Analysis

  • max time kernel
    119s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 23:55

General

  • Target

    e3c0cbd9cd3bb1745cfb717cd60ec6a0N.exe

  • Size

    5.8MB

  • MD5

    e3c0cbd9cd3bb1745cfb717cd60ec6a0

  • SHA1

    1ffa28fa2def33b31917708fc358f49c10dab9f8

  • SHA256

    4ce6454811667fcf458a04248bd3272a35e7ec26a4fcb18138f9a8eaa2323e68

  • SHA512

    02528db77ea8685b1aa31a52b3584a742913016c8ccaa42719c36a0da00adca3fabf1bbfe9d1ce06de43d552f9d4e37f48eee03562d521bce8579628ba641651

  • SSDEEP

    98304:Ba6FZc94EQKEB3IjLFkjBimdcQ01pjFZ7KYh2oLAx97+VNM+EJ75ePnN:vc9jtOjAmd+1Rv7j2owB2M+vN

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 9 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3c0cbd9cd3bb1745cfb717cd60ec6a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\e3c0cbd9cd3bb1745cfb717cd60ec6a0N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1672
    • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
      c:\users\admin\appdata\local\temp\\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2152
      • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
        c:\users\admin\appdata\local\temp\\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2696
      • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2256
    • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 88
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2944
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1476 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3028
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1476 CREDAT:209937 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d087bd907674699cb04eae3c9603a1e4

    SHA1

    22275def9e77cfd44ab570f56307d8a727e4af9f

    SHA256

    c99065130284c2955e1d3786031cf949e54150f36148ad2884fe67dabbb2704c

    SHA512

    c4ba03069ba99cfa6bababa4877f59d25f1264eec6f2dc1c7c2a77514c0e53f2610220092b2fb0ac063a770d89b01b23c35dfd2e5e39c6578946b75652261810

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa8909db20e3477832981d56dc3a5cb9

    SHA1

    7cfd8c1ed013936da14ebb37f594727dfbdcffd2

    SHA256

    148876450751771c6e51c5fa478853d7e5c9092ab85c607aba62a205ae020b6f

    SHA512

    ef27ab94f2583155091cd8b02c9ab627903ecbadfd6df397163b407dee0b6e938e0b3a44d1200d6becd1016f5564ac2c5f84cb50b7c536d0c18b0b314cb97e2a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14bcc9e554ddaf3f28ca04483c23f9e2

    SHA1

    6932ad36f4d6d1b22f1caf135f4c6eb39efb75ae

    SHA256

    04507b75dcfecadb713a0bd3e6b3170dd706b249b4400e85bbf3681a1044df44

    SHA512

    eadc4943b01caaafb80440a912ebfc514ffe7c9029465d0a7e08512cbd194c67652caf6908477c7ef4166433e01956e0690521aa206aca2c29b777c819530651

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e7428951a3d7cf19046c5636a36deb3

    SHA1

    ba48b4736a26c9901f21d12815f5d23e4150588d

    SHA256

    92bab82df65c7943940cc5e35b95761189a85e955ed4588b32c6471a455fa25d

    SHA512

    ae0a8175957147d6b166fc5bc221fc6a3f3882345ba84965735522bfc49889098bec15afc6c6e554d50e503c54ecb9bdbf756e1a10146a64b65e3b39de6b63a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dee4ac4c534935d31e2ab129688af843

    SHA1

    191dcc5abfe8b8d1dafe3feaa8b3d723a5ea6280

    SHA256

    291407179d6dd0294847869a22cf161aca533faa2b9d6def42c8c598d6d74206

    SHA512

    7efcd9e02b81609bcdd148264cf9c9df815de67aa82b4ee8f7365f932bde2583e942ccf93e15a9918ce877d29621df681605a30dfdfc622a6bf4f34dcb339c1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0aabaf84e27822fb9a73f82f9d4d52d7

    SHA1

    47545c48a5a2032fdda1e1e5e8497347fbc4aa6e

    SHA256

    4a1ecb3d181d0694d83a5ee67a134df879592938fcbf72fc356c6c8eaa3f83e0

    SHA512

    4f046c74f3ac528063eac9a85e93c42483a8aff946f13cf89c7204adfd2a89c282ad94cb7752fb072e966570f05c62e40746f340e0351beae4b9aa39d84a5cd6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    40bdc01da8ee307aa5b5be201b103302

    SHA1

    78ddd7ad18de6cd12eac7ef8d7c004c339e2f68d

    SHA256

    1eec600f0dff2bcfc01a886bd1c49c95561d3219aa4697a19dbf6e7a44bba411

    SHA512

    bab54e07bbf56e4ba2d53286e708c31621527c95fbbdb80461df1fc6b17e04cda1ae18ba4d9f207214bc4d4b8b8af31a2b575101f6de4386d389964afc92d783

