Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 23:01

General

  • Target

    f85f279eb9593be0d62a7adf93606a89d76993942cfc9127586db0ae218cad9b.exe

  • Size

    1.2MB

  • MD5

    9871fa3afbc32412b38fe669a9750d41

  • SHA1

    33cdc5e27324db9aa5adc8c5f7ec12da9e9714fe

  • SHA256

    f85f279eb9593be0d62a7adf93606a89d76993942cfc9127586db0ae218cad9b

  • SHA512

    a91dd29cbf67b71efad85c12a3e6d947e28d6700a0f6fca90287cda9ac9947a615941ddf6b47bdbcb77e36afafb7195acaac8b477842ff03e21c35853cdfbbf4

  • SSDEEP

    24576:myz8UisYqM/7a+MVS/36YoO5zH5DVmeJI6Xh2EIcoJdEM+:1I2TM/7dMSSz4zNNIe0EIPJdEM

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 17 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f85f279eb9593be0d62a7adf93606a89d76993942cfc9127586db0ae218cad9b.exe
    "C:\Users\Admin\AppData\Local\Temp\f85f279eb9593be0d62a7adf93606a89d76993942cfc9127586db0ae218cad9b.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1996992.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1996992.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5912077.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5912077.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2156
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9618422.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9618422.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7396588.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7396588.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2660
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v1563919.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v1563919.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:2752
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0792050.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0792050.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2724
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2548
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 272
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1996992.exe

    Filesize

    1.1MB

    MD5

    17a8b0f267de9c2a63d2dc1fc504aca2

    SHA1

    15cbeba2245d5f126a32a4a434c75bd4113fa804

    SHA256

    6a4ad5cd8a468c3d621856ae1613696d52c77c07448bf260b5b8ccc0fb5d4f40

    SHA512

    7c637be7ec37c2c7e184bd9c4c5a8cdd29318b1ccb6335d9e5a0ab2e2c744698338e6c5f5338fb190b49b8fefd1dea29abbb10027e76c98565c68fbaa5c421ae

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1996992.exe

    Filesize

    1.1MB

    MD5

    17a8b0f267de9c2a63d2dc1fc504aca2

    SHA1

    15cbeba2245d5f126a32a4a434c75bd4113fa804

    SHA256

    6a4ad5cd8a468c3d621856ae1613696d52c77c07448bf260b5b8ccc0fb5d4f40

    SHA512

    7c637be7ec37c2c7e184bd9c4c5a8cdd29318b1ccb6335d9e5a0ab2e2c744698338e6c5f5338fb190b49b8fefd1dea29abbb10027e76c98565c68fbaa5c421ae

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5912077.exe

    Filesize

    936KB

    MD5

    bb2c6ecc6d873e7e3629d28e44a974e3

    SHA1

    1e2961fcc6f685eefdc2f000c02a9fe9bbbbe64a

    SHA256

    800d543190787b72e8a71579f4b5e85640971eee02838e3d72e538a598b34681

    SHA512

    4c90bf9d3cb728130e19842bcfc6725a5df197829142c2c5d5898b4b11228b3960a7ebb90ae6e3e549792cde09fa0791501df04ca06b5891ee18a6a78ccd9870

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5912077.exe

    Filesize

    936KB

    MD5

    bb2c6ecc6d873e7e3629d28e44a974e3

    SHA1

    1e2961fcc6f685eefdc2f000c02a9fe9bbbbe64a

    SHA256

    800d543190787b72e8a71579f4b5e85640971eee02838e3d72e538a598b34681

    SHA512

    4c90bf9d3cb728130e19842bcfc6725a5df197829142c2c5d5898b4b11228b3960a7ebb90ae6e3e549792cde09fa0791501df04ca06b5891ee18a6a78ccd9870

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9618422.exe

    Filesize

    780KB

    MD5

    5d22f3c665fa028696d64b8b95b5c41e

    SHA1

    aa114166e1b2bbcfcb667516305cfd4f15163778

    SHA256

    34514db6f746843980679c11261608a1a599c3ea50377cd3a4a4d60bb42fc07e

    SHA512

    b6ea42fad1efb1320515feec4808d9650047d9cc13882d59902e36607f896dc25f29af177fa1b44eaa2560fe844d082297c1815865ddb480a47a04b8b27c65f5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9618422.exe

    Filesize

    780KB

    MD5

    5d22f3c665fa028696d64b8b95b5c41e

    SHA1

    aa114166e1b2bbcfcb667516305cfd4f15163778

    SHA256

    34514db6f746843980679c11261608a1a599c3ea50377cd3a4a4d60bb42fc07e

    SHA512

    b6ea42fad1efb1320515feec4808d9650047d9cc13882d59902e36607f896dc25f29af177fa1b44eaa2560fe844d082297c1815865ddb480a47a04b8b27c65f5

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7396588.exe

    Filesize

    603KB

    MD5

    8073133e8b2e05013bd36cd0eb2e5def

    SHA1

    8f265aea4d40a181fa819f5a6f232b8234da90f0

    SHA256

    7dd175e380b5cb735deff28c4660396619dc2ee7634ff1702dddc5ed193068f1

    SHA512

    79b6a88a9aefab93c3744b36e29f8520a3f1c507dbad133a9b2b0922d7ba10aa7c1b3a9f8b37a2a7f45a276ffcd3dbadc091cce231da6dcb919412b5767d486b

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7396588.exe

    Filesize

    603KB

    MD5

    8073133e8b2e05013bd36cd0eb2e5def

    SHA1

    8f265aea4d40a181fa819f5a6f232b8234da90f0

    SHA256

    7dd175e380b5cb735deff28c4660396619dc2ee7634ff1702dddc5ed193068f1

    SHA512

    79b6a88a9aefab93c3744b36e29f8520a3f1c507dbad133a9b2b0922d7ba10aa7c1b3a9f8b37a2a7f45a276ffcd3dbadc091cce231da6dcb919412b5767d486b

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v1563919.exe

    Filesize

    344KB

    MD5

    a28986d818fe540bfcd80c361dabd541

    SHA1

    61712de02c99b920f74f10eeba4517698bb8d3d6

    SHA256

    6a6aea520fc5552febd69bdfce2e2e3e19ec2ab65be81462cc8a2d3dbcec9a40

    SHA512

    c90b08c2a45bbf2830216590a98335304468d5177dff5405d99362943c6227bafc92ef39e0849d8c3eabd6e5c68948980ae0d6c982d17e235c5b58495c53cc55

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v1563919.exe

    Filesize

    344KB

    MD5

    a28986d818fe540bfcd80c361dabd541

    SHA1

    61712de02c99b920f74f10eeba4517698bb8d3d6

    SHA256

    6a6aea520fc5552febd69bdfce2e2e3e19ec2ab65be81462cc8a2d3dbcec9a40

    SHA512

    c90b08c2a45bbf2830216590a98335304468d5177dff5405d99362943c6227bafc92ef39e0849d8c3eabd6e5c68948980ae0d6c982d17e235c5b58495c53cc55

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0792050.exe

    Filesize

    220KB

    MD5

    af2c811a5bf3b974ed3a56b4a9467b12

    SHA1

    94a6dd8df8f405a0cc00a7a95b92513a9927e164

    SHA256

    b699ae04058fde24bfaf9159e8f34eeb6c90bcc56f5d1ab1f3ba7636d5a68fcb

    SHA512

    348013542db44f8d5d95ed9ce0081ce574b41af04057d044583d25a59c7c474c27334a47411dd2a4d5cb257a596c3d80cf4e92573fb8ea0924c1d50b1799cccf

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0792050.exe

    Filesize

    220KB

    MD5

    af2c811a5bf3b974ed3a56b4a9467b12

    SHA1

    94a6dd8df8f405a0cc00a7a95b92513a9927e164

    SHA256

    b699ae04058fde24bfaf9159e8f34eeb6c90bcc56f5d1ab1f3ba7636d5a68fcb

    SHA512

    348013542db44f8d5d95ed9ce0081ce574b41af04057d044583d25a59c7c474c27334a47411dd2a4d5cb257a596c3d80cf4e92573fb8ea0924c1d50b1799cccf

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0792050.exe

    Filesize

    220KB

    MD5

    af2c811a5bf3b974ed3a56b4a9467b12

    SHA1

    94a6dd8df8f405a0cc00a7a95b92513a9927e164

    SHA256

    b699ae04058fde24bfaf9159e8f34eeb6c90bcc56f5d1ab1f3ba7636d5a68fcb

    SHA512

    348013542db44f8d5d95ed9ce0081ce574b41af04057d044583d25a59c7c474c27334a47411dd2a4d5cb257a596c3d80cf4e92573fb8ea0924c1d50b1799cccf

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v1996992.exe

    Filesize

    1.1MB

    MD5

    17a8b0f267de9c2a63d2dc1fc504aca2

    SHA1

    15cbeba2245d5f126a32a4a434c75bd4113fa804

    SHA256

    6a4ad5cd8a468c3d621856ae1613696d52c77c07448bf260b5b8ccc0fb5d4f40

    SHA512

    7c637be7ec37c2c7e184bd9c4c5a8cdd29318b1ccb6335d9e5a0ab2e2c744698338e6c5f5338fb190b49b8fefd1dea29abbb10027e76c98565c68fbaa5c421ae

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v1996992.exe

    Filesize

    1.1MB

    MD5

    17a8b0f267de9c2a63d2dc1fc504aca2

    SHA1

    15cbeba2245d5f126a32a4a434c75bd4113fa804

    SHA256

    6a4ad5cd8a468c3d621856ae1613696d52c77c07448bf260b5b8ccc0fb5d4f40

    SHA512

    7c637be7ec37c2c7e184bd9c4c5a8cdd29318b1ccb6335d9e5a0ab2e2c744698338e6c5f5338fb190b49b8fefd1dea29abbb10027e76c98565c68fbaa5c421ae

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v5912077.exe

    Filesize

    936KB

    MD5

    bb2c6ecc6d873e7e3629d28e44a974e3

    SHA1

    1e2961fcc6f685eefdc2f000c02a9fe9bbbbe64a

    SHA256

    800d543190787b72e8a71579f4b5e85640971eee02838e3d72e538a598b34681

    SHA512

    4c90bf9d3cb728130e19842bcfc6725a5df197829142c2c5d5898b4b11228b3960a7ebb90ae6e3e549792cde09fa0791501df04ca06b5891ee18a6a78ccd9870

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v5912077.exe

    Filesize

    936KB

    MD5

    bb2c6ecc6d873e7e3629d28e44a974e3

    SHA1

    1e2961fcc6f685eefdc2f000c02a9fe9bbbbe64a

    SHA256

    800d543190787b72e8a71579f4b5e85640971eee02838e3d72e538a598b34681

    SHA512

    4c90bf9d3cb728130e19842bcfc6725a5df197829142c2c5d5898b4b11228b3960a7ebb90ae6e3e549792cde09fa0791501df04ca06b5891ee18a6a78ccd9870

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v9618422.exe

    Filesize

    780KB

    MD5

    5d22f3c665fa028696d64b8b95b5c41e

    SHA1

    aa114166e1b2bbcfcb667516305cfd4f15163778

    SHA256

    34514db6f746843980679c11261608a1a599c3ea50377cd3a4a4d60bb42fc07e

    SHA512

    b6ea42fad1efb1320515feec4808d9650047d9cc13882d59902e36607f896dc25f29af177fa1b44eaa2560fe844d082297c1815865ddb480a47a04b8b27c65f5

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v9618422.exe

    Filesize

    780KB

    MD5

    5d22f3c665fa028696d64b8b95b5c41e

    SHA1

    aa114166e1b2bbcfcb667516305cfd4f15163778

    SHA256

    34514db6f746843980679c11261608a1a599c3ea50377cd3a4a4d60bb42fc07e

    SHA512

    b6ea42fad1efb1320515feec4808d9650047d9cc13882d59902e36607f896dc25f29af177fa1b44eaa2560fe844d082297c1815865ddb480a47a04b8b27c65f5

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v7396588.exe

    Filesize

    603KB

    MD5

    8073133e8b2e05013bd36cd0eb2e5def

    SHA1

    8f265aea4d40a181fa819f5a6f232b8234da90f0

    SHA256

    7dd175e380b5cb735deff28c4660396619dc2ee7634ff1702dddc5ed193068f1

    SHA512

    79b6a88a9aefab93c3744b36e29f8520a3f1c507dbad133a9b2b0922d7ba10aa7c1b3a9f8b37a2a7f45a276ffcd3dbadc091cce231da6dcb919412b5767d486b

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v7396588.exe

    Filesize

    603KB

    MD5

    8073133e8b2e05013bd36cd0eb2e5def

    SHA1

    8f265aea4d40a181fa819f5a6f232b8234da90f0

    SHA256

    7dd175e380b5cb735deff28c4660396619dc2ee7634ff1702dddc5ed193068f1

    SHA512

    79b6a88a9aefab93c3744b36e29f8520a3f1c507dbad133a9b2b0922d7ba10aa7c1b3a9f8b37a2a7f45a276ffcd3dbadc091cce231da6dcb919412b5767d486b

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v1563919.exe

    Filesize

    344KB

    MD5

    a28986d818fe540bfcd80c361dabd541

    SHA1

    61712de02c99b920f74f10eeba4517698bb8d3d6

    SHA256

    6a6aea520fc5552febd69bdfce2e2e3e19ec2ab65be81462cc8a2d3dbcec9a40

    SHA512

    c90b08c2a45bbf2830216590a98335304468d5177dff5405d99362943c6227bafc92ef39e0849d8c3eabd6e5c68948980ae0d6c982d17e235c5b58495c53cc55

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v1563919.exe

    Filesize

    344KB

    MD5

    a28986d818fe540bfcd80c361dabd541

    SHA1

    61712de02c99b920f74f10eeba4517698bb8d3d6

    SHA256

    6a6aea520fc5552febd69bdfce2e2e3e19ec2ab65be81462cc8a2d3dbcec9a40

    SHA512

    c90b08c2a45bbf2830216590a98335304468d5177dff5405d99362943c6227bafc92ef39e0849d8c3eabd6e5c68948980ae0d6c982d17e235c5b58495c53cc55

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0792050.exe

    Filesize

    220KB

    MD5

    af2c811a5bf3b974ed3a56b4a9467b12

    SHA1

    94a6dd8df8f405a0cc00a7a95b92513a9927e164

    SHA256

    b699ae04058fde24bfaf9159e8f34eeb6c90bcc56f5d1ab1f3ba7636d5a68fcb

    SHA512

    348013542db44f8d5d95ed9ce0081ce574b41af04057d044583d25a59c7c474c27334a47411dd2a4d5cb257a596c3d80cf4e92573fb8ea0924c1d50b1799cccf

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0792050.exe

    Filesize

    220KB

    MD5

    af2c811a5bf3b974ed3a56b4a9467b12

    SHA1

    94a6dd8df8f405a0cc00a7a95b92513a9927e164

    SHA256

    b699ae04058fde24bfaf9159e8f34eeb6c90bcc56f5d1ab1f3ba7636d5a68fcb

    SHA512

    348013542db44f8d5d95ed9ce0081ce574b41af04057d044583d25a59c7c474c27334a47411dd2a4d5cb257a596c3d80cf4e92573fb8ea0924c1d50b1799cccf

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0792050.exe

    Filesize

    220KB

    MD5

    af2c811a5bf3b974ed3a56b4a9467b12

    SHA1

    94a6dd8df8f405a0cc00a7a95b92513a9927e164

    SHA256

    b699ae04058fde24bfaf9159e8f34eeb6c90bcc56f5d1ab1f3ba7636d5a68fcb

    SHA512

    348013542db44f8d5d95ed9ce0081ce574b41af04057d044583d25a59c7c474c27334a47411dd2a4d5cb257a596c3d80cf4e92573fb8ea0924c1d50b1799cccf

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0792050.exe

    Filesize

    220KB

    MD5

    af2c811a5bf3b974ed3a56b4a9467b12

    SHA1

    94a6dd8df8f405a0cc00a7a95b92513a9927e164

    SHA256

    b699ae04058fde24bfaf9159e8f34eeb6c90bcc56f5d1ab1f3ba7636d5a68fcb

    SHA512

    348013542db44f8d5d95ed9ce0081ce574b41af04057d044583d25a59c7c474c27334a47411dd2a4d5cb257a596c3d80cf4e92573fb8ea0924c1d50b1799cccf

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0792050.exe

    Filesize

    220KB

    MD5

    af2c811a5bf3b974ed3a56b4a9467b12

    SHA1

    94a6dd8df8f405a0cc00a7a95b92513a9927e164

    SHA256

    b699ae04058fde24bfaf9159e8f34eeb6c90bcc56f5d1ab1f3ba7636d5a68fcb

    SHA512

    348013542db44f8d5d95ed9ce0081ce574b41af04057d044583d25a59c7c474c27334a47411dd2a4d5cb257a596c3d80cf4e92573fb8ea0924c1d50b1799cccf

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0792050.exe

    Filesize

    220KB

    MD5

    af2c811a5bf3b974ed3a56b4a9467b12

    SHA1

    94a6dd8df8f405a0cc00a7a95b92513a9927e164

    SHA256

    b699ae04058fde24bfaf9159e8f34eeb6c90bcc56f5d1ab1f3ba7636d5a68fcb

    SHA512

    348013542db44f8d5d95ed9ce0081ce574b41af04057d044583d25a59c7c474c27334a47411dd2a4d5cb257a596c3d80cf4e92573fb8ea0924c1d50b1799cccf

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0792050.exe

    Filesize

    220KB

    MD5

    af2c811a5bf3b974ed3a56b4a9467b12

    SHA1

    94a6dd8df8f405a0cc00a7a95b92513a9927e164

    SHA256

    b699ae04058fde24bfaf9159e8f34eeb6c90bcc56f5d1ab1f3ba7636d5a68fcb

    SHA512

    348013542db44f8d5d95ed9ce0081ce574b41af04057d044583d25a59c7c474c27334a47411dd2a4d5cb257a596c3d80cf4e92573fb8ea0924c1d50b1799cccf

  • memory/2548-63-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2548-68-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2548-72-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2548-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2548-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2548-66-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2548-65-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2548-64-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB