Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/12/2024, 07:28 UTC

General

  • Target

    7bdc4a94cc023cd96272ecd3d7294d01b121fce48c0a80725368c95df1a14dcb.exe

  • Size

    783KB

  • MD5

    a01ba8b94da113abb830119dad3cfc17

  • SHA1

    4ccd1d3ce62f864071afdc842f9f9e4b2a4ee0a7

  • SHA256

    7bdc4a94cc023cd96272ecd3d7294d01b121fce48c0a80725368c95df1a14dcb

  • SHA512

    35a7f30941ead4d6de05bf59193624c287ab97dc24607fb229621bbc0a3aac4102ef94dac84c2b3a088276001430c14d925e085ca788657fb81967ed7b67fe3d

  • SSDEEP

    12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK4:G+OQbpbgsFdAyQvzSqaq8qB

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • UAC bypass 3 TTPs 3 IoCs
  • DCRat payload 6 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 7 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7bdc4a94cc023cd96272ecd3d7294d01b121fce48c0a80725368c95df1a14dcb.exe
    "C:\Users\Admin\AppData\Local\Temp\7bdc4a94cc023cd96272ecd3d7294d01b121fce48c0a80725368c95df1a14dcb.exe"
    1⤵
    • UAC bypass
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • System policy modification
    PID:2000
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hsxZ7AtwBz.bat"
      2⤵
        PID:4116
        • C:\Windows\system32\w32tm.exe
          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
          3⤵
            PID:1640
          • C:\Windows\System32\qcap\dwm.exe
            "C:\Windows\System32\qcap\dwm.exe"
            3⤵
              PID:720
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ar-sa\OfficeClickToRun.exe'" /rl HIGHEST /f
          1⤵
          • Scheduled Task/Job: Scheduled Task
          PID:4004
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\qcap\dwm.exe'" /rl HIGHEST /f
          1⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2036
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\CIRCoInst\dllhost.exe'" /rl HIGHEST /f
          1⤵
          • Scheduled Task/Job: Scheduled Task
          PID:3516
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\lsasetup\explorer.exe'" /rl HIGHEST /f
          1⤵
          • Scheduled Task/Job: Scheduled Task
          PID:3152
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\rtmmvrortc\RuntimeBroker.exe'" /rl HIGHEST /f
          1⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1084
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\System32\internetmail\fontdrvhost.exe'" /rl HIGHEST /f
          1⤵
          • Scheduled Task/Job: Scheduled Task
          PID:3796
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Windows\twain_32\sysmon.exe'" /rl HIGHEST /f
          1⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2916