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f9667dc25fc7cf3732b60cd4490bb17

    SHA1

    107bc79ba6bdb78f76285d96e71b3be51ec9bfcc

    SHA256

    79b75603a37a65877e765a6c62a457016be72312794585113dcd345d2df4a3d4

    SHA512

    844a95467ad340cc831ff30cfae68498afa005744700270ab4ac095b7e2bb8499a86cd39ec689117c71c27ae25a1eec62f874d02b0641fe73fce76284a584a84

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e335c09c73c6fb52c14739799c08f72e

    SHA1

    aa0c992b7c83b0bb11b6f8b860979063db6d1336

    SHA256

    e5afb3915339f721e7650985ac9c77de5d008e74538d7eca7463285df28d8da0

    SHA512

    f5c255094092952d197ea09b5c4c529e3c097f4605afd5def923cbba4fcc624ba9ea41e9056a5e69319d4a3bfb3265e516e9a2fea88fceae6ce058d1cd450fee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9c3f020a5f31fa05edc3b962c8ffbbff

    SHA1

    7d5b8e16742718734ec6ef1658289c21b8b2c8b2

    SHA256

    af872da9a2c5eae684660ea025f2654efa66ff0efe2e184a9d2bc5d088586bd2

    SHA512

    107b31373447a3ed8224e788aa6f120e2b42d83cdb43c148b38ca2cd44d65e9df489f4503ccea817e9359740ae2752cb7e967c006353f00bc9daf2ac0e5783fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bed1779f6aa7ab4765d6ea7fd643e558

    SHA1

    9ea13ef39c47f6a72accf4dccc6e736d23bc86c2

    SHA256

    c4c0b5e1d65825c0b45708d02c87bd262138025202c08a36e1caaa243e7286d2

    SHA512

    627a31b1bd5d03ca30176fe28487d47c5b4a8ed797cf218d36475fb5ac89edb070fd6f3d780fc14bdde11a19063b325ac8e5c773927bdda41e356f5c9312303a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    184caee6ddc39e6efd1f9e5de71b861f

    SHA1

    8f3fe9bd01c24bc04943bfd51bcc5f5bd70bf9c0

    SHA256

    8225dac80c0bea1afa6b35342054f4320b117804e9da3f28f95ada4e2111f026

    SHA512

    1366e055f009dc30dba510e754d7859fcea0e4f2ace21aa3831c643831d3262039bdcfb8eb5fac62c1d3dfdb6f8d2beefa3f217dd30cb5dda0733e4e03c7426b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a01a02997d465dbf7dcefe31a63be53d

    SHA1

    cd1bca0176f8f6ba5b2dbdfe6e2d464215fa0df5

    SHA256

    855bc1fcaf945c5d442cf4aba512b4c5cd6eefac25a5b71e05ee01f8be4e1d4b

    SHA512

    f0534fc60646be6966cec9ac218e6a75dddab2807827edbef7f2c558c0770950c794c1274c1d46020d579f51aa11477613cfbc400767860814ba0d99624cef7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d41e0779a290dfed7488713aaf99c83f

    SHA1

    7bac1c1b47fb96b0ee88f0774a3d27299cf785e7

    SHA256

    5d978ce53cf75d645e5b25ec04a747a1178d94690ac1de6d72534184ebda6af8

    SHA512

    bdcaaa49056122c4aee830abe3e542683028f0ea7acdc451bfaf8167d2c1ad059a55821c4dc6880fc59da5e1dbd74542a51337a0cc3b6995b94bd764ba6f33bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    25fd1e854049d3620cf93eaf552d2fb2

    SHA1

    5724e840db613b4e3b417f8142ef59ae272a63de

    SHA256

    0acb2139a5aa9c8250442f709567f4fa1bfd7ff9e2c88ad570fda9cdb4798423

    SHA512

    a87b1bbc62b47c52974670e7ded53f33b9a8309a2a6b867d2de8d7765149fc73d0114d6075b19641ef13edc5a2df9a101ea07b5deb7fd522d517ef247f26e7f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d54d0a15a6478451df82c64f88eeca93

    SHA1

    188d02d5cc929a6324fd426577665a1f761826a7

    SHA256

    af48e8fe9ec1c705f86c28824f388846937659a0d8d4a8178cef59f52482a678

    SHA512

    712f837a210d7c2217dea8aadece52e2c0499b97cac40f74bb1363e295f584780ee8cd6f3d4cfd75d1d3064a8b93b38165f45424ebad1977bd031a2b28efc0e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b0ba02151812d8c301edaf2550305bc6

