f4a0e2435405e64d11572

                    SHA256

                    5f38264d850a20b06bcd94daa335a764df5788d00e4c32b172421dbe92d0055d

                    SHA512

                    579574ad4dc2f68abb2a1ef886d0ef30098175538bfe07e0d1e153b6034b7ad622dd5d4684275d78433fdc2c1bf75977b7f9f5eb82eed677f33ab77d1bcdcdc4

                  • \Users\Admin\AppData\Local\Temp\E_4\com.run

                    Filesize

                    260KB

                    MD5

                    ce2f773275d3fe8b78f4cf067d5e6a0f

                    SHA1

                    b7135e34d46eb4303147492d5cee5e1ef7b392ab

                    SHA256

                    eb8099c0ad2d82d9d80530443e2909f3b34be0844d445e844f1c994476c86d2d

                    SHA512

                    d733dc01c047be56680629a385abdd2aa1598a2b5459269028446da9097b6f6c1e7ade5b74e3ac3809dd8a3f8d1cbbe7fd669f2762be61f9c38fd4a2cca9e063

                  • \Users\Admin\AppData\Local\Temp\E_4\dp1.fne

                    Filesize

                    112KB

                    MD5

                    6d4b2e73f6f8ecff02f19f7e8ef9a8c7

                    SHA1

                    09c32ca167136a17fd69df8c525ea5ffeca6c534

                    SHA256

                    fe5783e64aa70fac10c2e42d460732d9770534357329d8bc78576557c165f040

                    SHA512

                    2fd7a95cb632e9c4ac6b34e5b6b875aae94e73cd4b1f213e78f46dadab4846227a030776461bca08f9d75a1d61a0d45427f7b0c8b71406b7debc14db04b2ce04

                  • \Users\Admin\AppData\Local\Temp\E_4\krnln.fnr

                    Filesize

                    1.0MB

                    MD5

                    1081d7eb7a17faedfa588b93fc85365e

                    SHA1

                    884e264fa37bfb9e71d24f3f5c7554fdf94a8b9f

                    SHA256

                    0351d055cf1e194302ab125cc93208a8c733efb45dc301ca6e7e2a4051f411e0

                    SHA512

                    1ff9e7c495b9e005c8d3b56219794c31d804fe1944429e3d4fe013fd8fcb3f51c02b588748c7d9d869fdb115851932e8db4e6792aecd9c83f28237702582ba81

                  • \Users\Admin\AppData\Local\Temp\E_4\krnln.fnr

                    Filesize

                    42KB

                    MD5

                    538a5028a6e79d576f94fba4770dd188

                    SHA1

                    3aa7cce6dabd7480402272e60e6ccef66c8da52a

                    SHA256

                    3542c0ed6bd770292b7af0242aded4b3f758a4e7e7d04bfc6fb5dc9430d53c61

                    SHA512

                    8db0c83380a187ecdfa252af94e5e63adb6c839f898735c51ab0a30270748ad9c9fd3860a22ecd9f4413753a836cd1b168762c2d410c94e2dad26861ffbbb8d8

                  • \Users\Admin\AppData\Local\Temp\E_4\shell.fne

                    Filesize

                    40KB

                    MD5

                    d54753e7fc3ea03aec0181447969c0e8

                    SHA1

                    824e7007b6569ae36f174c146ae1b7242f98f734

                    SHA256

                    192608ff371400c1529aa05f1adba0fe4fdd769fcbf35ee5f8b4f78a838a7ec9

                    SHA512

                    c25ed4cb38d5d5e95a267979f0f3f9398c04a1bf5822dceb03d6f6d9b4832dfb227f1e6868327e52a0303f45c36b9ba806e75b16bd7419a7c5203c2ecbae838f

                  • \Windows\SysWOW64\XP-AB9DB5FA.EXE

                    Filesize

                    1.2MB

                    MD5

                    2141803ac1964b3aac1d8dc536d28ccc

                    SHA1

                    131856598cb6dea55ef0f6e3f555825a9f7655c3

                    SHA256

                    7a4f56266c0894612e9c289a19c63d46ab615679cade1ea9b8f7edb31e200e51

                    SHA512

                    25917c129040a652f8d11def20193d972b4ae54ed72e8792b4f323da50531f2805a906d36c2597b13e700d34390a9a09d585a16cccf6c0a24cee568fecbed113