        Network

        • flag-us
          DNS
          97.17.167.52.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          97.17.167.52.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          88.210.23.2.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          88.210.23.2.in-addr.arpa
          IN PTR
          Response
          88.210.23.2.in-addr.arpa
          IN PTR
          a2-23-210-88deploystaticakamaitechnologiescom
        • flag-us
          DNS
          72.32.126.40.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          72.32.126.40.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          95.221.229.192.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          95.221.229.192.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          13.86.106.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          13.86.106.20.in-addr.arpa
          IN PTR
          Response
        • flag-ru
          GET
          http://92.63.192.30/generatorServer/PrefWarWarlimit/coreAutoantianti/mobilelog/tracemessagelocal/log/pluginprod/prodcorescriptsupport/screensupportlimit/Python/mobilemessageCampool/screenCpuMath/binlogmobileDjango/Eternalsecuredefaultasynctemp.php?h8TD=MTRg1QShxoXREbvAW4&Dxozd5Kx=P0srit&d03224669e4ea5d79deae499d944a2ea=b205fae64fd88364682ad89c07c70d92&0043bfc907801f9e09a2ddd9a0d6b133=gMkdDO4MmYzkzY3MGOlRGNlhDMwIWO4ADMhVjMwQjZzUDN0U2MwUmM&h8TD=MTRg1QShxoXREbvAW4&Dxozd5Kx=P0srit
          Remote address:
          92.63.192.30:80
          Request
          GET /generatorServer/PrefWarWarlimit/coreAutoantianti/mobilelog/tracemessagelocal/log/pluginprod/prodcorescriptsupport/screensupportlimit/Python/mobilemessageCampool/screenCpuMath/binlogmobileDjango/Eternalsecuredefaultasynctemp.php?h8TD=MTRg1QShxoXREbvAW4&Dxozd5Kx=P0srit&d03224669e4ea5d79deae499d944a2ea=b205fae64fd88364682ad89c07c70d92&0043bfc907801f9e09a2ddd9a0d6b133=gMkdDO4MmYzkzY3MGOlRGNlhDMwIWO4ADMhVjMwQjZzUDN0U2MwUmM&h8TD=MTRg1QShxoXREbvAW4&Dxozd5Kx=P0srit HTTP/1.1
          Accept: */*
          Content-Type: text/plain
          User-Agent: Mozilla/5.0 (PlayStation 4 3.11) AppleWebKit/537.73 (KHTML, like Gecko)
          Host: 92.63.192.30
          Connection: Keep-Alive
          Response
          HTTP/1.1 301 Moved Permanently
          Server: nginx/1.18.0
          Date: Thu, 19 Dec 2024 07:28:38 GMT
          Content-Type: text/html
          Transfer-Encoding: chunked
          Connection: keep-alive
          Location: https://92.63.192.30:443/generatorServer/PrefWarWarlimit/coreAutoantianti/mobilelog/tracemessagelocal/log/pluginprod/prodcorescriptsupport/screensupportlimit/Python/mobilemessageCampool/screenCpuMath/binlogmobileDjango/Eternalsecuredefaultasynctemp.php?h8TD=MTRg1QShxoXREbvAW4&Dxozd5Kx=P0srit&d03224669e4ea5d79deae499d944a2ea=b205fae64fd88364682ad89c07c70d92&0043bfc907801f9e09a2ddd9a0d6b133=gMkdDO4MmYzkzY3MGOlRGNlhDMwIWO4ADMhVjMwQjZzUDN0U2MwUmM&h8TD=MTRg1QShxoXREbvAW4&Dxozd5Kx=P0srit
        • flag-ru
          GET
          http://92.63.192.30/generatorServer/PrefWarWarlimit/coreAutoantianti/mobilelog/tracemessagelocal/log/pluginprod/prodcorescriptsupport/screensupportlimit/Python/mobilemessageCampool/screenCpuMath/binlogmobileDjango/Eternalsecuredefaultasynctemp.php?h8TD=MTRg1QShxoXREbvAW4&Dxozd5Kx=P0srit&d03224669e4ea5d79deae499d944a2ea=b205fae64fd88364682ad89c07c70d92&0043bfc907801f9e09a2ddd9a0d6b133=gMkdDO4MmYzkzY3MGOlRGNlhDMwIWO4ADMhVjMwQjZzUDN0U2MwUmM&h8TD=MTRg1QShxoXREbvAW4&Dxozd5Kx=P0srit
          Remote address:
          92.63.192.30:80
          Request
          GET /generatorServer/PrefWarWarlimit/coreAutoantianti/mobilelog/tracemessagelocal/log/pluginprod/prodcorescriptsupport/screensupportlimit/Python/mobilemessageCampool/screenCpuMath/binlogmobileDjango/Eternalsecuredefaultasynctemp.php?h8TD=MTRg1QShxoXREbvAW4&Dxozd5Kx=P0srit&d03224669e4ea5d79deae499d944a2ea=b205fae64fd88364682ad89c07c70d92&0043bfc907801f9e09a2ddd9a0d6b133=gMkdDO4MmYzkzY3MGOlRGNlhDMwIWO4ADMhVjMwQjZzUDN0U2MwUmM&h8TD=MTRg1QShxoXREbvAW4&Dxozd5Kx=P0srit HTTP/1.1
          Accept: */*
          Content-Type: text/plain
          User-Agent: Mozilla/5.0 (PlayStation 4 3.11) AppleWebKit/537.73 (KHTML, like Gecko)
          Host: 92.63.192.30
          Response
          HTTP/1.1 301 Moved Permanently
          Server: nginx/1.18.0
          Date: Thu, 19 Dec 2024 07:28:39 GMT
          Content-Type: text/html
          Transfer-Encoding: chunked
          Connection: keep-alive
          Location: https://92.63.192.30:443/generatorServer/PrefWarWarlimit/coreAutoantianti/mobilelog/tracemessagelocal/log/pluginprod/prodcorescriptsupport/screensupportlimit/Python/mobilemessageCampool/screenCpuMath/binlogmobileDjango/Eternalsecuredefaultasynctemp.php?h8TD=MTRg1QShxoXREbvAW4&Dxozd5Kx=P0srit&d03224669e4ea5d79deae499d944a2ea=b205fae64fd88364682ad89c07c70d92&0043bfc907801f9e09a2ddd9a0d6b133=gMkdDO4MmYzkzY3MGOlRGNlhDMwIWO4ADMhVjMwQjZzUDN0U2MwUmM&h8TD=MTRg1QShxoXREbvAW4&Dxozd5Kx=P0srit
        • flag-us
          DNS
          30.192.63.92.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          30.192.63.92.in-addr.arpa
          IN PTR
          Response
          30.192.63.92.in-addr.arpa
          IN PTR
          marketfloorru
        • flag-us
          DNS
          217.106.137.52.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          217.106.137.52.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          197.87.175.4.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          197.87.175.4.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          198.187.3.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          198.187.3.20.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          133.130.81.91.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          133.130.81.91.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          48.229.111.52.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          48.229.111.52.in-addr.arpa
          IN PTR
          Response
        • 92.63.192.30:80
          http://92.63.192.30/generatorServer/PrefWarWarlimit/coreAutoantianti/mobilelog/tracemessagelocal/log/pluginprod/prodcorescriptsupport/screensupportlimit/Python/mobilemessageCampool/screenCpuMath/binlogmobileDjango/Eternalsecuredefaultasynctemp.php?h8TD=MTRg1QShxoXREbvAW4&Dxozd5Kx=P0srit&d03224669e4ea5d79deae499d944a2ea=b205fae64fd88364682ad89c07c70d92&0043bfc907801f9e09a2ddd9a0d6b133=gMkdDO4MmYzkzY3MGOlRGNlhDMwIWO4ADMhVjMwQjZzUDN0U2MwUmM&h8TD=MTRg1QShxoXREbvAW4&Dxozd5Kx=P0srit
          http
          1.6kB
          1.9kB
          7
          4

          HTTP Request

          GET http://92.63.192.30/generatorServer/PrefWarWarlimit/coreAutoantianti/mobilelog/tracemessagelocal/log/pluginprod/prodcorescriptsupport/screensupportlimit/Python/mobilemessageCampool/screenCpuMath/binlogmobileDjango/Eternalsecuredefaultasynctemp.php?h8TD=MTRg1QShxoXREbvAW4&Dxozd5Kx=P0srit&d03224669e4ea5d79deae499d944a2ea=b205fae64fd88364682ad89c07c70d92&0043bfc907801f9e09a2ddd9a0d6b133=gMkdDO4MmYzkzY3MGOlRGNlhDMwIWO4ADMhVjMwQjZzUDN0U2MwUmM&h8TD=MTRg1QShxoXREbvAW4&Dxozd5Kx=P0srit

          HTTP Response

          301

          HTTP Request

          GET http://92.63.192.30/generatorServer/PrefWarWarlimit/coreAutoantianti/mobilelog/tracemessagelocal/log/pluginprod/prodcorescriptsupport/screensupportlimit/Python/mobilemessageCampool/screenCpuMath/binlogmobileDjango/Eternalsecuredefaultasynctemp.php?h8TD=MTRg1QShxoXREbvAW4&Dxozd5Kx=P0srit&d03224669e4ea5d79deae499d944a2ea=b205fae64fd88364682ad89c07c70d92&0043bfc907801f9e09a2ddd9a0d6b133=gMkdDO4MmYzkzY3MGOlRGNlhDMwIWO4ADMhVjMwQjZzUDN0U2MwUmM&h8TD=MTRg1QShxoXREbvAW4&Dxozd5Kx=P0srit

          HTTP Response

          301
        • 92.63.192.30:443
          tls
          512 B
          3.5kB
          7
          7
        • 92.63.192.30:443
          tls
          501 B
          289 B
          5
          4
        • 8.8.8.8:53
          97.17.167.52.in-addr.arpa
          dns
          71 B
          145 B
          1
          1

          DNS Request

          97.17.167.52.in-addr.arpa

        • 8.8.8.8:53
          88.210.23.2.in-addr.arpa
          dns
          70 B
          133 B
          1
          1

          DNS Request

          88.210.23.2.in-addr.arpa

        • 8.8.8.8:53
          72.32.126.40.in-addr.arpa
          dns
          71 B
          157 B
          1
          1

          DNS Request

          72.32.126.40.in-addr.arpa

        • 8.8.8.8:53
          95.221.229.192.in-addr.arpa
          dns
          73 B
          144 B
          1
          1

          DNS Request

          95.221.229.192.in-addr.arpa

        • 8.8.8.8:53
          13.86.106.20.in-addr.arpa
          dns
          71 B
          157 B
          1
          1

          DNS Request

          13.86.106.20.in-addr.arpa

        • 8.8.8.8:53
          30.192.63.92.in-addr.arpa
          dns
          71 B
          99 B
          1
          1

          DNS Request

          30.192.63.92.in-addr.arpa

        • 8.8.8.8:53
          217.106.137.52.in-addr.arpa
          dns
          73 B
          147 B
          1
          1

          DNS Request

          217.106.137.52.in-addr.arpa

        • 8.8.8.8:53
          197.87.175.4.in-addr.arpa
          dns
          71 B
          157 B
          1
          1

          DNS Request

          197.87.175.4.in-addr.arpa

        • 8.8.8.8:53
          198.187.3.20.in-addr.arpa
          dns
          71 B
          157 B
          1
          1

          DNS Request

          198.187.3.20.in-addr.arpa

        • 8.8.8.8:53
          133.130.81.91.in-addr.arpa
          dns
          72 B
          147 B
          1
          1

          DNS Request

          133.130.81.91.in-addr.arpa

        • 8.8.8.8:53
          48.229.111.52.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          48.229.111.52.in-addr.arpa

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hsxZ7AtwBz.bat

          Filesize

          196B

          MD5

          907cf7df10b04f3f61d4e96939f8f116

          SHA1

          3e124bb54165f8c21b069f18e1b025b1d024ef21

          SHA256

          42185fbd4e13f1c0b78199459838296c0b31a753e447e63ce84587b6e145de0a

          SHA512

          1e29b8e96f07e866cca4bacd57084669ac1126dcbedfb2026aafa388aaffe87dbff1e84259bb82065b70454838e2f167069df63ba433e01c5e570fb566cb88b9

        • C:\Windows\System32\qcap\dwm.exe

          Filesize

          783KB

          MD5

          4383aeb7a3482e7a8dd5e6bb8a0dd9ff

          SHA1

          eea3bd83c71cf729764ff0f6eee751f761c4c79d

          SHA256

          53dd03c36c1a8635163bc915b37c2e4b9fa67e1e877fcf38fe268deff0e24faa

          SHA512

          1727d1cf9457b751eebbee0ecab126410e136673c4e0dbe85819a3daeefec9bf5e05b215960a4d58dadca692f5ae5a34078149a03ce213037026e99dece981c8

        • C:\Windows\System32\rtmmvrortc\RuntimeBroker.exe

          Filesize

          783KB

          MD5

          a01ba8b94da113abb830119dad3cfc17

          SHA1

          4ccd1d3ce62f864071afdc842f9f9e4b2a4ee0a7

          SHA256

          7bdc4a94cc023cd96272ecd3d7294d01b121fce48c0a80725368c95df1a14dcb

          SHA512

          35a7f30941ead4d6de05bf59193624c287ab97dc24607fb229621bbc0a3aac4102ef94dac84c2b3a088276001430c14d925e085ca788657fb81967ed7b67fe3d

        • C:\Windows\lsasetup\explorer.exe

          Filesize

          783KB

          MD5

          6cb8d50e4dd746731d97972e8772e0d0

          SHA1

          d38429f683fb540c044e51e1a11a7d16cc16434f

          SHA256

          ee7d5e44c38ccd50a44612e4642bf6ea9b537f28aa71983756d3af28475006c8

          SHA512

          351da69f81a4f346f430a2832c5c18658627beaa72d16d33b4f3867161526d3049310071d85c8e3011d373ce0c9422aff7791a44a7a767ff14a50dcb3c5e5f37

        • C:\Windows\twain_32\RCX9AEF.tmp

          Filesize

          783KB

          MD5

          efd24089c825c314364efac40a5ba632

          SHA1

          df9acc3f255d6072bc01a01e1dd71153194c98a7

          SHA256

          d54addb370e232830efe1d8b4467ffc99fc736719e0f924440a1036b3cd81bfb

          SHA512

          501f38af58f6c9a57ebf267aaad6143f2b77309ed74576fc9739af7bbb8610869a27fa417dfcf364d21d3a92d47ae41ba0e1d04106774db093305d134362584e

        • memory/720-98-0x00000000002D0000-0x000000000039A000-memory.dmp

          Filesize

          808KB

        • memory/2000-13-0x0000000002FA0000-0x0000000002FA8000-memory.dmp

          Filesize

          32KB

        • memory/2000-10-0x0000000002F80000-0x0000000002F88000-memory.dmp

          Filesize

          32KB

        • memory/2000-21-0x0000000003160000-0x000000000316C000-memory.dmp

          Filesize

          48KB

        • memory/2000-42-0x00007FFF15560000-0x00007FFF16021000-memory.dmp

          Filesize

          10.8MB

        • memory/2000-19-0x0000000002FE0000-0x0000000002FE8000-memory.dmp

          Filesize

          32KB

        • memory/2000-18-0x0000000003140000-0x0000000003148000-memory.dmp

          Filesize

          32KB

        • memory/2000-17-0x0000000003130000-0x0000000003138000-memory.dmp

          Filesize

          32KB

        • memory/2000-16-0x0000000003120000-0x0000000003128000-memory.dmp

          Filesize

          32KB

        • memory/2000-15-0x0000000003110000-0x0000000003118000-memory.dmp

          Filesize

          32KB

        • memory/2000-14-0x0000000002F90000-0x0000000002F98000-memory.dmp

          Filesize

          32KB

        • memory/2000-0-0x00007FFF15563000-0x00007FFF15565000-memory.dmp

          Filesize

          8KB

        • memory/2000-12-0x0000000002FD0000-0x0000000002FD8000-memory.dmp

          Filesize

          32KB

        • memory/2000-11-0x0000000002FC0000-0x0000000002FC8000-memory.dmp

          Filesize

          32KB

        • memory/2000-26-0x00007FFF15560000-0x00007FFF16021000-memory.dmp

          Filesize

          10.8MB

        • memory/2000-9-0x0000000002F70000-0x0000000002F7A000-memory.dmp

          Filesize

          40KB

        • memory/2000-8-0x0000000002FB0000-0x0000000002FBA000-memory.dmp

          Filesize

          40KB

        • memory/2000-6-0x0000000002F50000-0x0000000002F58000-memory.dmp

          Filesize

          32KB

        • memory/2000-5-0x0000000001570000-0x0000000001580000-memory.dmp

          Filesize

          64KB

        • memory/2000-4-0x0000000002F30000-0x0000000002F38000-memory.dmp

          Filesize

          32KB

        • memory/2000-3-0x0000000001560000-0x0000000001568000-memory.dmp

          Filesize

          32KB

        • memory/2000-2-0x00007FFF15560000-0x00007FFF16021000-memory.dmp

          Filesize

          10.8MB

        • memory/2000-25-0x00007FFF15560000-0x00007FFF16021000-memory.dmp

          Filesize

          10.8MB

        • memory/2000-22-0x00000000031B0000-0x00000000031B8000-memory.dmp

          Filesize

          32KB

        • memory/2000-20-0x0000000003150000-0x0000000003158000-memory.dmp

          Filesize

          32KB

        • memory/2000-94-0x00007FFF15560000-0x00007FFF16021000-memory.dmp

          Filesize

          10.8MB

        • memory/2000-7-0x0000000002F40000-0x0000000002F4C000-memory.dmp

          Filesize

          48KB

        • memory/2000-1-0x0000000000CF0000-0x0000000000DBA000-memory.dmp

          Filesize

          808KB

        We care about your privacy.

        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.