    SHA1

    1382fc2b59f41614b20e8a1e16034df7f2cbd794

    SHA256

    db32614ae0f29ac33f52d64a16b37534b4a47c7aed1b5f47ae256916830c9163

    SHA512

    a9cb4223e04f651a4403ef6d2177030b128c931c0ec5309cabd63e4c09a6ca9e856ec1418c3522b572fce74cc0557bd353485e6a20b6e7afc9ef0aa83c78138f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    70245ab7aeec74c06391c60e96c4fd48

    SHA1

    8fdebd38c0dc502fb7eaa12d8e12f6ff41f5fc7a

    SHA256

    3d76fcafb3b1a22be4569f0398d8ce268f16c6375a1bdf4d6839345ea174e23c

    SHA512

    4f22841bf15ee20786d55970133fe5bfdbfea870b3f3c82e2b12744541f6952e531d72fcfcb9fc4303942ffb1ba615f2531828bb5e99380d1da71caa7ee3e2b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a33ab104bc90e492356f82d4c038b8cf

    SHA1

    440734448116657c61051f8ce917d3798ceb7163

    SHA256

    370cf81fe03d28807bf1f3aed18888f824eaa2c456acbd9865b315a26939be7e

    SHA512

    b6b9ab51c31b55502783c364ce05da36f8f2e1e0f60b2c335d86c92a5b3057d820988ba38b543dd076341af2c848bb2030d342052dde89d7e4ca54b60fee1689

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    39bcd237d1950fa5f029ff2181c428aa

    SHA1

    54db9cef98c52a886806dbbb08e63461c0f7ecc0

    SHA256

    caee379f029bc51248f500663467299d3ef12ea03241c6fdd9137fa850d9110b

    SHA512

    a8114f98ca5453fb4613be787977e92d2cad3668d96a3c1692a4169905fb6fe6c43ada7cfa4b9e25f3514708c84592de3097e3f4d9c994b7c106151033f9a1bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f19f5159d1f992072225bc69d72e08e0

    SHA1

    e3788f507a28d4c6c665e18125dd33319f3136e6

    SHA256

    e11fd7d583b3750a1426e78d6bd72a476bc39383bd2c5befecbe6eda699391d4

    SHA512

    602806b5b46cc1a608acca25d9cb33c1f2d70cec4f814006010853e3f59e99b91309bfe49f6e1ba6f00d4be20d050c20057901f466436b66b0c49cdbcb2b9ec6

  • C:\Users\Admin\AppData\Local\Temp\Cab5F91.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar603F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    5.8MB

    MD5

    917d94d3fd67d788a1dd092f39f8dcaf

    SHA1

    6947d5d8ffc322f3eba1cc4d918e3ac9a8119b13

    SHA256

    7ad1fa3c88ed3c1c0d461d025a77828b414d4324b236e3cfa111922c5105740d

    SHA512

    5fcdf87f3703ba6728e88dcc4fe85dc5cccb61534eb3c9ef4412257f7ea08ddeabc81727b4f0cdb98d6d3b7b6c201a2516ab943bd40a8747c5f73d73ca62a632

  • \??\c:\program files (x86)\microsoft office\office14\bcssync.exe

    Filesize

    5.8MB

    MD5

    1434b01693a83f4dfb891040f8943682

    SHA1

    7a2fe19c0270a74ebe3c5c69f625710c653083e5

    SHA256

    cdc4871c49584658a1410720ac5e7bd4e52a74b24703fa040fe7dfea24c24adf

    SHA512

    8f4ba4c4bbbe38c012bdb1c1823121461b0c74530751e2a4f1bec90ae18aa2bbcd52b39134f8424d0ef839d3af7f1d974f816b301ec0828dafa39d5fd04aa2a3

  • \Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    5.8MB

    MD5

    5a598427dc815eb9588ef05d6e8dafd7

    SHA1

    49edc56b320b96c5545e35fe8cabc6ea0f44ace2

    SHA256

    65f1ea83b82a614d0c65df693ed23acce8a3eee3d6d8ad0f17471e802d45514f

    SHA512

    a51d6bb3d91287b9e119e056ce8a3650895993c34bbf8601309ff83d4f3b89e15895e975e4ed1b2b225c1a56c7cdf79e74d5e49063becb1c219d5dc2c70ae127

  • memory/1672-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1672-32-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/1672-33-0x0000000000421000-0x0000000000726000-memory.dmp

    Filesize

    3.0MB

  • memory/1672-10-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/1672-8-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/1672-9-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/1672-6-0x0000000000421000-0x0000000000726000-memory.dmp

    Filesize

    3.0MB

  • memory/1672-4-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1672-2-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2152-43-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2152-91-0x0000000000320000-0x0000000000322000-memory.dmp

    Filesize

    8KB

  • memory/2152-60-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2152-53-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/2152-41-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2256-88-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2696-87-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2740-61-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2740-51-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2740-52-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB