Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

17/04/2024, 12:37

240417-pths4afc45 8

17/04/2024, 12:37

240417-ptg7kafc43 8

17/04/2024, 12:36

240417-ptcbbafc34 8

17/04/2024, 12:36

240417-ptbpsafc29 8

17/04/2024, 12:36

240417-pta39afc28 8

16/04/2024, 13:44

240416-q1vxnsda7z 8

Analysis

  • max time kernel
    300s
  • max time network
    303s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/04/2024, 13:44

General

  • Target

    64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe

  • Size

    5.3MB

  • MD5

    63552c60caeefe5f2d0e4028b3cc65d3

  • SHA1

    dbed3040d53495a6afda01bfb8399376792eb48c

  • SHA256

    64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab

  • SHA512

    caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0

  • SSDEEP

    98304:vwrOjNr08jQxkFg97Nw76XgfqCPa1AQy2cmw:YC5r0wQxKg97Nw76XgyC6

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
    "C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2672
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2668
    • C:\Windows\system32\schtasks.exe
      schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
      2⤵
      • Creates scheduled task(s)
      PID:2912
    • C:\Windows\System\svchost.exe
      "C:\Windows\System\svchost.exe" formal
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2356
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1968
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:528
      • C:\Users\Admin\AppData\Local\Temp\~tl7955.tmp
        C:\Users\Admin\AppData\Local\Temp\~tl7955.tmp
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2224
        • C:\Windows\system32\netsh.exe
          netsh int ipv4 set dynamicport tcp start=1025 num=64511
          4⤵
            PID:2584
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:2460
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:2404
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2428
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2440
          • C:\Windows\system32\schtasks.exe
            schtasks /delete /TN "Timer"
            4⤵
              PID:1696
            • C:\Windows\system32\schtasks.exe
              schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
              4⤵
              • Creates scheduled task(s)
              PID:2176
            • C:\Windows\System\svchost.exe
              "C:\Windows\System\svchost.exe" formal
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1908
              • C:\Windows\system32\netsh.exe
                netsh int ipv4 set dynamicport tcp start=1025 num=64511
                5⤵
                  PID:1816
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  5⤵
                  • Modifies Windows Firewall
                  PID:2316
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  5⤵
                  • Modifies Windows Firewall
                  PID:2280
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:280
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1392
                • C:\Users\Admin\AppData\Local\Temp\~tl51B9.tmp
                  C:\Users\Admin\AppData\Local\Temp\~tl51B9.tmp
                  5⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:1628
                  • C:\Windows\system32\netsh.exe
                    netsh int ipv4 set dynamicport tcp start=1025 num=64511
                    6⤵
                      PID:3032
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      6⤵
                      • Modifies Windows Firewall
                      PID:2296
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      6⤵
                      • Modifies Windows Firewall
                      PID:1668
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                      6⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1000
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                      6⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2752

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

            Filesize

            7KB

            MD5

            8152d75e0d26a4aba255c222f7bd7370

            SHA1

            df5d799d1540eeca1ee6e1e3efb65ecb7d6b6205

            SHA256

            f19cc2e21ea04170df97c5a7fb8886298a8bc64f2b4f3cfaffaab565dfae65a8

            SHA512

            42443ed036defd34472e4119eb2cd3cbdb45239c1cddc93e8f1530ac63e5a8d9b6f42ee609212e7ba539a49b7c436a50982e4c246c1c8110172afdffbdd0a710

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CEBE9IC1SUICIABKFBBA.temp

            Filesize

            7KB

            MD5

            7164b9ae2edeb4612b6d3d3e92684d03

            SHA1

            3be33c8f09092c3184f0a83e0b25f5b88338c3cf

            SHA256

            5a34ecef671bebfdaa5601c0df8aa08a354ff8a8ce859825838cbe90de8810c5

            SHA512

            631651652578467955a6d847d18482e37a4b99c2dcbdbb373eb8461c1f2167ed14db0480f8daec5b00b36e8e8c82f4e068c3858f0294a6e21b92535d156ad05c

          • C:\Users\Admin\AppData\Roaming\tor\cached-microdesc-consensus.tmp

            Filesize

            2.6MB

            MD5

            19a1ff4739901b80c88834cf7d4925eb

            SHA1

            75dec3747387d1a54035c9ae1ce7bc7488bec125

            SHA256

            1f23e720888ae52453dfe0df103aa9fd98e6e77f9ceba6c8798ba64339b26e61

            SHA512

            e3e0302c24bc98b07d640492a691a6d6d31a8345cf443a00d086eb91ae8a8bc26e90b3daf38288d6e2da0098097c60fb05e2e94971a4ba1c45654b357d060ac1

          • C:\Users\Admin\AppData\Roaming\tor\cached-microdescs.new

            Filesize

            7.0MB

            MD5

            2a753d8fe84bc87c05118b8111ba18ac

            SHA1

            c7071af69671f896e4c2112f2d1efbfcdcfc627d

            SHA256

            fafcd3ecdc9f6e2388d94cbb186c84160ebd9be87227ff6b30a81132841e1e81

            SHA512

            7cdd05287bc1b4185e8aad4b836d86a47d88419d3d2845c470b34c78ec1d342f758631cded2b1c21e92c136140c2b11b1c6a41b0517f9aef5cdedca3f29d18c0

          • C:\Windows\system\svchost.exe

            Filesize

            5.3MB

            MD5

            63552c60caeefe5f2d0e4028b3cc65d3

            SHA1

            dbed3040d53495a6afda01bfb8399376792eb48c

            SHA256

            64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab

            SHA512

            caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0

          • \Users\Admin\AppData\Local\Temp\~tl51B9.tmp

            Filesize

            393KB

            MD5

            9dbdd43a2e0b032604943c252eaf634a

            SHA1

            9584dc66f3c1cce4210fdf827a1b4e2bb22263af

            SHA256

            33c53cd5265502e7b62432dba0e1b5ed702b5007cc79973ccd1e71b2acc01e86

            SHA512

            b7b20b06dac952a96eda254bad29966fe7a4f827912beb0bc66d5af5b302d7c0282d70c1b01ff782507dd03a1d58706f05cb157521c7f2887a43085ffe5f94d1

          • \Users\Admin\AppData\Local\Temp\~tl7955.tmp

            Filesize

            385KB

            MD5

            e802c96760e48c5139995ffb2d891f90

            SHA1

            bba3d278c0eb1094a26e5d2f4c099ad685371578

            SHA256

            cb82ea45a37f8f79d10726a7c165aa5b392b68d5ac954141129c1762a539722c

            SHA512

            97300ac501be6b6ea3ac1915361dd472824fe612801cab8561a02c7df071b1534190d2d5ef872d89d24c8c915b88101e7315f948f53215c2538d661181e3a5f0

          • memory/280-192-0x0000000002350000-0x00000000023D0000-memory.dmp

            Filesize

            512KB

          • memory/280-184-0x000007FEF4FF0000-0x000007FEF598D000-memory.dmp

            Filesize

            9.6MB

          • memory/280-198-0x0000000002350000-0x00000000023D0000-memory.dmp

            Filesize

            512KB

          • memory/280-201-0x000007FEF4FF0000-0x000007FEF598D000-memory.dmp

            Filesize

            9.6MB

          • memory/280-196-0x0000000002350000-0x00000000023D0000-memory.dmp

            Filesize

            512KB

          • memory/280-185-0x0000000002350000-0x00000000023D0000-memory.dmp

            Filesize

            512KB

          • memory/280-187-0x000007FEF4FF0000-0x000007FEF598D000-memory.dmp

            Filesize

            9.6MB

          • memory/528-73-0x000007FEF4F20000-0x000007FEF58BD000-memory.dmp

            Filesize

            9.6MB

          • memory/528-66-0x000007FEF4F20000-0x000007FEF58BD000-memory.dmp

            Filesize

            9.6MB

          • memory/528-65-0x00000000026C0000-0x0000000002740000-memory.dmp

            Filesize

            512KB

          • memory/528-67-0x00000000026C0000-0x0000000002740000-memory.dmp

            Filesize

            512KB

          • memory/528-68-0x00000000026C0000-0x0000000002740000-memory.dmp

            Filesize

            512KB

          • memory/528-70-0x000007FEF4F20000-0x000007FEF58BD000-memory.dmp

            Filesize

            9.6MB

          • memory/528-71-0x00000000026C0000-0x0000000002740000-memory.dmp

            Filesize

            512KB

          • memory/1392-199-0x0000000002710000-0x0000000002790000-memory.dmp

            Filesize

            512KB

          • memory/1392-197-0x000007FEF4FF0000-0x000007FEF598D000-memory.dmp

            Filesize

            9.6MB

          • memory/1392-200-0x000007FEF4FF0000-0x000007FEF598D000-memory.dmp

            Filesize

            9.6MB

          • memory/1392-194-0x000007FEF4FF0000-0x000007FEF598D000-memory.dmp

            Filesize

            9.6MB

          • memory/1392-195-0x0000000002710000-0x0000000002790000-memory.dmp

            Filesize

            512KB

          • memory/1392-193-0x0000000002710000-0x0000000002790000-memory.dmp

            Filesize

            512KB

          • memory/1628-216-0x0000000140000000-0x0000000140170400-memory.dmp

            Filesize

            1.4MB

          • memory/1628-243-0x0000000140000000-0x0000000140170400-memory.dmp

            Filesize

            1.4MB

          • memory/1628-213-0x0000000140000000-0x0000000140170400-memory.dmp

            Filesize

            1.4MB

          • memory/1628-244-0x0000000140000000-0x0000000140170400-memory.dmp

            Filesize

            1.4MB

          • memory/1908-176-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/1908-212-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/1908-178-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/1908-175-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/1968-64-0x0000000002410000-0x0000000002490000-memory.dmp

            Filesize

            512KB

          • memory/1968-63-0x000007FEF4F20000-0x000007FEF58BD000-memory.dmp

            Filesize

            9.6MB

          • memory/1968-69-0x0000000002410000-0x0000000002490000-memory.dmp

            Filesize

            512KB

          • memory/1968-61-0x0000000002490000-0x0000000002498000-memory.dmp

            Filesize

            32KB

          • memory/1968-62-0x0000000002410000-0x0000000002490000-memory.dmp

            Filesize

            512KB

          • memory/1968-72-0x0000000002410000-0x0000000002490000-memory.dmp

            Filesize

            512KB

          • memory/1968-74-0x000007FEF4F20000-0x000007FEF58BD000-memory.dmp

            Filesize

            9.6MB

          • memory/1968-55-0x000007FEF4F20000-0x000007FEF58BD000-memory.dmp

            Filesize

            9.6MB

          • memory/1968-54-0x000000001B0F0000-0x000000001B3D2000-memory.dmp

            Filesize

            2.9MB

          • memory/2224-137-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/2224-136-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/2224-138-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/2224-177-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/2356-46-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/2356-123-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/2356-75-0x0000000010000000-0x00000000104FC000-memory.dmp

            Filesize

            5.0MB

          • memory/2356-134-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/2356-112-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/2356-48-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/2356-121-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/2372-5-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/2372-3-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/2372-42-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/2372-0-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/2372-4-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/2372-6-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/2428-150-0x000007FEF5630000-0x000007FEF5FCD000-memory.dmp

            Filesize

            9.6MB

          • memory/2428-159-0x000007FEF5630000-0x000007FEF5FCD000-memory.dmp

            Filesize

            9.6MB

          • memory/2428-152-0x00000000024B0000-0x0000000002530000-memory.dmp

            Filesize

            512KB

          • memory/2428-157-0x00000000024BB000-0x0000000002522000-memory.dmp

            Filesize

            412KB

          • memory/2428-153-0x000007FEF5630000-0x000007FEF5FCD000-memory.dmp

            Filesize

            9.6MB

          • memory/2428-155-0x00000000024B0000-0x0000000002530000-memory.dmp

            Filesize

            512KB

          • memory/2428-144-0x000000001B470000-0x000000001B752000-memory.dmp

            Filesize

            2.9MB

          • memory/2428-154-0x00000000024B0000-0x0000000002530000-memory.dmp

            Filesize

            512KB

          • memory/2440-156-0x00000000029E0000-0x0000000002A60000-memory.dmp

            Filesize

            512KB

          • memory/2440-160-0x00000000029EB000-0x0000000002A52000-memory.dmp

            Filesize

            412KB

          • memory/2440-158-0x000007FEF5630000-0x000007FEF5FCD000-memory.dmp

            Filesize

            9.6MB

          • memory/2440-161-0x00000000029E4000-0x00000000029E7000-memory.dmp

            Filesize

            12KB

          • memory/2668-27-0x0000000002660000-0x00000000026E0000-memory.dmp

            Filesize

            512KB

          • memory/2668-31-0x000007FEF58C0000-0x000007FEF625D000-memory.dmp

            Filesize

            9.6MB

          • memory/2668-24-0x0000000002660000-0x00000000026E0000-memory.dmp

            Filesize

            512KB

          • memory/2668-23-0x000007FEF58C0000-0x000007FEF625D000-memory.dmp

            Filesize

            9.6MB

          • memory/2668-22-0x0000000002660000-0x00000000026E0000-memory.dmp

            Filesize

            512KB

          • memory/2668-21-0x000007FEF58C0000-0x000007FEF625D000-memory.dmp

            Filesize

            9.6MB

          • memory/2672-20-0x0000000002800000-0x0000000002880000-memory.dmp

            Filesize

            512KB

          • memory/2672-18-0x000007FEF58C0000-0x000007FEF625D000-memory.dmp

            Filesize

            9.6MB

          • memory/2672-17-0x0000000002360000-0x0000000002368000-memory.dmp

            Filesize

            32KB

          • memory/2672-11-0x000000001B320000-0x000000001B602000-memory.dmp

            Filesize

            2.9MB

          • memory/2672-30-0x000007FEF58C0000-0x000007FEF625D000-memory.dmp

            Filesize

            9.6MB

          • memory/2672-19-0x0000000002800000-0x0000000002880000-memory.dmp

            Filesize

            512KB

          • memory/2672-28-0x0000000002800000-0x0000000002880000-memory.dmp

            Filesize

            512KB

          • memory/2672-25-0x000007FEF58C0000-0x000007FEF625D000-memory.dmp

            Filesize

            9.6MB

          • memory/2672-26-0x0000000002800000-0x0000000002880000-memory.dmp

            Filesize

            512KB