Analysis

  • max time kernel
    65s
  • max time network
    68s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    11-02-2025 01:07

General

  • Target

    XMouseButtonControlSetup.2.20.5.exe

  • Size

    2.9MB

  • MD5

    2e9725bc1d71ad1b8006dfc5a2510f88

  • SHA1

    6e1f7d12881696944bf5e030a7d131b969de0c6c

  • SHA256

    2240bf5fb5d80938b0676c46ef9f84bc1739c32f60c473ff85e530ae0eca2818

  • SHA512

    62bd9cde806f83f911f1068b452084ef2adc01bc0dec2d0f668a781cc0d94e39f6e35618264d8796ca205724725abd40429f463017e6ca5caf7d683429f82d39

  • SSDEEP

    49152:n65SJw48kZN+nCYk7c44+Y0hdwn4Km2A5aT/pVE0hYYajihV2Qso0SWMrboF:tfpeno4oY0QZm2dlNJsrHM4

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 16 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 33 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XMouseButtonControlSetup.2.20.5.exe
    "C:\Users\Admin\AppData\Local\Temp\XMouseButtonControlSetup.2.20.5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    PID:2256
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://www.highrez.co.uk/scripts/postinstall.asp?package=XMouse&major=2&minor=20&build=5&revision=0&platform=x64
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1500
  • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe
    "C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe" /Installed /notportable
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:532
  • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe
    "C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe" /notportable
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2252
  • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe
    "C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe" /notportable
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e266997353e38046fc7e529a86812370

    SHA1

    8d1553492124d28aed59ec560a373c5283f37432

    SHA256

    a41fff5ad6212467cf2590cc1e9e748e53e975297bb4b8909bb0915878bbed42

    SHA512

    605d44fbc31775b307fd2d7f5a002cefeb94532070853d4f664eabfed597179eeb68260ef24e69543a5a2d167ba8741cbe573f4ceac261efcd395a8a0b86f26c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ef81b02d97353196987468581031c9f

    SHA1

    02fb8438d5010c1f3d9a15a1ce179ad4bc1ed67a

    SHA256

    4f928e3b64b9dd5ed1022b9cd944a764f597dadcc1808b0a8d38621a73732b56

    SHA512

    c32431c04c458a0f4023ecabe253836be21ebc3bfacaed37b9943d7ecf5999b11c4097754ba46f421072d8712f893f56c0c63fbbebcb88d43bfa6aceb9ff5af1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b607c5230cef76c1d6188d60878cdfc7

    SHA1

    ad935638402836b8e509cc07f992746637b3f21a

    SHA256

    a71a5dfde761361e3ed88a7c261c85011553cda758cb7d9f034b9755a4731866

    SHA512

    224bf4e142d3b60ce733fbb1c4bc39fae624ff79927f79e49b15c42d12b1c7f4cebab9e3b89decf4ccfbdc40f69e97007895e2cf4421162497173d04185f40f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b87dd6f9ea66803871e48b9dd8c56138

    SHA1

    0bd72a8d42b81e3f9ff974084e077db82c0c4988

    SHA256

    37c06fff4ac418049955539b1aa99a5886a4a46f37b1b3fa9245481b1c11fdfd

    SHA512

    74b67e84fb32b7b116049ee284be103b3371f7d0eec7d5ded9d03b564ca28bcca4340b03ef54e224ec7afc91e1cd5bb01a9bf9a00babd440f67518247889893f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    52227dea010d653ab445b4961a18efad

    SHA1

    a3d3f1fbff920a90256dce4c0edc59dec83905f7

    SHA256

    1b65f68703a9cf4479d6ef2e116135b09ad6dab394ddf94293be49bb9a39a64b

    SHA512

    83f7cfd3724d3457cb1583393e18e2620a708919b1494165161a4d839dd3c96793a35bc56932f58a7130d2813a3c02d3fa5a1648dfb7fa34b1db29bb0567e3fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f93a5eee9701729abbcd24a23561e0a1

    SHA1

    93b34471ef7213ac8a281773d95f19c2043573e4

    SHA256

    07a90a1727328e4a8fe1d46d6aafecc386fa9fb2745fa78f7be6e6c9d1422399

    SHA512

    3b5b22d543e951424b78c1554f6a1c0be85a7b94a70382f1242da6c7c242dad041be18516541c5978b2ffb9599eca9f250b29db7a7a136ef6366224a54f7e47e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0e188e79b396549fcc0f854b0680e7b7

    SHA1

    99695bd06f6039d38f71320550709f3df7ae6235

    SHA256

    76395f9b7b92334bbb584fe9df78f5ced4663773326d4a73c625d45ee6c311b7

    SHA512

    1c46ef2cafa3e6c3417df1be6a7f71b568e977eb28ac65e04eca84623a9b03642956b6a426114b47abfe2fe6a00acbba4ee6240b9b914ba0b78bebb58fdb4a0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3cf746ceab3b19777327e493318d223f

    SHA1

    891e3fb2970ccd98624a401037cd76a03896926a

    SHA256

    c0f206cf8acf871849ad898cbbf3782506a140acc5aac290d9be522b8cbccb90

    SHA512

    f502bf5a6e1cdeca34a155c1a11945ad7bdba3411a55cd4e42f326b976b75fa21ca0bd14e331942f3ca105e2bab35e53bfd4bb177fa3771a68d08731ca6f07dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0099c312655405693d0eeba89294a012

    SHA1

    5d1ca4628eb7b4d9bf1671417c98e20e1dfd4f00

    SHA256

    a95afd1a0d3a98256987c9247620b6048f6f455d2f3d886ea617424790a4c545

    SHA512

    110563fa5933fc2f6db80b1586c6657d7dea8b02fff7edb6bd4b5c5d707a7cfe0baca6980a8a67f95b3d1031f80fbd3b4b86db45d7c0ebcf18e383e3b83401a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f5379bbab69c5283b5a1da0b061073b

    SHA1

    d7000afafb068b8082573586b0cf46d9bc056c02

    SHA256

    1c843267f3c1da4cd38b6dd39c3a49bd830a612e04625cf92c386a135c8f4ed2

    SHA512

    72e8ef886edbaccc617724f56fa45e75a93d7f8965a7c86d6b92e9e329d4c56377074ef6156777298aa836e63b5236005e249d95b5cef77658f44ce1cb707bc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    02343054eafe41afe894c7aae2551efe

    SHA1

    c2894712e24f829a741f1ad1142e82aa4a217a2c

    SHA256

    4b27c1b124b72aaf3f34f74cb809b1923b18597dbc82ec95fa91f7514aeb16a0

    SHA512

    1414b38394dc1ab36fe5478191760fdf30b3f8abc48597c1b87077caf1ba1df9692dce209ce58cd49b40eeb496f415ec8b5923238e3b067ca05aa92758f27eee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8362d862cf6156e3dcb1cf3d8d1c7a49

    SHA1

    ab405722be520b50ec747afb641f5233df075b9e

    SHA256

    ea288bd9668a64f3c3377a71a52a0c3dea4fad43ec2227fd504d392aec09131c

    SHA512

    602f8dba989cddeb9bcdb133da6e1a8726437496476a715cbcb6c4cef7f6414a9d15540f41f7731eee733f2a03979a40caa56016f08d61e124b5abc7bb57c85d

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\melo7gx\imagestore.dat

    Filesize

    3KB

    MD5

    4ff4765d45d4736b028b3a730e556ea9

    SHA1

    7ecd0f2489841412e67c6dfcf4bb91ac1f468ceb

    SHA256

    dbf009429720e58bf43ada8a3eeed6da5595d8e11aa228125cb0eaa41ca06759

    SHA512

    0f3d64a5345e39fa2b3b38f1e2acc3b23ea3ca39ca44ae781a0e50813d97c45cfce83ca9adc972882787ae04577bef60ab400c166eb19604d199c920c11fe1a7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7BCOPU31\xmbc[1].ico

    Filesize

    3KB

    MD5

    1279bf31d9659ad2017369ec1b90473c

    SHA1

    0f21c5a8266c36af7909118899e1fa07590f2df8

    SHA256

    74e3162830413f502277c221381f07b34d77a155f5cbeca379e1a4ffc29af116

    SHA512

    18ab594628c7873c56a85cc748585a3422f06d3f3ad70e5d33e86bed8bb9595d43513960731db89820d89b2ed950b48d6b891dbda768164f968ab06f5a86c277

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NT668XG4\f[1].txt

    Filesize

    186KB

    MD5

    5185f3942d5c70a7d3561b28e56bf995

    SHA1

    0611e576d9b334eefc0cf4a8e2eea8142ff35fdc

    SHA256

    537f57957544c30876302757f222b22cac21a0e0673576e1647a94a4ba5b9c8e

    SHA512

    fe57705cc4f65cd7c3cc1c929f91b1e491db2355cc784f38adfc4dc9e1ee22a1ca87de40ecded3739de00858feeff768cacee5e42d989e3292626dc9a3f700b4

  • C:\Users\Admin\AppData\Local\Temp\CabF3D3.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF3F5.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nsjB80B.tmp\ioSpecial.ini

    Filesize

    709B

    MD5

    47427c505c90303e99cf5c309ee77e3b

    SHA1

    fa4997a2fe703047d596c40fa758a11d374e8f26

    SHA256

    25274b0c5ac8b94624d4e4795440432b563e3e76ee16891b887db35c933cb993

    SHA512

    16cebf56fe58c447132b91e9b0010fbf19923d079b608c136b4486a7e9e5bf81346b8fbe16bc7e8fae23002bcf268e94aee8a6761ba3a7ea64d574f59927e466

  • C:\Users\Admin\AppData\Local\Temp\nsjB80B.tmp\ioSpecial.ini

    Filesize

    726B

    MD5

    c3cd8a9800d1702127a8a272f0bf84ca

    SHA1

    c50f7414995c1d23079e481757e13875683fe347

    SHA256

    4169456b862eb8298689b4151b47163efb92cf5686c710b602ffc96c7495173d

    SHA512

    9fa69b67379feb1573f35e944b1471c4442f1b78e9822ea34f72f3f75564267c856fa10368346c7fd119e5aa5fe5a8e9cd58a6f9622b27eb917d464674d3dc34

  • C:\Users\Admin\AppData\Local\Temp\nsjB80B.tmp\ioSpecial.ini

    Filesize

    765B

    MD5

    ee63ad1aaf8474b5b82209488ba4af16

    SHA1

    21ee4aa168d44db39414319be80b6952bb351b38

    SHA256

    0934e8436a62b3712126661775295f42263d8a989b24c3e3201dd6a16489d3b7

    SHA512

    f891d197dbfab33565f857e1420274926c67dd9af54fb8617196c58f442c9841e63ec75964ba85474bc138bd1f65a91b8c7f9eeea9c1027d62af065c7b7ada01

  • C:\Users\Admin\AppData\Roaming\Highresolution Enterprises\XMouseButtonControl\Persist.xmbcps

    Filesize

    16B

    MD5

    4ae71336e44bf9bf79d2752e234818a5

    SHA1

    e129f27c5103bc5cc44bcdf0a15e160d445066ff

    SHA256

    374708fff7719dd5979ec875d56cd2286f6d3cf7ec317a3b25632aab28ec37bb

    SHA512

    0b6cbac838dfe7f47ea1bd0df00ec282fdf45510c92161072ccfb84035390c4da743d9c3b954eaa1b0f86fc9861b23cc6c8667ab232c11c686432ebb5c8c3f27

  • C:\Users\Admin\AppData\Roaming\Highresolution Enterprises\XMouseButtonControl\XMouseButtonControl.log

    Filesize

    2KB

    MD5

    1bf1a22a12905a349acfda63bcd81399

    SHA1

    1f308988b2fc4af46998e5243b6d4babbb1a1c20

    SHA256

    fd5fad73779bf202f1c317664a5275dde38f8f6b87ab94199d1f465a77b94cec

    SHA512

    60366f4c66f7d03e8ec4e91e29a91d9dc9046acfdce44fdcfeb489a3250f4b274657eca45348c382c420b014588743aa643f432c11bfedd811b8b26c5c672c74

  • C:\Users\Admin\AppData\Roaming\Highresolution Enterprises\XMouseButtonControl\XMouseButtonControl.log

    Filesize

    1KB

    MD5

    7451b900a9fa21ac5b2bb9317833e34a

    SHA1

    9d951e00a1e146c6d32977402f6e624a1cfc26be

    SHA256

    c6bc34065999a4d44d024632dcdb8450367bd80b8da6ea4d38ce980a8bd014e3

    SHA512

    8d2c0555b15ed8528699a941c94f9b2f9faf960967296f3f99015acf7611409cf3be3dfad71b81e22abe3b9980a1252c96e0d1b373f46b786f653d742a48b8e8

  • \Program Files\Highresolution Enterprises\X-Mouse Button Control\BugTrapU-x64.dll

    Filesize

    364KB

    MD5

    80d5f32b3fc515402b9e1fe958dedf81

    SHA1

    a80ffd7907e0de2ee4e13c592b888fe00551b7e0

    SHA256

    0ab8481b44e7d2f0d57b444689aef75b61024487a5cf188c2fc6b8de919b040a

    SHA512

    1589246cd480326ca22c2acb1129a3a90edf13b75031343061f0f4ed51580dfb890862162a65957be9026381bb24475fec6ddcb86692c5961a24b18461e5f1f0

  • \Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe

    Filesize

    1.7MB

    MD5

    bb632bc4c4414303c783a0153f6609f7

    SHA1

    eb16bf0d8ce0af4d72dff415741fd0d7aac3020e

    SHA256

    7cc348f8d2ee10264e136425059205cf2c17493b4f3f6a43af024aecb926d8c8

    SHA512

    15b34efe93d53e54c1527705292fbf145d6757f10dd87bc787dc40bf02f0d641468b95c571f7037417f2f626de2afcd68b5d82214e27e9e622ab0475633e9de5

  • \Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonHook.dll

    Filesize

    1.0MB

    MD5

    d62a4279ebba19c9bf0037d4f7cbf0bc

    SHA1

    5257d9505cca6b75fe55dfdaf2ea83a7d2d28170

    SHA256

    c845e808dc035329a7c95c846413a7afb9976f09872ba3c05dfa5f492156eef0

    SHA512

    6895a12cddc41bf516279b1235fca238b0b3b0cef2cc25abe14a9160ed23f5bde3d476f885d674537febc7de7eb58b0824d96153c626e1563a5a8a1887fb5323

  • \Program Files\Highresolution Enterprises\X-Mouse Button Control\uninstaller.exe

    Filesize

    74KB

    MD5

    bfffc38fff05079b15a5317e279dc7a9

    SHA1

    0c18db954f11646d65d0300e58fefcd9ff7634de

    SHA256

    c4e59737ffd988ef4bc7a62e3316a470b1b09a9889f65908110fba3d7b1c6500

    SHA512

    d30220e024ac242285ea757006e7da3874e5f889951de226d48c372a6a8701b76d4a917134ecc1e72c6c3a8d43444762288e7134a25d837e9f43d972675c81d6

  • \Users\Admin\AppData\Local\Temp\nsjB80B.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    d753362649aecd60ff434adf171a4e7f

    SHA1

    3b752ad064e06e21822c8958ae22e9a6bb8cf3d0

    SHA256

    8f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586

    SHA512

    41bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d

  • \Users\Admin\AppData\Local\Temp\nsjB80B.tmp\ShellExecAsUser.dll

    Filesize

    7KB

    MD5

    86a81b9ab7de83aa01024593a03d1872

    SHA1

    8fd7c645e6e2cb1f1bcb97b3b5f85ce1660b66be

    SHA256

    27d61cacd2995f498ba971b3b2c53330bc0e9900c9d23e57b2927aadfdee8115

    SHA512

    cc37bd5d74d185077bdf6c4a974fb29922e3177e2c5971c664f46c057aad1236e6f3f856c5d82f1d677c29896f0e3e71283ef04f886db58abae151cb27c827ac

  • \Users\Admin\AppData\Local\Temp\nsjB80B.tmp\System.dll

    Filesize

    10KB

    MD5

    56a321bd011112ec5d8a32b2f6fd3231

    SHA1

    df20e3a35a1636de64df5290ae5e4e7572447f78

    SHA256

    bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

    SHA512

    5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

  • \Users\Admin\AppData\Local\Temp\nsjB80B.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    f832e4279c8ff9029b94027803e10e1b

    SHA1

    134ff09f9c70999da35e73f57b70522dc817e681

    SHA256

    4cd17f660560934a001fc8e6fdcea50383b78ca129fb236623a9666fcbd13061

    SHA512

    bf92b61aa267e3935f0ea7f47d8d96f09f016e648c2a7e7dcd5ecc47da864e824c592098c1e39526b643bd126c5c99d68a7040411a4cf68857df629f24d4107d

  • memory/2256-232-0x0000000000720000-0x0000000000722000-memory.dmp

    Filesize

    8KB