Analysis

  • max time kernel
    145s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    13/05/2024, 09:41

General

  • Target

    af53ddc6c3df76d93f13aa3a2cc6a550_NeikiAnalytics.exe

  • Size

    8.3MB

  • MD5

    af53ddc6c3df76d93f13aa3a2cc6a550

  • SHA1

    e6e36318a4107f354865add89be2b529164f84f8

  • SHA256

    50389f6729ca966cda5c6a0d6563d5939734858cdaa627b33768f1e820048b31

  • SHA512

    8a997a85f257e771e291085df4d0a78310ed574cde4ad8b698fe9f6ea98e11743ac091efdf8402d1f5038719c361d4dd90b072c688e9e59690947e7f7f6ae7ab

  • SSDEEP

    49152:pVp3+fVXVp3+fV8135Vp3+fVXVp3+fV813B2Vp3+fVXVp3+fV8135Vp3+fVXVp3Q:pV8XV88PV8XV88aV8XV88PV8XV88y

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af53ddc6c3df76d93f13aa3a2cc6a550_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\af53ddc6c3df76d93f13aa3a2cc6a550_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2432
    • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
      c:\users\admin\appdata\local\temp\\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2156
      • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
        c:\users\admin\appdata\local\temp\\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2384
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 48
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1712
      • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1892
    • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2120
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3028
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:603141 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2588

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe

          Filesize

          8.3MB

          MD5

          342f19fe90c920c02ffb0cdd6531511e

          SHA1

          ab59eaa02eec5afa15cbd49102ae793ea780bb37

          SHA256

          0ad4772b6f7a59ae1ca34d03ffb51da784568d1d8122a8361fbe4807e6624823

          SHA512

          0fb01df038f6f71d6eb3a13600a714074fa0e8ded6b34e1c4ded2800ad05fb65bced35a01f9da272348678852a54079d3614b761a56a71855be3d1a04546b8b1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          fd2ef4980e9f05062f059d5b611a1d1f

          SHA1

          3158757912b7b478e8df4324421699426e8fa452

          SHA256

          21ee5acadf996a890ceaafc0e0072ffd35a6bf759d71abbefaf2bd34597a9642

          SHA512

          f1ecc64e6b1a7984a5ccd933093d4867a4d2918aa49d314f14d6e4b066ed7a303b13126515cd6741a0093afbf416f50fbf690da581f043d480bc16aa9f0579b4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          26aa8a48a8d5f1ab5f7bc515f6834ba0

          SHA1

          1a1b46daf4a5bfa0ae08d6e3b9e28e358c7eb461

          SHA256

          65720c5f5d5b743f212cdfa407747b3b1e54348a548df1ed58c0de06d4d46f6f

          SHA512

          556ed9f49dd5e5fcfaaea94769c3b786e98df2801b81ed2a74fa44da632371b5bd23e23975c7c3026bdced2146871386e8b206e39809b8c367690757eceebfe8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f91dfdc46741e882ed39a2ea6082190b

          SHA1

          614a29fcb2597d51e0b8fce0334c0c253fe9e763

          SHA256

          abaa96ca358c5a221b029080b62f9709aba27435f0c939607b882850368bc1e8

          SHA512

          712f231b863cd8c8c4a80fff69bdcbb8b9edbd9c032a592a4831000c107940ec00bc1aafc1dc3e915caf2ae2d849f699f96c2e948fafadab79341798cb3639fe

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          96a93305b0f7ebc327887d1928b77f9c

          SHA1

          77a7b4e35bdac721ff6eeb059a9df0a557138fee

          SHA256

          1d3a953b47af7cf436072e8b8fe09470e4d152dedf7840832d12358ba68f63c3

          SHA512

          88c6ff533cb7ff5ab3337bdfb9cb6dd012d98a19c15fc6e92cf3063d47a17da36a0ab5172b0e872b693c9d7adedabc62a09209c0abfa334aaf24d6649a012e3b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          6e72a00fe308ccca471cdde89e3b84aa

          SHA1

          14c6f767b961eef2be43b1d9711f9c9e6cf2acef

          SHA256

          c237c4557d3530c3f336ea07a821e974278b05a169f3b0ef39f9783790628afc

          SHA512

          1daf4f79b0bab9ce55f91af419c996291c001d65a38650d04a5eca0fe539d027a13e278602b5536430906a3babe88fddd818f7cc2bf669b5f60dd45d7b1304df

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          63c4b47246e210965db63117253fee70

          SHA1

          bc70c9d4e2e04ce19ba05e106fe80129ff276ace

          SHA256

          2194b09b6b441fa15e400dd17b38d6f2a24e30c61d31939e6c38768c95c52acf

          SHA512

          835636bfb4a41caa8f3b4022a3fdf8646655001aba913d166df6d4ed2633712ca025a66fe111076ed1cefa0918b52c600cd016581bd4d1b6a9cbe32eaf8ce4be

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          10b3bd59f2ec5345cabff258dc87e24f

          SHA1

          ff9a04d33f9be58317e5c527d1a723de497adda9

          SHA256

          19967abbf2025d9935f8dbec575344bf549f2fe3b659617ada84a5bf2626e9a2

          SHA512

          e55dbbaea2867467a5dac6b595f8db4c4a91e064692096acfd24570024048c5327cb2ee04380e247d534578448a855ab3499512792ddf49349292f1e66392af7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          83f05da2ffaae8994f988e55da7bcbb7

          SHA1

          fa84f42de9b3dd47992abbdf76d3d4208ea27de4

          SHA256

          9f988da850fb06783b58c64b1f4d0aefe996934741a59990f92cc58592408a91

          SHA512

          d80c002049a10681123caefe5abeca305f86be4d4d1b29604e419184313427e3641411fc6ec16897776280634b88064b7c4fad0947689b2fdf7e3d39ac52d8eb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          66067689821f6ec41ae78e1fbc3a2098

          SHA1

          1d6ab2ceb31f9cbbf51f38b825688d065f973a68

          SHA256

          53b2c2cca2eed1f92f1eeb07f18ad047e5313fbd98c8c73de5393c053ede6769

          SHA512

          19a4ebda4c63d51ddcf8e547664e89b084a74aaabc0c326c63bbee0d277cdc7c0843c7d906d32a1b792d80fee2b09ff49561db7a37394320aa590d97e09e9400

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          50ce80c3ff2427794b08167c22737864

          SHA1

          f05c8527befaca854d77cac99b6b09eb11ba7f4c

          SHA256

          edb20f1c82bcbd76424835cb46f1111552f143a204dddbdd152779c703c01d68

          SHA512

          4feb16b49f3065e91431ddeaf7538d7bd86d2733d6e03a525f54db07ac6fa5e9e73d106db548ab766226a4339d43c5d66495aeec3190d4a89c5457df16565b04

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          71a493ee2052ddf358d9751d96b7f9a2

          SHA1

          e4fbe4e3c9752db740e4cdbb8d965e6d505eb77b

          SHA256

          44ecf8adb653dce86f7d16fb565439a74d855892798c88ebc8862077bd216970

          SHA512

          215cfde311a1cb0e4cb882e335f9e64a9e35088d0b61197ef96a1ea4e36a838170a1ec8a2037ecf8417ac40a7a42d41c1b7852be17af92778349159d4c3b7aa1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          03fcd7f6e23cd0efdd20e58e6e4ee928

          SHA1

          371b1e18b65fac691b7286cda200fa406afc748e

          SHA256

          d7b27b9f9b900719ba2279acf00e3e5e717dbc4eefc40a7036a7f223b1bf491a

          SHA512

          1c3c4ec102acce853ecb6341104a64176b06e3babfeb1b4528e58ff02cca440b0af80bb8930bf952cad41452fb8a00e06dc8f9322c2448c7379b6f381e7460d2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          5f321dd8d66263f7aa62801ff214d97d

          SHA1

          12f21504fac3ae90ac6d88e368a62c40e46b6de5

          SHA256

          82fa47de19269cfb47142fc5b9a6846b9d6ed093c9de499d2e723fbf04b27419

          SHA512

          1de0d007420e66e354469893cb854ca88cbb8bec2fdc6e405d58475670dc64a3647f1115e7ebbf840b4f216e34d8bc1f6cbc4e50770a9f45eada6cb921b5778a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          62e4c065c382e6f546dc29ef31bff28a

          SHA1

          b1d372c0507391372e188667c3f2674167be2934

          SHA256

          d1aa46df4f99a7147e033605dca152da5207720ee357671a652a16b0d992b4c8

          SHA512

          3fe616bb264679c475c49e8f666476e85acfb7f939c2b02e614ac0624bf4d56dcb7466ac9d00c4288414f9d1da1ddfd071458e0ef71eaa8ab08abd8706ddd13b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          c41e275f8756d39793b553c72f60d61b

          SHA1

          66eba3129529219fe9998d4d03b688a584f3fa82

          SHA256

          a4ca0841ee2c05af1c791bc1d4f3f1a99165ffe2f22bdc18ccc5a1f293ad6d60

          SHA512

          4ca4b7a2042149d80f2dc7b2cef55557aa49555d7b6f47f23841e60e6257c65d0be473275c83f629fa5a476074a9a17cb4edf76df39766d5e31ac02741a4d767

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          0386dab0dd559818b0be98bf9d898df2

          SHA1

          a7c17fdd13f4176fe68a9d4c798a0d524623b3ec

          SHA256

          54bba735b51ec13b519f44cf70959b7c073a7d14ff20d8d2987e348047da73f5

          SHA512

          6e9746fba71907f09ee6c236a7fae9c2219505657554c9eb3b526d993a7a40c2ba41efc301448d1789e95d8cbd97955bb1c5293b5e05380d94b206883849ba3f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          b03316d038d94bb987a3bc54b9536a1a

          SHA1

          ffac714937d87b0b3dfd6675f35b8968b0dbb7fb

          SHA256

          72986f318cf241903fa1385c0e37d34721082f4166528bb7cbc8d061af0717cd

          SHA512

          f1f428cccad5b105f980ea01ed2d2ddf8ab589ef9bb92c4f1a29c22bd14d28e401d967284fadd1328b320eb4287b64d3c35d52948291b8b10b9d3a8e43b4ce32

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          841ec79726c3cf24fc678acf89ed044f

          SHA1

          baf55718a3ddc85c93c4235918ebc0ac0d06da8b

          SHA256

          280e714421423e1aa561fbfe9c9a15973eee3fecff8f4a9d030b9cbb4ead1574

          SHA512

          4230f30b87ef32cb462b43246ba5b5c56d242dff5821e10166c216ca518dc418da73792b2ce675f8d81e4da59e34915935de6d00e4aad8acc71d99ac33b02332

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OV51DDG5\bHHqxfpBN[1].js

          Filesize

          32KB

          MD5

          f48baec69cc4dc0852d118259eff2d56

          SHA1

          e64c6e4423421da5b35700154810cb67160bc32b

          SHA256

          463d99ca5448f815a05b2d946ddae9eed3e21c335c0f4cfe7a16944e3512f76c

          SHA512

          06fdccb5d9536ab7c68355dbf49ac02ebccad5a4ea01cb62200fd67728a6d05c276403e588a5bdceacf5e671913fc65b63e8b92456ca5493dae5b5a70e4a8b37

        • C:\Users\Admin\AppData\Local\Temp\Cab8883.tmp

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\Tar88F6.tmp

          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • C:\Users\Admin\AppData\Local\Temp\wmpscfgs.exe

          Filesize

          8.3MB

          MD5

          1c012e00e92803fc93035d13f7034f44

          SHA1

          9caa662671c4574c2b19efa2ad7767d6c175535f

          SHA256

          e2a7670a0ab6be94dc3ff1122b87d1f3435f2c4343c70bb512c224f37eae9a34

          SHA512

          ee4ccd63eb33439b556c752246f2ac4ffbf66668c697b7990d1f4ab24c2b16cff7b381aa36cfe0bd8f954a4cf78d6819db1fa2575c907ee2b6f33a7d50d56f04

        • C:\Users\Admin\AppData\Local\Temp\~DF062E801B9655073C.TMP

          Filesize

          16KB

          MD5

          0f6263188216b9e8a860c45557047526

          SHA1

          af227e759f4938c0e3477c5d77a71fb605624cf9

          SHA256

          c87c51367d4c30352b71488d572a394f28c6e1f2e378822ca9ccfd9b11d0321c

          SHA512

          cd0a0b07569dbb6aa290a5b602b8039c47f9039c7f2d85542566f94ced17f0e03871afc466272e85868b155cd1e5a2006cfd5d33ad5432d2ccbe1ae6c2a23e32

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\35GXNOZP.txt

          Filesize

          123B

          MD5

          024b75c5b4ad9262684e1d0cf91add35

          SHA1

          f7ec3c02d594402a118e31120fc32044b074057c

          SHA256

          f75b6ee49671d70b356dba2354a6d1974c1cf2abf6edbad60efb2b7cf351ee23

          SHA512

          cd36f851dac98db9363d2f88e3950a4e8b1124603c22630e8c72c55cd89d8c3f7046b9b61bb47f5895e8d253021aac80ccecb408483e3d97a2a40567a88182b9

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\MTNNGFNG.txt

          Filesize

          107B

          MD5

          67872c0955c8f790ac6373671fc3c5cc

          SHA1

          da086d4f300f5288b5d86a59584f299034150c60

          SHA256

          7dc190bd85300cb302a0d53f1f9937df845ce9e62c683040a874e52fcd1cd88f

          SHA512

          b111997ef25195143dd13b539c8de8acf23ceb2c945a31954a2e6dd817b568e5df27b007385aa6f8d7adcb8c5b604441f79718e88d3415bc74c4240ae1969e09

        • \??\c:\program files (x86)\microsoft office\office14\bcssync.exe

          Filesize

          8.3MB

          MD5

          4c611901b7a92067cf65fdeba4faa26e

          SHA1

          df56b7dcc0c6186566331dce878d126df58797dd

          SHA256

          523b664cd81ccb9908aaf65d14e48d4a3be460debdf3a3003dcb4a6885f36cde

          SHA512

          1983aa7964d2f539f437f1231581d27cb6bd3517d93af5b774490eafb983eb635f8c83f074b77bd93c3243148edc5ee20c0beb8f6906b511be86f38a4356b57a

        • memory/1892-90-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/1892-72-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2120-29-0x0000000010000000-0x0000000010010000-memory.dmp

          Filesize

          64KB

        • memory/2120-44-0x0000000000880000-0x0000000000882000-memory.dmp

          Filesize

          8KB

        • memory/2120-36-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2120-28-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2156-18-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2156-71-0x00000000002A0000-0x00000000002C5000-memory.dmp

          Filesize

          148KB

        • memory/2156-537-0x00000000002A0000-0x00000000002C5000-memory.dmp

          Filesize

          148KB

        • memory/2156-35-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2156-70-0x00000000002A0000-0x00000000002C5000-memory.dmp

          Filesize

          148KB

        • memory/2156-74-0x00000000003D0000-0x00000000003D2000-memory.dmp

          Filesize

          8KB

        • memory/2384-525-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2384-73-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2432-26-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2432-11-0x0000000000470000-0x0000000000495000-memory.dmp

          Filesize

          148KB

        • memory/2432-17-0x0000000000470000-0x0000000000495000-memory.dmp

          Filesize

          148KB

        • memory/2432-1-0x0000000010000000-0x0000000010010000-memory.dmp

          Filesize

          64KB

        • memory/2432-0-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB