Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    47s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 06:25

General

  • Target

    Trojan-Ransom.Win32.Blocker.exe

  • Size

    14KB

  • MD5

    331add07bd368ff7f40f722a1b86c18c

  • SHA1

    02b1b1faca8d7a3e16bb204710e1dc1f48a2db70

  • SHA256

    7a3cd98c65716349dec157732c0fc20d3de989ca3963081e0f9bf3395ce5180a

  • SHA512

    6204a7fc7ac4382f5b5ac358e3ed1c66361ad8b5c6f07bb35a1b5c402df0452088e37ddd42662c676f49667396840fc330104c38540e51a80c0d182235fe6883

  • SSDEEP

    384:3AHFMtzdh88K+WoSm4QxIgVDDuFQPqhVcILKle380:QluxWZQxI6DDue4B3

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 10 IoCs
  • Disables RegEdit via registry modification 10 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 20 IoCs
  • Drops file in Windows directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe
    "C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Windows\win16.exe
      C:\Windows\win16.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      PID:1216
    • C:\Windows\win32.exe
      C:\Windows\win32.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      PID:1464
    • C:\Users\Admin\AppData\Local\Temp\nvsvc32.exe
      C:\Users\Admin\AppData\Local\Temp\nvsvc32.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      PID:1352
    • C:\Windows\avp32.exe
      C:\Windows\avp32.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      PID:588
    • C:\Users\Admin\AppData\Local\Temp\user.exe
      C:\Users\Admin\AppData\Local\Temp\user.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      PID:1280
    • C:\Users\Admin\AppData\Local\Temp\mdm.exe
      C:\Users\Admin\AppData\Local\Temp\mdm.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      PID:536
    • C:\Users\Admin\AppData\Local\Temp\winamp.exe
      C:\Users\Admin\AppData\Local\Temp\winamp.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      PID:888
    • C:\Windows\msmgm.exe
      C:\Windows\msmgm.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      PID:1656
    • C:\Users\Admin\AppData\Local\Temp\win16.exe
      C:\Users\Admin\AppData\Local\Temp\win16.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      PID:836
    • C:\Users\Admin\AppData\Local\Temp\avp32.exe
      C:\Users\Admin\AppData\Local\Temp\avp32.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      PID:1832

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\avp32.exe

    Filesize

    14KB

    MD5

    b65b9ed8a06e6aa2ae656aaa12509792

    SHA1

    97390f3d7be9763e9dcf6600b20013227aa67e5e

    SHA256

    557581f25e836fdb109fc06fbdd08587290de496b0036b6dfba15efd9f99ee12

    SHA512

    701a53758d32d537be4f47d95050f71102f7cba3946b13ac00c3a11f30764ed4176ea1e9678f57dcdf5de968b834137addf9fe38bf9892eae037be61e440aa97

  • C:\Users\Admin\AppData\Local\Temp\avp32.exe

    Filesize

    14KB

    MD5

    b65b9ed8a06e6aa2ae656aaa12509792

    SHA1

    97390f3d7be9763e9dcf6600b20013227aa67e5e

    SHA256

    557581f25e836fdb109fc06fbdd08587290de496b0036b6dfba15efd9f99ee12

    SHA512

    701a53758d32d537be4f47d95050f71102f7cba3946b13ac00c3a11f30764ed4176ea1e9678f57dcdf5de968b834137addf9fe38bf9892eae037be61e440aa97

  • C:\Users\Admin\AppData\Local\Temp\mdm.exe

    Filesize

    14KB

    MD5

    46f1fd1ff8ac8bab84873d00cd634384

    SHA1

    0198f9317f4c7844954903fa08a8fbaf592eeec4

    SHA256

    2d5ef3b8f3ab429509304ebafae70f4dace849a47655183106e1f93d5e64c929

    SHA512

    830fd6cd6aabd38602b75635a60428837a9e16d22a8a935e5414fecab1c27340a88f565b981501a41517ce7648426196dbc7d4fd9bf9383fbd7e54c7241656b2

  • C:\Users\Admin\AppData\Local\Temp\mdm.exe

    Filesize

    14KB

    MD5

    46f1fd1ff8ac8bab84873d00cd634384

    SHA1

    0198f9317f4c7844954903fa08a8fbaf592eeec4

    SHA256

    2d5ef3b8f3ab429509304ebafae70f4dace849a47655183106e1f93d5e64c929

    SHA512

    830fd6cd6aabd38602b75635a60428837a9e16d22a8a935e5414fecab1c27340a88f565b981501a41517ce7648426196dbc7d4fd9bf9383fbd7e54c7241656b2

  • C:\Users\Admin\AppData\Local\Temp\nvsvc32.exe

    Filesize

    14KB

    MD5

    4ae36527fbbd892eeecd83d4518ef77a

    SHA1

    20552d7deea8f6fa3370d7deeef6ed1c86c8c235

    SHA256

    082983fee7dce4db0ac01446afa85c8be24ff5bc58fe7417fb99b1449a256433

    SHA512

    4d3b69322d9364c463d71c8f65e176a9a25b6a88da837231d6b4ef8374e75fa4282ee2084e4e6e42118bf3b27a7fa53e090792e238945020affd0d28e8648393

  • C:\Users\Admin\AppData\Local\Temp\nvsvc32.exe

    Filesize

    14KB

    MD5

    4ae36527fbbd892eeecd83d4518ef77a

    SHA1

    20552d7deea8f6fa3370d7deeef6ed1c86c8c235

    SHA256

    082983fee7dce4db0ac01446afa85c8be24ff5bc58fe7417fb99b1449a256433

    SHA512

    4d3b69322d9364c463d71c8f65e176a9a25b6a88da837231d6b4ef8374e75fa4282ee2084e4e6e42118bf3b27a7fa53e090792e238945020affd0d28e8648393

  • C:\Users\Admin\AppData\Local\Temp\user.exe

    Filesize

    14KB

    MD5

    ee480da12e9b2463d0349f602b8c8ffe

    SHA1

    6dd7806ef499af7889d98049e466af25d0adf5a4

    SHA256

    f3a68428f018a6b139f01a5fe11242767ab8bbbc7441b76a152f36cab83760e8

    SHA512

    bd1526bb5ab22b7a55ebbd769232347c98b92096bb732973aaa74d47c365faa2575cd36140e8c7eaf365fdd608c2974b5c7666359d26bdbf240778346a610c2b

  • C:\Users\Admin\AppData\Local\Temp\user.exe

    Filesize

    14KB

    MD5

    ee480da12e9b2463d0349f602b8c8ffe

    SHA1

    6dd7806ef499af7889d98049e466af25d0adf5a4

    SHA256

    f3a68428f018a6b139f01a5fe11242767ab8bbbc7441b76a152f36cab83760e8

    SHA512

    bd1526bb5ab22b7a55ebbd769232347c98b92096bb732973aaa74d47c365faa2575cd36140e8c7eaf365fdd608c2974b5c7666359d26bdbf240778346a610c2b

  • C:\Users\Admin\AppData\Local\Temp\win16.exe

    Filesize

    14KB

    MD5

    72c273541c42336c55b71d2cfcec4e49

    SHA1

    748ecb750d7501ec45400fff7d086dbc53d54336

    SHA256

    e05599ac8e4a2bf6fe41d73e25982f85a9141a864554d3f1a7fdca5a5be0f71e

    SHA512

    7847870446a6b4861b4c4c5ec3a285330fd673b3808b50070473a63560147dc0c7b1db854f32f39ce96a83ceb6fd2b4d15cbf43977a90518c667a6a64ee61c36

  • C:\Users\Admin\AppData\Local\Temp\win16.exe

    Filesize

    14KB

    MD5

    72c273541c42336c55b71d2cfcec4e49

    SHA1

    748ecb750d7501ec45400fff7d086dbc53d54336

    SHA256

    e05599ac8e4a2bf6fe41d73e25982f85a9141a864554d3f1a7fdca5a5be0f71e

    SHA512

    7847870446a6b4861b4c4c5ec3a285330fd673b3808b50070473a63560147dc0c7b1db854f32f39ce96a83ceb6fd2b4d15cbf43977a90518c667a6a64ee61c36

  • C:\Users\Admin\AppData\Local\Temp\winamp.exe

    Filesize

    14KB

    MD5

    e4c0bd6f07cc3439e77aab466353eaa5

    SHA1

    7fb3ea8126301b8256e7a5ce55d81fcf1941c701

    SHA256

    d71df63262d0cd955db8f4e8cfd53ba1e726ab48886a0ce7d9f0e5dd2e352186

    SHA512

    907a6ef4ef89c6ec4faeec3f695b1daffa42c05fc00077cbee1c5f1a4b1dad2b9431ed276e18e2abd73a136e43af700025394e0c93880d6ec6ba298c4d8330a2

  • C:\Users\Admin\AppData\Local\Temp\winamp.exe

    Filesize

    14KB

    MD5

    e4c0bd6f07cc3439e77aab466353eaa5

    SHA1

    7fb3ea8126301b8256e7a5ce55d81fcf1941c701

    SHA256

    d71df63262d0cd955db8f4e8cfd53ba1e726ab48886a0ce7d9f0e5dd2e352186

    SHA512

    907a6ef4ef89c6ec4faeec3f695b1daffa42c05fc00077cbee1c5f1a4b1dad2b9431ed276e18e2abd73a136e43af700025394e0c93880d6ec6ba298c4d8330a2

  • C:\Users\Admin\AppData\Local\Temp\yawghd72y7huhd.tmp

    Filesize

    4B

    MD5

    73b41f59afe9c32aebbe056b47738916

    SHA1

    b9986177c9d13520fe4c55b83ce091536b64b360

    SHA256

    c64311f1dddbaa5d8b09c4f5bbd4774acfdc37ae6bba2167a9f1a83c35c7c2a1

    SHA512

    d0b53d52061e13a9bdff70cdc892cd48cd4eb6dc8023c02035b46582d82c9c4d88dd1ceb569031d4367a1944de7da285f08bb806913b0071bf55f489d34db994

  • C:\Windows\avp32.exe

    Filesize

    14KB

    MD5

    72c273541c42336c55b71d2cfcec4e49

    SHA1

    748ecb750d7501ec45400fff7d086dbc53d54336

    SHA256

    e05599ac8e4a2bf6fe41d73e25982f85a9141a864554d3f1a7fdca5a5be0f71e

    SHA512

    7847870446a6b4861b4c4c5ec3a285330fd673b3808b50070473a63560147dc0c7b1db854f32f39ce96a83ceb6fd2b4d15cbf43977a90518c667a6a64ee61c36

  • C:\Windows\avp32.exe

    Filesize

    14KB

    MD5

    72c273541c42336c55b71d2cfcec4e49

    SHA1

    748ecb750d7501ec45400fff7d086dbc53d54336

    SHA256

    e05599ac8e4a2bf6fe41d73e25982f85a9141a864554d3f1a7fdca5a5be0f71e

    SHA512

    7847870446a6b4861b4c4c5ec3a285330fd673b3808b50070473a63560147dc0c7b1db854f32f39ce96a83ceb6fd2b4d15cbf43977a90518c667a6a64ee61c36

  • C:\Windows\msmgm.exe

    Filesize

    14KB

    MD5

    e4c0bd6f07cc3439e77aab466353eaa5

    SHA1

    7fb3ea8126301b8256e7a5ce55d81fcf1941c701

    SHA256

    d71df63262d0cd955db8f4e8cfd53ba1e726ab48886a0ce7d9f0e5dd2e352186

    SHA512

    907a6ef4ef89c6ec4faeec3f695b1daffa42c05fc00077cbee1c5f1a4b1dad2b9431ed276e18e2abd73a136e43af700025394e0c93880d6ec6ba298c4d8330a2

  • C:\Windows\msmgm.exe

    Filesize

    14KB

    MD5

    e4c0bd6f07cc3439e77aab466353eaa5

    SHA1

    7fb3ea8126301b8256e7a5ce55d81fcf1941c701

    SHA256

    d71df63262d0cd955db8f4e8cfd53ba1e726ab48886a0ce7d9f0e5dd2e352186

    SHA512

    907a6ef4ef89c6ec4faeec3f695b1daffa42c05fc00077cbee1c5f1a4b1dad2b9431ed276e18e2abd73a136e43af700025394e0c93880d6ec6ba298c4d8330a2

  • C:\Windows\win16.exe

    Filesize

    14KB

    MD5

    006ff4d3b7554fd86a745210ccae55f3

    SHA1

    ef95906b7518695270397a105489f7be4491c417

    SHA256

    6c05b10d8fde4e79cee4c33692e1887e68f240efc55dca8b622212548b9c8637

    SHA512

    a28896ca16be2738ff59175a9e4817beb2857dc874fc6f6c7016f8af676925a69d360c0c81a3fecdfd725c805db5d40a956e7eae3e93137177813d4c3754fd42

  • C:\Windows\win16.exe

    Filesize

    14KB

    MD5

    006ff4d3b7554fd86a745210ccae55f3

    SHA1

    ef95906b7518695270397a105489f7be4491c417

    SHA256

    6c05b10d8fde4e79cee4c33692e1887e68f240efc55dca8b622212548b9c8637

    SHA512

    a28896ca16be2738ff59175a9e4817beb2857dc874fc6f6c7016f8af676925a69d360c0c81a3fecdfd725c805db5d40a956e7eae3e93137177813d4c3754fd42

  • C:\Windows\win32.exe

    Filesize

    14KB

    MD5

    cadfae16bc19b7230d224504ee10ad7d

    SHA1

    6ab34b51cb74c009c7c46aa4b24f927affa57306

    SHA256

    06e08082c8da418088a9e5a6f47ee9e765b4ce8d50a50dde622809d481ef3476

    SHA512

    f2fa48edb0cd93b65bc0ee820246fb63dd3dca60828110e619a5a9d3dbe016c982352e89910f82114025836b33d9c9bfca3a6d5b273c77aa91ae9bcc07c2c4c0

  • C:\Windows\win32.exe

    Filesize

    14KB

    MD5

    cadfae16bc19b7230d224504ee10ad7d

    SHA1

    6ab34b51cb74c009c7c46aa4b24f927affa57306

    SHA256

    06e08082c8da418088a9e5a6f47ee9e765b4ce8d50a50dde622809d481ef3476

    SHA512

    f2fa48edb0cd93b65bc0ee820246fb63dd3dca60828110e619a5a9d3dbe016c982352e89910f82114025836b33d9c9bfca3a6d5b273c77aa91ae9bcc07c2c4c0

  • \Users\Admin\AppData\Local\Temp\avp32.exe

    Filesize

    14KB

    MD5

    b65b9ed8a06e6aa2ae656aaa12509792

    SHA1

    97390f3d7be9763e9dcf6600b20013227aa67e5e

    SHA256

    557581f25e836fdb109fc06fbdd08587290de496b0036b6dfba15efd9f99ee12

    SHA512

    701a53758d32d537be4f47d95050f71102f7cba3946b13ac00c3a11f30764ed4176ea1e9678f57dcdf5de968b834137addf9fe38bf9892eae037be61e440aa97

  • \Users\Admin\AppData\Local\Temp\avp32.exe

    Filesize

    14KB

    MD5

    b65b9ed8a06e6aa2ae656aaa12509792

    SHA1

    97390f3d7be9763e9dcf6600b20013227aa67e5e

    SHA256

    557581f25e836fdb109fc06fbdd08587290de496b0036b6dfba15efd9f99ee12

    SHA512

    701a53758d32d537be4f47d95050f71102f7cba3946b13ac00c3a11f30764ed4176ea1e9678f57dcdf5de968b834137addf9fe38bf9892eae037be61e440aa97

  • \Users\Admin\AppData\Local\Temp\mdm.exe

    Filesize

    14KB

    MD5

    46f1fd1ff8ac8bab84873d00cd634384

    SHA1

    0198f9317f4c7844954903fa08a8fbaf592eeec4

    SHA256

    2d5ef3b8f3ab429509304ebafae70f4dace849a47655183106e1f93d5e64c929

    SHA512

    830fd6cd6aabd38602b75635a60428837a9e16d22a8a935e5414fecab1c27340a88f565b981501a41517ce7648426196dbc7d4fd9bf9383fbd7e54c7241656b2

  • \Users\Admin\AppData\Local\Temp\mdm.exe

    Filesize

    14KB

    MD5

    46f1fd1ff8ac8bab84873d00cd634384

    SHA1

    0198f9317f4c7844954903fa08a8fbaf592eeec4

    SHA256

    2d5ef3b8f3ab429509304ebafae70f4dace849a47655183106e1f93d5e64c929

    SHA512

    830fd6cd6aabd38602b75635a60428837a9e16d22a8a935e5414fecab1c27340a88f565b981501a41517ce7648426196dbc7d4fd9bf9383fbd7e54c7241656b2

  • \Users\Admin\AppData\Local\Temp\nvsvc32.exe

    Filesize

    14KB

    MD5

    4ae36527fbbd892eeecd83d4518ef77a

    SHA1

    20552d7deea8f6fa3370d7deeef6ed1c86c8c235

    SHA256

    082983fee7dce4db0ac01446afa85c8be24ff5bc58fe7417fb99b1449a256433

    SHA512

    4d3b69322d9364c463d71c8f65e176a9a25b6a88da837231d6b4ef8374e75fa4282ee2084e4e6e42118bf3b27a7fa53e090792e238945020affd0d28e8648393

  • \Users\Admin\AppData\Local\Temp\nvsvc32.exe

    Filesize

    14KB

    MD5

    4ae36527fbbd892eeecd83d4518ef77a

    SHA1

    20552d7deea8f6fa3370d7deeef6ed1c86c8c235

    SHA256

    082983fee7dce4db0ac01446afa85c8be24ff5bc58fe7417fb99b1449a256433

    SHA512

    4d3b69322d9364c463d71c8f65e176a9a25b6a88da837231d6b4ef8374e75fa4282ee2084e4e6e42118bf3b27a7fa53e090792e238945020affd0d28e8648393

  • \Users\Admin\AppData\Local\Temp\user.exe

    Filesize

    14KB

    MD5

    ee480da12e9b2463d0349f602b8c8ffe

    SHA1

    6dd7806ef499af7889d98049e466af25d0adf5a4

    SHA256

    f3a68428f018a6b139f01a5fe11242767ab8bbbc7441b76a152f36cab83760e8

    SHA512

    bd1526bb5ab22b7a55ebbd769232347c98b92096bb732973aaa74d47c365faa2575cd36140e8c7eaf365fdd608c2974b5c7666359d26bdbf240778346a610c2b

  • \Users\Admin\AppData\Local\Temp\user.exe

    Filesize

    14KB

    MD5

    ee480da12e9b2463d0349f602b8c8ffe

    SHA1

    6dd7806ef499af7889d98049e466af25d0adf5a4

    SHA256

    f3a68428f018a6b139f01a5fe11242767ab8bbbc7441b76a152f36cab83760e8

    SHA512

    bd1526bb5ab22b7a55ebbd769232347c98b92096bb732973aaa74d47c365faa2575cd36140e8c7eaf365fdd608c2974b5c7666359d26bdbf240778346a610c2b

  • \Users\Admin\AppData\Local\Temp\win16.exe

    Filesize

    14KB

    MD5

    72c273541c42336c55b71d2cfcec4e49

    SHA1

    748ecb750d7501ec45400fff7d086dbc53d54336

    SHA256

    e05599ac8e4a2bf6fe41d73e25982f85a9141a864554d3f1a7fdca5a5be0f71e

    SHA512

    7847870446a6b4861b4c4c5ec3a285330fd673b3808b50070473a63560147dc0c7b1db854f32f39ce96a83ceb6fd2b4d15cbf43977a90518c667a6a64ee61c36

  • \Users\Admin\AppData\Local\Temp\win16.exe

    Filesize

    14KB

    MD5

    72c273541c42336c55b71d2cfcec4e49

    SHA1

    748ecb750d7501ec45400fff7d086dbc53d54336

    SHA256

    e05599ac8e4a2bf6fe41d73e25982f85a9141a864554d3f1a7fdca5a5be0f71e

    SHA512

    7847870446a6b4861b4c4c5ec3a285330fd673b3808b50070473a63560147dc0c7b1db854f32f39ce96a83ceb6fd2b4d15cbf43977a90518c667a6a64ee61c36

  • \Users\Admin\AppData\Local\Temp\winamp.exe

    Filesize

    14KB

    MD5

    e4c0bd6f07cc3439e77aab466353eaa5

    SHA1

    7fb3ea8126301b8256e7a5ce55d81fcf1941c701

    SHA256

    d71df63262d0cd955db8f4e8cfd53ba1e726ab48886a0ce7d9f0e5dd2e352186

    SHA512

    907a6ef4ef89c6ec4faeec3f695b1daffa42c05fc00077cbee1c5f1a4b1dad2b9431ed276e18e2abd73a136e43af700025394e0c93880d6ec6ba298c4d8330a2

  • \Users\Admin\AppData\Local\Temp\winamp.exe

    Filesize

    14KB

    MD5

    e4c0bd6f07cc3439e77aab466353eaa5

    SHA1

    7fb3ea8126301b8256e7a5ce55d81fcf1941c701

    SHA256

    d71df63262d0cd955db8f4e8cfd53ba1e726ab48886a0ce7d9f0e5dd2e352186

    SHA512

    907a6ef4ef89c6ec4faeec3f695b1daffa42c05fc00077cbee1c5f1a4b1dad2b9431ed276e18e2abd73a136e43af700025394e0c93880d6ec6ba298c4d8330a2

  • memory/588-77-0x0000000075681000-0x0000000075683000-memory.dmp

    Filesize

    8KB