Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 03:13 UTC

General

  • Target

    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe

  • Size

    152KB

  • MD5

    f432a89d4ba2e6aa2975335f3a57da1b

  • SHA1

    815689ebd707d7e55fd35815958db05c923b590c

  • SHA256

    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a

  • SHA512

    c7dba55980d6a3ee5871ec9a50227f7e92e8f2bd4a74d25d15ae76f0110f437ac215fe3ec25921b6f2b0167ca044d5a35835477756c2dae86344b32844a81905

  • SSDEEP

    3072:yIl0QiGEomaClFmwbcDRMjEBZ4v9xDx71yHVJA/ndH5:uJG2rv3cGBvHV7Wknd

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    "C:\Users\Admin\AppData\Local\Temp\7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:5036
    • C:\Windows\SysWOW64\regedt32.exe
      "C:\Windows\System32\regedt32.exe" /s "C:\Users\Admin\Documents\Iterra\T03emp03.reg"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\regedit.exe" /s "C:\Users\Admin\Documents\Iterra\T03emp03.reg"
        3⤵
        • Runs .reg file with regedit
        PID:3436
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 1012
      2⤵
      • Loads dropped DLL
      • Program crash
      PID:2288
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 984
      2⤵
      • Loads dropped DLL
      • Program crash
      PID:2356
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 5036 -ip 5036
    1⤵
    • Loads dropped DLL
    PID:5048
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 5036 -ip 5036
    1⤵
    • Loads dropped DLL
    PID:2324

Network

  • flag-unknown
    DNS
    knockdast.com
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    knockdast.com
    IN A
    Response
  • flag-unknown
    DNS
    geodeline.com
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    geodeline.com
    IN A
    Response
  • flag-unknown
    DNS
    degoog1etag.com
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    degoog1etag.com
    IN A
    Response
  • flag-unknown
    DNS
    detoxist.com
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    detoxist.com
    IN A
    Response
    detoxist.com
    IN A
    35.186.238.101
  • flag-unknown
    GET
    http://analystics.google.com/phpbb/get.php?id=89BA70485289E08F466E527D41B20000&key=748&av=0&vm=0&al=0&p=449&os=6.2.9200.0&z=458&hash=0blQ8BTlJscMgR34BDl/xPYpqKA5WfVRskzoTpwM+mOr/Zjyay+kPjJGtYwOmjgmnnXY3TfmyKT1EggtUEx23Y32lFUwQ3RK
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    35.186.238.101:80
    Request
    GET /phpbb/get.php?id=89BA70485289E08F466E527D41B20000&key=748&av=0&vm=0&al=0&p=449&os=6.2.9200.0&z=458&hash=0blQ8BTlJscMgR34BDl/xPYpqKA5WfVRskzoTpwM+mOr/Zjyay+kPjJGtYwOmjgmnnXY3TfmyKT1EggtUEx23Y32lFUwQ3RK HTTP/1.1
    Host: analystics.google.com
    Response
    HTTP/1.1 403 Forbidden
    Server: openresty
    Date: Sat, 03 Dec 2022 05:42:57 GMT
    Content-Type: text/html
    Content-Length: 291
    ETag: "6382c3e0-123"
    Via: 1.1 google
  • flag-unknown
    DNS
    getinball.com
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    getinball.com
    IN A
    Response
  • flag-unknown
    DNS
    debijonda.com
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    debijonda.com
    IN A
    Response
  • flag-unknown
    DNS
    veroconma.com
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    veroconma.com
    IN A
    Response
  • flag-unknown
    DNS
    theloamva.com
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    theloamva.com
    IN A
    Response
  • flag-unknown
    DNS
    vornedix.com
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    vornedix.com
    IN A
    Response
  • flag-unknown
    DNS
    dentagod.com
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    dentagod.com
    IN A
    Response
  • flag-unknown
    DNS
    liteworns.com
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    liteworns.com
    IN A
    Response
  • flag-unknown
    DNS
    vengibit.com
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    vengibit.com
    IN A
    Response
  • flag-unknown
    DNS
    tryangets.com
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    tryangets.com
    IN A
    Response
  • flag-unknown
    DNS
    getintsu.com
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    getintsu.com
    IN A
    Response
  • flag-unknown
    DNS
    getavodes.com
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    getavodes.com
    IN A
    Response
  • flag-unknown
    DNS
    tryatdns.com
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    tryatdns.com
    IN A
    Response
  • flag-unknown
    DNS
    fescheck.com
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    fescheck.com
    IN A
    Response
  • flag-unknown
    DNS
    netrovad.com
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    netrovad.com
    IN A
    Response
  • flag-unknown
    DNS
    inzavora.com
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    inzavora.com
    IN A
    Response
  • flag-unknown
    DNS
    terrans.su
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    terrans.su
    IN A
    Response
  • flag-unknown
    DNS
    clickstano.com
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    clickstano.com
    IN A
    Response
  • flag-unknown
    DNS
    denareclick.com
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    denareclick.com
    IN A
    Response
  • flag-unknown
    DNS
    clickbeta.ru
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    clickbeta.ru
    IN A
    Response
  • flag-unknown
    DNS
    nshouse1.com
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    nshouse1.com
    IN A
    Response
  • flag-unknown
    DNS
    clickclans.ru
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    clickclans.ru
    IN A
    Response
  • flag-unknown
    DNS
    clickclans.ru
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    Remote address:
    8.8.8.8:53
    Request
    clickclans.ru
    IN A
    Response
  • 52.152.110.14:443
    260 B
    5
  • 20.42.72.131:443
    322 B
    7
  • 8.253.135.241:80
    322 B
    7
  • 35.186.238.101:80
    http://analystics.google.com/phpbb/get.php?id=89BA70485289E08F466E527D41B20000&key=748&av=0&vm=0&al=0&p=449&os=6.2.9200.0&z=458&hash=0blQ8BTlJscMgR34BDl/xPYpqKA5WfVRskzoTpwM+mOr/Zjyay+kPjJGtYwOmjgmnnXY3TfmyKT1EggtUEx23Y32lFUwQ3RK
    http
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    477 B
    630 B
    5
    4

    HTTP Request

    GET http://analystics.google.com/phpbb/get.php?id=89BA70485289E08F466E527D41B20000&key=748&av=0&vm=0&al=0&p=449&os=6.2.9200.0&z=458&hash=0blQ8BTlJscMgR34BDl/xPYpqKA5WfVRskzoTpwM+mOr/Zjyay+kPjJGtYwOmjgmnnXY3TfmyKT1EggtUEx23Y32lFUwQ3RK

    HTTP Response

    403
  • 91.220.35.154:80
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    260 B
    5
  • 52.152.110.14:443
    260 B
    5
  • 209.197.3.8:80
    322 B
    7
  • 209.197.3.8:80
    322 B
    7
  • 8.253.135.241:80
    322 B
    7
  • 52.152.110.14:443
    260 B
    5
  • 52.152.110.14:443
    260 B
    5
  • 52.152.110.14:443
    260 B
    5
  • 8.8.8.8:53
    knockdast.com
    dns
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    59 B
    132 B
    1
    1

    DNS Request

    knockdast.com

  • 8.8.8.8:53
    geodeline.com
    dns
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    59 B
    132 B
    1
    1

    DNS Request

    geodeline.com

  • 8.8.8.8:53
    degoog1etag.com
    dns
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    61 B
    134 B
    1
    1

    DNS Request

    degoog1etag.com

  • 8.8.8.8:53
    detoxist.com
    dns
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    58 B
    74 B
    1
    1

    DNS Request

    detoxist.com

    DNS Response

    35.186.238.101

  • 8.8.8.8:53
    getinball.com
    dns
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    59 B
    132 B
    1
    1

    DNS Request

    getinball.com

  • 8.8.8.8:53
    debijonda.com
    dns
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    59 B
    132 B
    1
    1

    DNS Request

    debijonda.com

  • 8.8.8.8:53
    veroconma.com
    dns
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    59 B
    132 B
    1
    1

    DNS Request

    veroconma.com

  • 8.8.8.8:53
    theloamva.com
    dns
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    59 B
    132 B
    1
    1

    DNS Request

    theloamva.com

  • 8.8.8.8:53
    vornedix.com
    dns
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    58 B
    131 B
    1
    1

    DNS Request

    vornedix.com

  • 8.8.8.8:53
    dentagod.com
    dns
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    58 B
    131 B
    1
    1

    DNS Request

    dentagod.com

  • 8.8.8.8:53
    liteworns.com
    dns
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    59 B
    132 B
    1
    1

    DNS Request

    liteworns.com

  • 8.8.8.8:53
    vengibit.com
    dns
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    58 B
    131 B
    1
    1

    DNS Request

    vengibit.com

  • 8.8.8.8:53
    tryangets.com
    dns
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    59 B
    132 B
    1
    1

    DNS Request

    tryangets.com

  • 8.8.8.8:53
    getintsu.com
    dns
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    58 B
    131 B
    1
    1

    DNS Request

    getintsu.com

  • 8.8.8.8:53
    getavodes.com
    dns
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    59 B
    132 B
    1
    1

    DNS Request

    getavodes.com

  • 8.8.8.8:53
    tryatdns.com
    dns
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    58 B
    131 B
    1
    1

    DNS Request

    tryatdns.com

  • 8.8.8.8:53
    fescheck.com
    dns
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    58 B
    131 B
    1
    1

    DNS Request

    fescheck.com

  • 8.8.8.8:53
    netrovad.com
    dns
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    58 B
    131 B
    1
    1

    DNS Request

    netrovad.com

  • 8.8.8.8:53
    inzavora.com
    dns
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    58 B
    131 B
    1
    1

    DNS Request

    inzavora.com

  • 8.8.8.8:53
    terrans.su
    dns
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    56 B
    117 B
    1
    1

    DNS Request

    terrans.su

  • 8.8.8.8:53
    clickstano.com
    dns
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    60 B
    133 B
    1
    1

    DNS Request

    clickstano.com

  • 8.8.8.8:53
    denareclick.com
    dns
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    61 B
    134 B
    1
    1

    DNS Request

    denareclick.com

  • 8.8.8.8:53
    clickbeta.ru
    dns
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    58 B
    119 B
    1
    1

    DNS Request

    clickbeta.ru

  • 8.8.8.8:53
    nshouse1.com
    dns
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    58 B
    131 B
    1
    1

    DNS Request

    nshouse1.com

  • 8.8.8.8:53
    clickclans.ru
    dns
    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    118 B
    240 B
    2
    2

    DNS Request

    clickclans.ru

    DNS Request

    clickclans.ru

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Documents\Iterra\T03emp03.reg

    Filesize

    217B

    MD5

    d8841f7d471efa7e3b960da51ece135f

    SHA1

    4b128b589f7f49df4585177d2d2a37356241a0d3

    SHA256

    d411b8fce61ef781402f1e177d3ddef3ba10e9fe7d5b29c0d7f33948ac8655be

    SHA512

    25005451f606d92005baa5604bbced7ee068ea337ba41b3c3bb85fbe6ced6d80becc2ebaa8abfd9012a36d5b00cfc4dd5b89dd10318beaa21a9ea312f4035d56

  • C:\Users\Admin\Documents\Iterra\awwgdlk.dll

    Filesize

    41KB

    MD5

    3fd996d73950eeb6edfa0a2f6589fd89

    SHA1

    3c998a95ff61cf2054c0b155d2a09cf7002d1779

    SHA256

    18a1e581a1a28d82bf0a28d85428fde674cbac0ebe0df9e77dd16f3db540fbfb

    SHA512

    9e8f3b2fa5645825df71ac746a6ff8746e1b062ca97719a0eecec0249149e2bbe8142f76684739040d3657d9f713a21b5a6ec62c77aa9d4d709cf637cb8e5fd1

  • C:\Users\Admin\Documents\Iterra\awwgdlk.dll

    Filesize

    41KB

    MD5

    3fd996d73950eeb6edfa0a2f6589fd89

    SHA1

    3c998a95ff61cf2054c0b155d2a09cf7002d1779

    SHA256

    18a1e581a1a28d82bf0a28d85428fde674cbac0ebe0df9e77dd16f3db540fbfb

    SHA512

    9e8f3b2fa5645825df71ac746a6ff8746e1b062ca97719a0eecec0249149e2bbe8142f76684739040d3657d9f713a21b5a6ec62c77aa9d4d709cf637cb8e5fd1

  • C:\Users\Admin\Documents\Iterra\awwgdlk.dll

    Filesize

    41KB

    MD5

    3fd996d73950eeb6edfa0a2f6589fd89

    SHA1

    3c998a95ff61cf2054c0b155d2a09cf7002d1779

    SHA256

    18a1e581a1a28d82bf0a28d85428fde674cbac0ebe0df9e77dd16f3db540fbfb

    SHA512

    9e8f3b2fa5645825df71ac746a6ff8746e1b062ca97719a0eecec0249149e2bbe8142f76684739040d3657d9f713a21b5a6ec62c77aa9d4d709cf637cb8e5fd1

  • C:\Users\Admin\Documents\Iterra\awwgdlk.dll

    Filesize

    41KB

    MD5

    3fd996d73950eeb6edfa0a2f6589fd89

    SHA1

    3c998a95ff61cf2054c0b155d2a09cf7002d1779

    SHA256

    18a1e581a1a28d82bf0a28d85428fde674cbac0ebe0df9e77dd16f3db540fbfb

    SHA512

    9e8f3b2fa5645825df71ac746a6ff8746e1b062ca97719a0eecec0249149e2bbe8142f76684739040d3657d9f713a21b5a6ec62c77aa9d4d709cf637cb8e5fd1

  • C:\Users\Admin\Documents\Iterra\awwgdlk.dll

    Filesize

    41KB

    MD5

    3fd996d73950eeb6edfa0a2f6589fd89

    SHA1

    3c998a95ff61cf2054c0b155d2a09cf7002d1779

    SHA256

    18a1e581a1a28d82bf0a28d85428fde674cbac0ebe0df9e77dd16f3db540fbfb

    SHA512

    9e8f3b2fa5645825df71ac746a6ff8746e1b062ca97719a0eecec0249149e2bbe8142f76684739040d3657d9f713a21b5a6ec62c77aa9d4d709cf637cb8e5fd1

  • memory/5036-134-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/5036-139-0x0000000003110000-0x00000000031E3000-memory.dmp

    Filesize

    844KB

  • memory/5036-133-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/5036-132-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/5036-144-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.