Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    22-04-2024 19:50

General

  • Target

    6e7769e568d74e614b7db671d0dde4fda876c191826d534bebefc59c6f681a1a.exe

  • Size

    415KB

  • MD5

    e5275f8122aab0d7a885a8061a48d4be

  • SHA1

    ef0bd3810a033fe75c4037277aa6d5d6f1f1b50b

  • SHA256

    6e7769e568d74e614b7db671d0dde4fda876c191826d534bebefc59c6f681a1a

  • SHA512

    da3ec68b20d7c041e1822392772f9b503d8e45de9f9f22d4a97fb9af31c70e069bb333f2edfd6fb7b7561584c4d7c550fa2cc8271211e13be26fd2cace3dbad3

  • SSDEEP

    6144:VaNECqw6PzNoNBIoZDDf/id53ndJaFxLVZ54gVKsIJ56:VaNd67Ovh+itSLsO6

Malware Config

Signatures

  • Detect ZGRat V1 3 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 10 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e7769e568d74e614b7db671d0dde4fda876c191826d534bebefc59c6f681a1a.exe
    "C:\Users\Admin\AppData\Local\Temp\6e7769e568d74e614b7db671d0dde4fda876c191826d534bebefc59c6f681a1a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Users\Admin\AppData\Local\Temp\u2ac.0.exe
      "C:\Users\Admin\AppData\Local\Temp\u2ac.0.exe"
      2⤵
      • Executes dropped EXE
      PID:3252
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3252 -s 1392
        3⤵
        • Program crash
        PID:224
    • C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe
      "C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1856
      • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exe
        C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1524
        • C:\Users\Admin\AppData\Roaming\Uninstallcheck_alpha\ptInst.exe
          C:\Users\Admin\AppData\Roaming\Uninstallcheck_alpha\ptInst.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1280
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            5⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:1332
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:4680
    • C:\Users\Admin\AppData\Local\Temp\u2ac.1.exe
      "C:\Users\Admin\AppData\Local\Temp\u2ac.1.exe"
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
        "C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3188
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 1576
      2⤵
      • Program crash
      PID:1980
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3252 -ip 3252
    1⤵
      PID:2348
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2964 -ip 2964
      1⤵
        PID:1232

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe

        Filesize

        7.6MB

        MD5

        862bf3003dca41d88ac49a6846149623

        SHA1

        b34f1d42dd0649d6b83f9a92124a554f48df0434

        SHA256

        50c10789db130a98c63e6e7f6e23b1c89b38c5ea4678f1e06fd1796fba25c75c

        SHA512

        fe5ab7888633dbfecca57ecd1732360796c2f19c62fc4282e2a92e9b8b440cc01e25b7a0c6a608cf9c2e9c9e3c49a8509a08851afcaef7e1afc21c0abcc2c969

      • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\VCRUNTIME140.dll

        Filesize

        81KB

        MD5

        16b26bc43943531d7d7e379632ed4e63

        SHA1

        565287de39649e59e653a3612478c2186096d70a

        SHA256

        346f72c9a7584c2ab6ce65cd38a616c77ebddc0bbab2274c4e89dd5e62237517

        SHA512

        b5b7b4b8c5ab4276a34956e43f586272b1803ec3609253fee1bcc0a549aed7ba11d47404b023f7b67af701726bab95cca55738e7bd5bca272eca5ac71bb418cc

      • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\WCLDll.dll

        Filesize

        590KB

        MD5

        63206e3b4f1fa4dcfbe1f2cc5d0c4e9d

        SHA1

        fe731b2e9c296d9ecc75ed96c2d29fe46c7cd924

        SHA256

        8f5b8645b5e5ea48acc411b21a1b3cd56d2660ac931989b9f064c8ff82039885

        SHA512

        32bdcce9e8e7f1ebe50e114f65f762391d52f482a112515ccb16b09653b93873528ea1a7473a2512075bf8f729997a65f455bf6599482e997b85e06a2f87f3d6

      • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\cosmetician.mpeg

        Filesize

        79KB

        MD5

        8e1bbc6d6c4d207393b59853f73945ae

        SHA1

        b66d632eae41267175bf5332d43a785dd929d79f

        SHA256

        b04725aaa99b27e04c02bec7d98fb4511331ea53761272325fff9c27a679e279

        SHA512

        1b45a7be00f54498df289641745ca6ee99e11d63100fb838b96c2d9412f8b5f0ea5aa8b964f32a4f9182cd599765f5ca08b91e8e8eecd06d1c53543284a59001

      • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\msvcp140.dll

        Filesize

        427KB

        MD5

        71a0aa2d05e9174cefd568347bd9c70f

        SHA1

        cb9247a0fa59e47f72df7d1752424b33a903bbb2

        SHA256

        fdb3d86c512adff90967cb860d02a4682850ab96727f0376e4d4836504c50e47

        SHA512

        6e65520528facaa4058720eb16d6bfdcc7bb36923b7e8e6551f3526709f0fabafab123999e618438e6abe7efed4a1332547cfc988f2b24b0e3d91198b95a911a

      • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exe

        Filesize

        938KB

        MD5

        b15bac961f62448c872e1dc6d3931016

        SHA1

        1dcb61babb08fe5db711e379cb67335357a5db82

        SHA256

        bf1a0c67b433f52ebd304553f022baa34bfbca258c932d2b4b8b956b1467bfa5

        SHA512

        932119f7dc6710239481c80ad8baaed5c14a2085fcc514b6522671b1a4ebbaf488e43453f11d5aaf6dcef7a245db8de44d93ff255f7cf8385b7d00f31f2cc370

      • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\quersprung.vhd

        Filesize

        1.3MB

        MD5

        3bee67dd0e04559c8fdc7761336dee47

        SHA1

        027ef9dca01fb928db79e57b418130165f06ed5f

        SHA256

        57745aba2885cf8bf770e7e9195697c05e35333417ca23af153367bf31cbf812

        SHA512

        35fb66f98a57b0d14c3044a91abac3e0670d516edfd691d6670df034e8454c550d3d2e702ab90cd32b70fcba8aeb2e02b7b3a07b6a340a932738968473f77dce

      • C:\Users\Admin\AppData\Local\Temp\d618e439

        Filesize

        3.8MB

        MD5

        13418f74a7ce25cdd6997c9fcb718a0e

        SHA1

        f4c880821fee72c37c882b1e8ebf100efcafe31c

        SHA256

        a890935a36903669f35522c85c75e296404a4595453f060398cb64c5b0d6dfd0

        SHA512

        59017162877bbbdf823450a946e3e54e9130d8ebbf5baba24471c68a10d1fad3452be08c693cd7a78d0bf2fcfd6d3086edeec1a379f9b53fd66bb246c128d4c1

      • C:\Users\Admin\AppData\Local\Temp\e5d59462

        Filesize

        1.4MB

        MD5

        58fe9e09d1ac1205cbee16c811e70c95

        SHA1

        a571aaacafe8136cf24966a12c34cccc739324eb

        SHA256

        f383da14844b1f159f26e059f61299a8a3e219e85723fd78b7a3f48be9041bf0

        SHA512

        faf04057c5fb637b9a68054821d2f7304d42bacbcfb20bf459ec88e39a91e6217045acb48d8a7804d73123584160d164384f8e6d1895f3dd3b0722f05f6879f0

      • C:\Users\Admin\AppData\Local\Temp\tmpE25E.tmp

        Filesize

        20KB

        MD5

        42c395b8db48b6ce3d34c301d1eba9d5

        SHA1

        b7cfa3de344814bec105391663c0df4a74310996

        SHA256

        5644546ecefc6786c7be5b1a89e935e640963ccd34b130f21baab9370cb9055d

        SHA512

        7b9214db96e9bec8745b4161a41c4c0520cdda9950f0cd3f12c7744227a25d639d07c0dd68b552cf1e032181c2e4f8297747f27bad6c7447b0f415a86bd82845

      • C:\Users\Admin\AppData\Local\Temp\tmpE280.tmp

        Filesize

        20KB

        MD5

        22be08f683bcc01d7a9799bbd2c10041

        SHA1

        2efb6041cf3d6e67970135e592569c76fc4c41de

        SHA256

        451c2c0cf3b7cb412a05347c6e75ed8680f0d2e5f2ab0f64cc2436db9309a457

        SHA512

        0eef192b3d5abe5d2435acf54b42c729c3979e4ad0b73d36666521458043ee7df1e10386bef266d7df9c31db94fb2833152bb2798936cb2082715318ef05d936

      • C:\Users\Admin\AppData\Local\Temp\u2ac.0.exe

        Filesize

        270KB

        MD5

        0951f2c80179ee8fc3ce96f8113ffe42

        SHA1

        cca70fa747800d42b722743b00cb1b3f71f63f61

        SHA256

        6a15721740f9ba4bce8940122998d69c51e0a4bb9ae84b3be0cc9a6d39283320

        SHA512

        721f180c9a14b8e18d59f4051eee9f9ba9adc4babb950aad796407f2b4d066f9af6a646cef54616c1289f3788f640f6a4c3e6dccdd2fe3bde79fced7f5aef1d7

      • C:\Users\Admin\AppData\Local\Temp\u2ac.1.exe

        Filesize

        4.6MB

        MD5

        397926927bca55be4a77839b1c44de6e

        SHA1

        e10f3434ef3021c399dbba047832f02b3c898dbd

        SHA256

        4f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7

        SHA512

        cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954

      • memory/1280-93-0x0000000072D10000-0x0000000072E8D000-memory.dmp

        Filesize

        1.5MB

      • memory/1280-94-0x00007FFD98F20000-0x00007FFD99129000-memory.dmp

        Filesize

        2.0MB

      • memory/1280-95-0x0000000072D10000-0x0000000072E8D000-memory.dmp

        Filesize

        1.5MB

      • memory/1280-98-0x0000000072D10000-0x0000000072E8D000-memory.dmp

        Filesize

        1.5MB

      • memory/1332-190-0x0000000072D10000-0x0000000072E8D000-memory.dmp

        Filesize

        1.5MB

      • memory/1332-189-0x0000000072D10000-0x0000000072E8D000-memory.dmp

        Filesize

        1.5MB

      • memory/1332-120-0x00007FFD98F20000-0x00007FFD99129000-memory.dmp

        Filesize

        2.0MB

      • memory/1332-196-0x0000000072D10000-0x0000000072E8D000-memory.dmp

        Filesize

        1.5MB

      • memory/1332-100-0x0000000072D10000-0x0000000072E8D000-memory.dmp

        Filesize

        1.5MB

      • memory/1524-73-0x00007FFD98F20000-0x00007FFD99129000-memory.dmp

        Filesize

        2.0MB

      • memory/1524-72-0x0000000072D10000-0x0000000072E8D000-memory.dmp

        Filesize

        1.5MB

      • memory/1856-36-0x0000000002D20000-0x0000000002D21000-memory.dmp

        Filesize

        4KB

      • memory/1856-58-0x0000000072D10000-0x0000000072E8D000-memory.dmp

        Filesize

        1.5MB

      • memory/1856-35-0x0000000000400000-0x0000000000BEB000-memory.dmp

        Filesize

        7.9MB

      • memory/1856-45-0x0000000072D10000-0x0000000072E8D000-memory.dmp

        Filesize

        1.5MB

      • memory/1856-42-0x0000000072D10000-0x0000000072E8D000-memory.dmp

        Filesize

        1.5MB

      • memory/1856-43-0x00007FFD98F20000-0x00007FFD99129000-memory.dmp

        Filesize

        2.0MB

      • memory/1856-96-0x0000000072D10000-0x0000000072E8D000-memory.dmp

        Filesize

        1.5MB

      • memory/1856-97-0x0000000000400000-0x0000000000BEB000-memory.dmp

        Filesize

        7.9MB

      • memory/1856-57-0x0000000072D10000-0x0000000072E8D000-memory.dmp

        Filesize

        1.5MB

      • memory/2176-154-0x0000000000400000-0x00000000008AD000-memory.dmp

        Filesize

        4.7MB

      • memory/2176-142-0x0000000000400000-0x00000000008AD000-memory.dmp

        Filesize

        4.7MB

      • memory/2176-116-0x0000000002760000-0x0000000002761000-memory.dmp

        Filesize

        4KB

      • memory/2964-19-0x0000000002EF0000-0x0000000002FF0000-memory.dmp

        Filesize

        1024KB

      • memory/2964-46-0x0000000000400000-0x0000000002C4A000-memory.dmp

        Filesize

        40.3MB

      • memory/2964-113-0x0000000000400000-0x0000000002C4A000-memory.dmp

        Filesize

        40.3MB

      • memory/2964-3-0x0000000000400000-0x0000000002C4A000-memory.dmp

        Filesize

        40.3MB

      • memory/2964-1-0x0000000002EF0000-0x0000000002FF0000-memory.dmp

        Filesize

        1024KB

      • memory/2964-17-0x0000000000400000-0x0000000002C4A000-memory.dmp

        Filesize

        40.3MB

      • memory/2964-20-0x00000000031F0000-0x000000000325E000-memory.dmp

        Filesize

        440KB

      • memory/2964-2-0x00000000031F0000-0x000000000325E000-memory.dmp

        Filesize

        440KB

      • memory/3188-192-0x00000264E8A90000-0x00000264E8AAE000-memory.dmp

        Filesize

        120KB

      • memory/3188-156-0x00000264C59B0000-0x00000264C92A8000-memory.dmp

        Filesize

        57.0MB

      • memory/3188-158-0x00000264E3990000-0x00000264E3AA0000-memory.dmp

        Filesize

        1.1MB

      • memory/3188-159-0x00000264E3880000-0x00000264E3890000-memory.dmp

        Filesize

        64KB

      • memory/3188-160-0x00000264E3AB0000-0x00000264E3ABC000-memory.dmp

        Filesize

        48KB

      • memory/3188-161-0x00000264E3AA0000-0x00000264E3AB4000-memory.dmp

        Filesize

        80KB

      • memory/3188-162-0x00000264E3B20000-0x00000264E3B44000-memory.dmp

        Filesize

        144KB

      • memory/3188-163-0x00000264E3CA0000-0x00000264E3CAA000-memory.dmp

        Filesize

        40KB

      • memory/3188-165-0x00000264E3CF0000-0x00000264E3DA2000-memory.dmp

        Filesize

        712KB

      • memory/3188-164-0x00000264E3CC0000-0x00000264E3CEA000-memory.dmp

        Filesize

        168KB

      • memory/3188-166-0x00000264E3DA0000-0x00000264E3E1A000-memory.dmp

        Filesize

        488KB

      • memory/3188-167-0x00000264E3E20000-0x00000264E3E82000-memory.dmp

        Filesize

        392KB

      • memory/3188-168-0x00000264E3F00000-0x00000264E3F76000-memory.dmp

        Filesize

        472KB

      • memory/3188-169-0x00000264E3860000-0x00000264E386A000-memory.dmp

        Filesize

        40KB

      • memory/3188-173-0x00000264E3F80000-0x00000264E4280000-memory.dmp

        Filesize

        3.0MB

      • memory/3188-175-0x00000264E3890000-0x00000264E38A0000-memory.dmp

        Filesize

        64KB

      • memory/3188-176-0x00000264E3890000-0x00000264E38A0000-memory.dmp

        Filesize

        64KB

      • memory/3188-177-0x00000264E3890000-0x00000264E38A0000-memory.dmp

        Filesize

        64KB

      • memory/3188-178-0x00000264E7C30000-0x00000264E7C38000-memory.dmp

        Filesize

        32KB

      • memory/3188-179-0x00000264E8330000-0x00000264E8368000-memory.dmp

        Filesize

        224KB

      • memory/3188-180-0x00000264E8300000-0x00000264E830E000-memory.dmp

        Filesize

        56KB

      • memory/3188-181-0x00000264E8C40000-0x00000264E8C4A000-memory.dmp

        Filesize

        40KB

      • memory/3188-182-0x00000264E8C50000-0x00000264E8C72000-memory.dmp

        Filesize

        136KB

      • memory/3188-183-0x00000264E91A0000-0x00000264E96C8000-memory.dmp

        Filesize

        5.2MB

      • memory/3188-187-0x00000264E3890000-0x00000264E38A0000-memory.dmp

        Filesize

        64KB

      • memory/3188-186-0x00000264E8A10000-0x00000264E8A60000-memory.dmp

        Filesize

        320KB

      • memory/3188-188-0x00000264E89C0000-0x00000264E89CC000-memory.dmp

        Filesize

        48KB

      • memory/3188-157-0x00000264E3890000-0x00000264E38A0000-memory.dmp

        Filesize

        64KB

      • memory/3188-155-0x00007FFD77810000-0x00007FFD782D2000-memory.dmp

        Filesize

        10.8MB

      • memory/3188-191-0x00000264E8A60000-0x00000264E8A82000-memory.dmp

        Filesize

        136KB

      • memory/3188-234-0x00000264E3890000-0x00000264E38A0000-memory.dmp

        Filesize

        64KB

      • memory/3188-233-0x00000264E3890000-0x00000264E38A0000-memory.dmp

        Filesize

        64KB

      • memory/3188-232-0x00000264E3890000-0x00000264E38A0000-memory.dmp

        Filesize

        64KB

      • memory/3188-212-0x00000264E3890000-0x00000264E38A0000-memory.dmp

        Filesize

        64KB

      • memory/3188-208-0x00000264E3890000-0x00000264E38A0000-memory.dmp

        Filesize

        64KB

      • memory/3188-204-0x00007FFD77810000-0x00007FFD782D2000-memory.dmp

        Filesize

        10.8MB

      • memory/3252-15-0x0000000000400000-0x0000000002C26000-memory.dmp

        Filesize

        40.1MB

      • memory/3252-13-0x0000000002D40000-0x0000000002E40000-memory.dmp

        Filesize

        1024KB

      • memory/3252-14-0x0000000003090000-0x00000000030B7000-memory.dmp

        Filesize

        156KB

      • memory/3252-16-0x0000000000400000-0x0000000002C26000-memory.dmp

        Filesize

        40.1MB

      • memory/4680-206-0x0000000005520000-0x0000000005570000-memory.dmp

        Filesize

        320KB

      • memory/4680-207-0x0000000005670000-0x00000000056E6000-memory.dmp

        Filesize

        472KB

      • memory/4680-200-0x0000000073850000-0x0000000074001000-memory.dmp

        Filesize

        7.7MB

      • memory/4680-209-0x0000000006750000-0x0000000006C7C000-memory.dmp

        Filesize

        5.2MB

      • memory/4680-210-0x0000000005990000-0x00000000059AE000-memory.dmp

        Filesize

        120KB

      • memory/4680-211-0x0000000006220000-0x0000000006286000-memory.dmp

        Filesize

        408KB

      • memory/4680-199-0x0000000000D00000-0x0000000000DC6000-memory.dmp

        Filesize

        792KB

      • memory/4680-202-0x0000000005A70000-0x0000000006016000-memory.dmp

        Filesize

        5.6MB

      • memory/4680-201-0x0000000005420000-0x00000000054B2000-memory.dmp

        Filesize

        584KB

      • memory/4680-231-0x0000000007B60000-0x0000000007B6A000-memory.dmp

        Filesize

        40KB

      • memory/4680-195-0x0000000071810000-0x0000000072B27000-memory.dmp

        Filesize

        19.1MB

      • memory/4680-205-0x00000000055E0000-0x00000000055F0000-memory.dmp

        Filesize

        64KB

      • memory/4680-203-0x00000000057C0000-0x0000000005982000-memory.dmp

        Filesize

        1.8MB