Analysis

  • max time kernel
    33s
  • max time network
    25s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    26-01-2025 06:57

General

  • Target

    XMouseButtonControlSetup.2.20.5.exe

  • Size

    2.9MB

  • MD5

    2e9725bc1d71ad1b8006dfc5a2510f88

  • SHA1

    6e1f7d12881696944bf5e030a7d131b969de0c6c

  • SHA256

    2240bf5fb5d80938b0676c46ef9f84bc1739c32f60c473ff85e530ae0eca2818

  • SHA512

    62bd9cde806f83f911f1068b452084ef2adc01bc0dec2d0f668a781cc0d94e39f6e35618264d8796ca205724725abd40429f463017e6ca5caf7d683429f82d39

  • SSDEEP

    49152:n65SJw48kZN+nCYk7c44+Y0hdwn4Km2A5aT/pVE0hYYajihV2Qso0SWMrboF:tfpeno4oY0QZm2dlNJsrHM4

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Modifies registry class 33 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XMouseButtonControlSetup.2.20.5.exe
    "C:\Users\Admin\AppData\Local\Temp\XMouseButtonControlSetup.2.20.5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    PID:2448
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://www.highrez.co.uk/scripts/postinstall.asp?package=XMouse&major=2&minor=20&build=5&revision=0&platform=x64
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1080
  • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe
    "C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe" /Installed /notportable
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6525274CBC2077D43D7D17A33C868C4F

    Filesize

    959B

    MD5

    d5e98140c51869fc462c8975620faa78

    SHA1

    07e032e020b72c3f192f0628a2593a19a70f069e

    SHA256

    5c58468d55f58e497e743982d2b50010b6d165374acf83a7d4a32db768c4408e

    SHA512

    9bd164cc4b9ef07386762d3775c6d9528b82d4a9dc508c3040104b8d41cfec52eb0b7e6f8dc47c5021ce2fe3ca542c4ae2b54fd02d76b0eabd9724484621a105

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6525274CBC2077D43D7D17A33C868C4F

    Filesize

    192B

    MD5

    9d2ba8a319e3e5620605b7ed2e1850cc

    SHA1

    bfab484c1f216ef590cc8fcc2f36c108494af266

    SHA256

    d621a4417221e012347b97efc290a0bf6ff5ce2623018b0428307bad1f5811db

    SHA512

    956614aeafe80df2d8df0833dee6942eea925025a19101f091eb57a5fc38169fd544724dd5b3d35354dc8798ffb53e9aaedbca8ecaa93f8bb38a33a2c217c9ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d02bf742649b9ebae7501b7a36dc2058

    SHA1

    49a872a97faf74ade662dfd6acafa75fcb09476a

    SHA256

    53d3537c6d078e7ca2e6cfd218d814e0d5bc9006192766d66b7e88e33e1aaf90

    SHA512

    f48657a6b8be1bec01be2ecf6b7488e97d063738ae21b594e57cb28986d1d1d646273c4d0d33286a056f6cf0915718573ccfa494d95580d998c9b2538970a88e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd7d1689200b478e33101aeda7443eef

    SHA1

    55b05a177327b5d439552eb345de639877fcdf6c

    SHA256

    54c03380f7683bb495b6eda2ce4eb38264762c7f01919d8440ba02230c871ddc

    SHA512

    442d6fd7045c7324bbc6d817c8501d712db0e3e1a96eb5a5f6a39bfc9a362cf563778da4ac31e71c2ea5a1dfe188f5439fa4adcf60c57161bfe83582ec4db320

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b254cb5b17ef05f6a6f31a86c8dae9c

    SHA1

    74d01fab22d163371601745839ff542eca6edb28

    SHA256

    e5f9ce5a22e8af0eb8a0d2a16d61143c63deb153013df6c7401a51ba313ca2ff

    SHA512

    db99d003ffe259280800b5620aec1ce6b840d6ace2006b9a6b9903adfdab94f3bad2cb47bb8b61829ede3b8a94ea2f3c6a0bd819445f16249cf0263c686d67eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d0d2ed9214ce86f527847597e43c3978

    SHA1

    4c8fbc94f26b3ac1cebe4ac26e76e487a7d4eae7

    SHA256

    32942ace48a11a1738bc7d20db4c3f5c505a2b6e4c774d364f794a4f5021d9d8

    SHA512

    1ce884949e82fc0690e9a1c4330dd40994424140f686d6fdcda44508fcdcdfead6d112e791de6edabacb87787037672f8dce318339417e6b9e9d924d886245e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a1f60e0ce99bdff887c1f7010590ae7b

    SHA1

    0ac745012c87a423fda0b76d0db35ee30c270bf5

    SHA256

    a3ca3eddb406fb2b93afa3077a68250c37b9de310d9c966c911bb857ac768d0d

    SHA512

    f27bf2044fec0e13e0db2d931449a3711908a51a65a928535dd1fcbef84c2c6f03b353601b1df082cb4c80147c50cb1ab269fc2ab0866b8cecd682172ed8842a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b732dbba754ecb726734abf63bc38575

    SHA1

    2594835224619863f856c910d260551b5732eaf7

    SHA256

    2469bdc2d5ed331f2aa01ef1d597f711f25d670fb1d48cca8577d1e04938f103

    SHA512

    3afb22f1a8f20ffcc20ecd5499dfbea17b81a6b354ec94a011225558164437bbb80176a6a6cb43dd1508f7c3a9e6fe60fcf0c84eb9c037d3045f6ad0e3e90be1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f5dadf5f975e95f984edde665cfa209

    SHA1

    38055151ee08bd39fccbc225f5653e37a848dd27

    SHA256

    c95bed553b180067d8083564edad43a4c5d71f6ee8a5347d607fb0cf710ab1ae

    SHA512

    b4067db74d3816c72d8777719791ba93de0f5d1667e1f50e87e5d10a16ca2bd673a2b577c99a78194a07448ccbac3aad123691275ab72ff4721c8717bae71f72

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a3953acc2d963861fe4f176fbce59606

    SHA1

    9a740787ed03bb0cf71af0690c0f785f21b22657

    SHA256

    d020802a097984058fa5ca25c9db1b03da1819579814338c0120f468cb4b1704

    SHA512

    a3730db2bb9c7f45015b47a47e107e9afca7060ce07c1c787a89dcb081c25cab6edf06dc7c70667b025bd49f094c172ab41f91351989b0c7e7dc5852474a627a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b14427bbaaa27937a38b7baa1b5694b6

    SHA1

    d748e58a641e9a61a01c1d209d4f1797bd7f31eb

    SHA256

    2f7b04315c6177c1bbf2b2dc41662c7da01a59f7899463687f0eee99ae8f6444

    SHA512

    b449fbeedb0993c055c7c050266639abdf1875db4bca109248abccf2f1732546dc56bcd092fccb1485fbb98bb6c5472d41c63f7c40f7bc4673c0b17a25fcac3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f5c3006825381e2e4dcb757ee7588ad

    SHA1

    786888dec0c4e24e13405be296dc268c25a3cc16

    SHA256

    ed21a9db80861a58c40da040be72a3c4b9e5550110b512f1a041bc5bd02688b9

    SHA512

    712f1d932dff28d5135aa1795a2bd9da9135f88556cb8f6e56c94a70feacd7941d4eceb70a63aae359f7ff9f6cacd75205a69bddfc5f14ff2545441deef375d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb8b2797c0e6065b7e7b6d7a44a09daa

    SHA1

    4f5c0329e27abb324efc13b72d6e29781dd367a0

    SHA256

    dbd528cbf527eb1fafb128a2b8e0b75226621952948bdfe2310c8100073926b9

    SHA512

    810055cd5496add2046bc926418b64589fc02227289b95bbc4f79d25eb929f330b2dda386ab11ba6e4e784226837d4f63220c778bcae00781eb28015d232484b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    52339801f729d87f2409f6dd7d582ca3

    SHA1

    89a9efb99bef143da69cb7ed132fa94f4456a29d

    SHA256

    e4cf888d3c40aae188e6fc0fabc9e7ab56ab3320515ab14718429d2d94dcafa5

    SHA512

    fac5ff2a12d41af6352418308219d449075fd8b1ec427c16386703c5a8b1bde8595894d393f35b226add8fc7f9cbe7d09ac1fad059f4b0e2bc547b0d1419a6f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf93ce1b5d270ee9ba42c1c2bd944dc8

    SHA1

    1c2c3d8103b8b51354380f6b92182a1b4bea602a

    SHA256

    6a0c4a55d498199293d6b72d109c74e1e2fb40dca113a6e6eca0a7cbda810f40

    SHA512

    0f3142fe67c03081797b64bcaf8eb4abf7f157f41c95f91275434a505c5e8428215e1ee34c8afaa0ef3e69ea6d4869046fac73279b1b76dba5a91d7568d53f68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7284b6384d547a1399bc72b3aa1b4e02

    SHA1

    83472f9bc1dc981445b095195874d8a19d8a77f8

    SHA256

    435b67329003402d6c4e5545033d24053188c247fedbe1517a00968d47285615

    SHA512

    5ac48c0c3cca80bffc77c5013ea9c6ac565a200de75b38b282cb333cc4f5c4474925d5053a4fd73ea4a9580c424661dae0cbe8540c0e18df46a5106202993072

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\z8d0nzh\imagestore.dat

    Filesize

    3KB

    MD5

    c6811fd07cb64b5e9c7072274544729f

    SHA1

    ec69916f35140897760ec51d5f932bd55abbe9ab

    SHA256

    05470a367c5dd978513dc3def5a4eb21f38dd0794b9ed183ee4a4410b8c70b30

    SHA512

    f789d524d539be4ed64bff32b6bbda20f02444aa5e695f5d3cfe2ca072e777e6ab54f4313e3a29b1e4f48b6e02ec952cdf72a2fd2fb1dbba95162c7d22050213

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RLHRIIGD\f[1].txt

    Filesize

    187KB

    MD5

    264c3d9ea84a5d2c0cc9ab955befd772

    SHA1

    b86bc64e2a6ea8b1f6177603c2b28008744a63f7

    SHA256

    1156533578632e0ed2e67bfb43c663533a552b8d90cb2872e14fb372fe5eeb27

    SHA512

    5ffae91427529b0ac472f29fd24486fa8d882119519cbbdd8b3187dd68b614379b9ce4592461ef7b548612b33f20ab2fd1d24435393b78a7ec002969eb1c7826

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RLHRIIGD\xmbc[1].ico

    Filesize

    3KB

    MD5

    1279bf31d9659ad2017369ec1b90473c

    SHA1

    0f21c5a8266c36af7909118899e1fa07590f2df8

    SHA256

    74e3162830413f502277c221381f07b34d77a155f5cbeca379e1a4ffc29af116

    SHA512

    18ab594628c7873c56a85cc748585a3422f06d3f3ad70e5d33e86bed8bb9595d43513960731db89820d89b2ed950b48d6b891dbda768164f968ab06f5a86c277

  • C:\Users\Admin\AppData\Local\Temp\Cab7513.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7525.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nst4C2F.tmp\ioSpecial.ini

    Filesize

    709B

    MD5

    69d2215ffbf9e39c7547c3a22e1f233e

    SHA1

    ed87be8555213b4fc0291116b5a2c1f033f0526f

    SHA256

    69606b857cdbb91c037b5cb532fe5e86c9bd92ca4e670c70f967eb7cb540cc8f

    SHA512

    35672d638965313a19dc50e0f4686f8d151166279b916e15f1a66fc1496bff77faad6fff70b4d195a1e6017209cc875b7cebf8e9fb42e1dddb445bb3f26737b1

  • C:\Users\Admin\AppData\Local\Temp\nst4C2F.tmp\ioSpecial.ini

    Filesize

    726B

    MD5

    21d90073f5650d0fdddc145052dec50b

    SHA1

    91f06249c19b5c05d6a16f5bbb71ac1ad7ab1ab2

    SHA256

    1b51ad8de74f01e1b80f25de8095f928409dbd273a0966a710a9a2282e0d0183

    SHA512

    7dcbc86c364b4fb834c2ac4784a4071cbb915e4384a7e3de26f7d905164e0eb13c70198e7dac2df3a523a2674ead6f53f9a15a877544cba686fb4e43f721f3d9

  • C:\Users\Admin\AppData\Local\Temp\nst4C2F.tmp\ioSpecial.ini

    Filesize

    739B

    MD5

    94fc496997564e4b6fee8faca90bc9fc

    SHA1

    d94b8d60188b0a77c2ebf7b3e02c5056ebe70516

    SHA256

    68ee1413775d73ff43d3c3bb3c8104e729dfbe75c28d2449742fd88cbdfff70b

    SHA512

    6cb1f220931ad63817a5208ecf3c8f29941cbc20e4c9e28153af8925574506beda7c671c45c3dc33c68b7cc2b8cceabe67c557ba7468947d27a567b7ff290d2b

  • \Program Files\Highresolution Enterprises\X-Mouse Button Control\BugTrapU-x64.dll

    Filesize

    364KB

    MD5

    80d5f32b3fc515402b9e1fe958dedf81

    SHA1

    a80ffd7907e0de2ee4e13c592b888fe00551b7e0

    SHA256

    0ab8481b44e7d2f0d57b444689aef75b61024487a5cf188c2fc6b8de919b040a

    SHA512

    1589246cd480326ca22c2acb1129a3a90edf13b75031343061f0f4ed51580dfb890862162a65957be9026381bb24475fec6ddcb86692c5961a24b18461e5f1f0

  • \Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe

    Filesize

    1.7MB

    MD5

    bb632bc4c4414303c783a0153f6609f7

    SHA1

    eb16bf0d8ce0af4d72dff415741fd0d7aac3020e

    SHA256

    7cc348f8d2ee10264e136425059205cf2c17493b4f3f6a43af024aecb926d8c8

    SHA512

    15b34efe93d53e54c1527705292fbf145d6757f10dd87bc787dc40bf02f0d641468b95c571f7037417f2f626de2afcd68b5d82214e27e9e622ab0475633e9de5

  • \Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonHook.dll

    Filesize

    1.0MB

    MD5

    d62a4279ebba19c9bf0037d4f7cbf0bc

    SHA1

    5257d9505cca6b75fe55dfdaf2ea83a7d2d28170

    SHA256

    c845e808dc035329a7c95c846413a7afb9976f09872ba3c05dfa5f492156eef0

    SHA512

    6895a12cddc41bf516279b1235fca238b0b3b0cef2cc25abe14a9160ed23f5bde3d476f885d674537febc7de7eb58b0824d96153c626e1563a5a8a1887fb5323

  • \Program Files\Highresolution Enterprises\X-Mouse Button Control\uninstaller.exe

    Filesize

    74KB

    MD5

    bfffc38fff05079b15a5317e279dc7a9

    SHA1

    0c18db954f11646d65d0300e58fefcd9ff7634de

    SHA256

    c4e59737ffd988ef4bc7a62e3316a470b1b09a9889f65908110fba3d7b1c6500

    SHA512

    d30220e024ac242285ea757006e7da3874e5f889951de226d48c372a6a8701b76d4a917134ecc1e72c6c3a8d43444762288e7134a25d837e9f43d972675c81d6

  • \Users\Admin\AppData\Local\Temp\nst4C2F.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    d753362649aecd60ff434adf171a4e7f

    SHA1

    3b752ad064e06e21822c8958ae22e9a6bb8cf3d0

    SHA256

    8f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586

    SHA512

    41bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d

  • \Users\Admin\AppData\Local\Temp\nst4C2F.tmp\ShellExecAsUser.dll

    Filesize

    7KB

    MD5

    86a81b9ab7de83aa01024593a03d1872

    SHA1

    8fd7c645e6e2cb1f1bcb97b3b5f85ce1660b66be

    SHA256

    27d61cacd2995f498ba971b3b2c53330bc0e9900c9d23e57b2927aadfdee8115

    SHA512

    cc37bd5d74d185077bdf6c4a974fb29922e3177e2c5971c664f46c057aad1236e6f3f856c5d82f1d677c29896f0e3e71283ef04f886db58abae151cb27c827ac

  • \Users\Admin\AppData\Local\Temp\nst4C2F.tmp\System.dll

    Filesize

    10KB

    MD5

    56a321bd011112ec5d8a32b2f6fd3231

    SHA1

    df20e3a35a1636de64df5290ae5e4e7572447f78

    SHA256

    bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

    SHA512

    5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

  • \Users\Admin\AppData\Local\Temp\nst4C2F.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    f832e4279c8ff9029b94027803e10e1b

    SHA1

    134ff09f9c70999da35e73f57b70522dc817e681

    SHA256

    4cd17f660560934a001fc8e6fdcea50383b78ca129fb236623a9666fcbd13061

    SHA512

    bf92b61aa267e3935f0ea7f47d8d96f09f016e648c2a7e7dcd5ecc47da864e824c592098c1e39526b643bd126c5c99d68a7040411a4cf68857df629f24d4107d

  • memory/2448-232-0x00000000028D0000-0x00000000028D2000-memory.dmp

    Filesize

    8KB