                  • \Windows\SysWOW64\XP-AB9DB5FA.EXE

                    Filesize

                    320KB

                    MD5

                    0fb5030463d45c33171302db37c3c2d3

                    SHA1

                    6be3f8bcc6550467cd630ab88714e888ab6037da

                    SHA256

                    324ce171c5767b0a7df186b949a98066e8dce22b0552e918045c036c625ccc5e

                    SHA512

                    40775ddf831ed680fd9309a26ae68ec66dbe7696e5880042003114b33474ece5e0b4269da724f878aedfd1da608e09c4ced38068591c116c4ae2ec854815414a

                  • \Windows\SysWOW64\XP-AB9DB5FA.EXE

                    Filesize

                    192KB

                    MD5

                    0e021349585de5addba633527468c184

                    SHA1

                    7b8564331343d978a9c71f04ced172f5a30075d1

                    SHA256

                    02f13104982c66f3cba2400dbf565253cde6d36407c9ff0704e08f6ea866d326

                    SHA512

                    d314b50b02eeb962bf6473c8059d5297b4fbe46950b7b6bfd1191959542cf554680b10e8d835a0b23af63ebeab2d135a0822a551bafca71f6bc311d905aadb08

                  • memory/760-186-0x00000000037B0000-0x00000000037B1000-memory.dmp

                    Filesize

                    4KB

                  • memory/760-96-0x00000000037B0000-0x00000000037B1000-memory.dmp

                    Filesize

                    4KB

                  • memory/832-175-0x0000000000480000-0x00000000004AA000-memory.dmp

                    Filesize

                    168KB

                  • memory/832-173-0x0000000000390000-0x00000000003AE000-memory.dmp

                    Filesize

                    120KB

                  • memory/832-184-0x0000000000480000-0x00000000004AA000-memory.dmp

                    Filesize

                    168KB

                  • memory/832-174-0x00000000003D0000-0x00000000003E1000-memory.dmp

                    Filesize

                    68KB

                  • memory/832-172-0x0000000000400000-0x000000000042A000-memory.dmp

                    Filesize

                    168KB

                  • memory/868-197-0x00000000037B0000-0x00000000037B1000-memory.dmp

                    Filesize

                    4KB

                  • memory/868-190-0x00000000037B0000-0x00000000037B1000-memory.dmp

                    Filesize

                    4KB

                  • memory/1040-139-0x00000000037B0000-0x00000000037B1000-memory.dmp

                    Filesize

                    4KB

                  • memory/1040-192-0x00000000037B0000-0x00000000037B1000-memory.dmp

                    Filesize

                    4KB

                  • memory/1116-160-0x0000000003730000-0x0000000003731000-memory.dmp

                    Filesize

                    4KB

                  • memory/1116-194-0x0000000003730000-0x0000000003731000-memory.dmp

                    Filesize

                    4KB

                  • memory/1676-195-0x0000000003730000-0x0000000003731000-memory.dmp

                    Filesize

                    4KB

                  • memory/1676-163-0x0000000003730000-0x0000000003731000-memory.dmp

                    Filesize

                    4KB

                  • memory/1968-156-0x0000000000400000-0x000000000042A000-memory.dmp

                    Filesize

                    168KB

                  • memory/1968-121-0x0000000000580000-0x0000000000591000-memory.dmp

                    Filesize

                    68KB

                  • memory/1968-125-0x00000000005A0000-0x00000000005CA000-memory.dmp

                    Filesize

                    168KB

                  • memory/1968-105-0x0000000000400000-0x000000000042A000-memory.dmp

                    Filesize

                    168KB

                  • memory/1968-116-0x00000000002E0000-0x000000000032A000-memory.dmp

                    Filesize

                    296KB

                  • memory/1968-119-0x0000000000530000-0x000000000054E000-memory.dmp

                    Filesize

                    120KB

                  • memory/2028-153-0x00000000037B0000-0x00000000037B1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2028-193-0x00000000037B0000-0x00000000037B1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2056-159-0x0000000001E30000-0x0000000001E4E000-memory.dmp

                    Filesize

                    120KB

                  • memory/2056-187-0x0000000000400000-0x000000000042A000-memory.dmp

                    Filesize

                    168KB

                  • memory/2056-161-0x0000000001E50000-0x0000000001E61000-memory.dmp

                    Filesize

                    68KB

                  • memory/2056-155-0x0000000001DE0000-0x0000000001E2A000-memory.dmp

                    Filesize

                    296KB

                  • memory/2056-152-0x0000000000400000-0x000000000042A000-memory.dmp

                    Filesize

                    168KB

                  • memory/2056-171-0x0000000001E70000-0x0000000001E9A000-memory.dmp

                    Filesize

                    168KB

                  • memory/2056-164-0x0000000001E70000-0x0000000001E9A000-memory.dmp

                    Filesize

                    168KB

                  • memory/2100-196-0x0000000003730000-0x0000000003731000-memory.dmp

                    Filesize

                    4KB

                  • memory/2100-188-0x0000000003730000-0x0000000003731000-memory.dmp

                    Filesize

                    4KB

                  • memory/2124-16-0x00000000003E0000-0x00000000003FE000-memory.dmp

                    Filesize

                    120KB

                  • memory/2124-43-0x00000000004A0000-0x00000000004CA000-memory.dmp

                    Filesize

                    168KB

                  • memory/2124-68-0x0000000000400000-0x000000000042A000-memory.dmp

                    Filesize

                    168KB

                  • memory/2124-29-0x00000000004A0000-0x00000000004CA000-memory.dmp

                    Filesize

                    168KB

                  • memory/2124-0-0x0000000000400000-0x000000000042A000-memory.dmp

                    Filesize

                    168KB

                  • memory/2124-19-0x0000000000480000-0x0000000000491000-memory.dmp

                    Filesize

                    68KB

                  • memory/2124-12-0x0000000000430000-0x000000000047A000-memory.dmp

                    Filesize

                    296KB

                  • memory/2528-181-0x00000000002C0000-0x000000000030A000-memory.dmp

                    Filesize

                    296KB

                  • memory/2528-182-0x0000000000400000-0x000000000042A000-memory.dmp

                    Filesize

                    168KB

                  • memory/2656-137-0x0000000000400000-0x000000000042A000-memory.dmp

                    Filesize

                    168KB

                  • memory/2656-136-0x00000000002D0000-0x000000000031A000-memory.dmp

                    Filesize

                    296KB

                  • memory/2656-151-0x00000000003D0000-0x00000000003FA000-memory.dmp

                    Filesize

                    168KB

                  • memory/2656-146-0x00000000003D0000-0x00000000003FA000-memory.dmp

                    Filesize

                    168KB

                  • memory/2656-145-0x00000000003B0000-0x00000000003C1000-memory.dmp

                    Filesize

                    68KB

                  • memory/2656-143-0x0000000000380000-0x000000000039E000-memory.dmp

                    Filesize

                    120KB

                  • memory/2820-99-0x0000000000400000-0x000000000042A000-memory.dmp

                    Filesize

                    168KB

                  • memory/2820-42-0x0000000000400000-0x000000000042A000-memory.dmp

                    Filesize

                    168KB

                  • memory/2820-50-0x00000000005C0000-0x00000000005DE000-memory.dmp

                    Filesize

                    120KB

                  • memory/2820-56-0x0000000001DB0000-0x0000000001DDA000-memory.dmp

                    Filesize

                    168KB

                  • memory/2820-53-0x0000000001D70000-0x0000000001D81000-memory.dmp

                    Filesize

                    68KB

                  • memory/2820-46-0x0000000000300000-0x000000000034A000-memory.dmp

                    Filesize

                    296KB

                  • memory/2824-69-0x0000000003730000-0x0000000003731000-memory.dmp

                    Filesize

                    4KB

                  • memory/2824-180-0x0000000003730000-0x0000000003731000-memory.dmp

                    Filesize

                    4KB

                  • memory/2824-70-0x0000000003A10000-0x0000000003A20000-memory.dmp

                    Filesize

                    64KB

                  • memory/2876-94-0x0000000000400000-0x000000000042A000-memory.dmp

                    Filesize

                    168KB

                  • memory/2876-93-0x0000000000260000-0x00000000002AA000-memory.dmp

                    Filesize

                    296KB

                  • memory/2876-101-0x00000000004B0000-0x00000000004C1000-memory.dmp

                    Filesize

                    68KB

                  • memory/3060-75-0x0000000000430000-0x000000000044E000-memory.dmp

                    Filesize

                    120KB

                  • memory/3060-77-0x0000000000450000-0x0000000000461000-memory.dmp

                    Filesize

                    68KB

                  • memory/3060-72-0x0000000000220000-0x000000000026A000-memory.dmp

                    Filesize

                    296KB

                  • memory/3060-141-0x0000000000400000-0x000000000042A000-memory.dmp

                    Filesize

                    168KB

                  • memory/3060-67-0x0000000000400000-0x000000000042A000-memory.dmp

                    Filesize

                    168KB

                  • memory/3060-82-0x0000000000470000-0x000000000049A000-memory.dmp

                    Filesize

                    168KB