Analysis

  • max time kernel
    237s
  • max time network
    234s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    27-11-2021 09:05

General

  • Target

    https://dropmefiles.com/brqGr

Malware Config

Signatures

  • Echelon

    Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

  • suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers

    suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers

  • suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

    suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

  • Executes dropped EXE 3 IoCs
  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 37 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://dropmefiles.com/brqGr
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2572 CREDAT:82945 /prefetch:2
      2⤵
      • Checks processor information in registry
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1076
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1908
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2128
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\Dumper.rar"
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:3708
    • C:\Users\Admin\Desktop\Dumper\Nemesis.exe
      "C:\Users\Admin\Desktop\Dumper\Nemesis.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:2684
    • C:\Users\Admin\Desktop\Dumper\A.exe
      "C:\Users\Admin\Desktop\Dumper\A.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:932
    • C:\Users\Admin\Desktop\Dumper\A.exe
      "C:\Users\Admin\Desktop\Dumper\A.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2504
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" a -i#7zMap2026:66:7zEvent8551 -ad -saa -- "C:\Users\Admin\Desktop\Dumper\2"
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:476

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    2
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    System Information Discovery

    2
    T1082

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\71223C1EC1C8B4264AAD7D57D8EB4FDF
      MD5

      96d6190a7ded3dcdce2546f65765f536

      SHA1

      b4ea681121d0a2a4d31bc30b5ca044663082818b

      SHA256

      981aa3fa46c6259acd2d8a73415067ae7ebda21851dec9cf4a75e87f596354f7

      SHA512

      fce660176351d1131a06743b6972fbe969c7af6dff41edde9e3e786ef4fe2e894fc5ef606e9b0a01732582cb74b9549baca0b2fb37ae54d39d08f7a7e12a8ada

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_CCF564BE5A3C924B17DDEBDEB5236E12
      MD5

      079e1d109f11f6475db8d7a951c28100

      SHA1

      a4f9062593177a1be8962a860aadcb2d18cb6769

      SHA256

      620dc85751352a3324ad525ec624efa740280f33c55d28929c8b86a83c59fedd

      SHA512

      7aa450af62b785041c20a5e280225fed8f1af3dc00cf47406ce3b82328e7a1bd98740ce8e1b766cb2d6f3bcc31eb28be146e4d1b38340a943e95b80966aae414

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\71223C1EC1C8B4264AAD7D57D8EB4FDF
      MD5

      d041a6d9bbd757a9f451338e322ffd1b

      SHA1

      361e7b411b71ed3e9004a4e422fa643dca21329c

      SHA256

      361f86a8b725288e5260c18646c523ada90c338d8d92ecea21f5f14996f51290

      SHA512

      268f832bba5e7d81dbded93372d6b975ac8f281f5ad1e0068684022f9757ada2f2da5c7613118883084727fe8e034c67888cf7cefb9b3337c42db86370991d1b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_CCF564BE5A3C924B17DDEBDEB5236E12
      MD5

      133b9a4d5057c35c364c907c28237782

      SHA1

      20c89e8d2e0d2fc2879a339b41c237bdbd921384

      SHA256

      bbaf5053df409ca446c022c584257dc5de633a0010298d6683db51b7636a1430

      SHA512

      bd0cdace3daf1094e865b67e84ed81158cdb676726bb5e704ac71d11c2943c4e3402baa8130a101ded496c65f5fce05f2198b19af92304276653fecf32cdad23

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\A.exe.log
      MD5

      5958251995526d87bfe8a905b76161bd

      SHA1

      8c80b9a10ecd44a82e34a14fba764b9c1ceef329

      SHA256

      608879cfb70b065676c9ab0ccff67f4793d289a9ea0dd7e69cefb9a43d6b8d46

      SHA512

      cf881c6847be76eceb7b29739542203e3a7ab8455ddbf85aa3652f4aafa9d1921f25e37e4eaf7ac9404b38d138c11c7424ca9ed144b7ea7c7d99e72c96d32e43

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LOEA0KPG\Dumper.rar.0r72ga7.partial
      MD5

      8b35432b24b1d5990634051631bf07f2

      SHA1

      6de89e5eb125fac158f62bf4eafe447d8266f1ac

      SHA256

      57ffd6eb72c70f8885aaf6afa5faf0b213bfec0b90340576c5375c9f94ab656e

      SHA512

      d3c110f33de96555a5aeb9103df8ded50823c497f11f6d9f239c8e354fba9a7f97d2da71f46013e31f325394bb2e3fc7a65ad06859e25972514d873d2b7242a5

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\BJ08QS8C.cookie
      MD5

      42a30b7d753d6c5cc9f8c06069d1348a

      SHA1

      dad0e0099fe2d04ebd802ee02514822ee89fc2a9

      SHA256

      fd52b5c3f6095503246b25959717cbffab2b1d5a85fe77fb5ef73f410833bc94

      SHA512

      edb8fc975f8de0d94fb76888efd119815aee7fbc7fa5898ba2a1cd51b1634697f761e3a89c1226099ad365d259e5d8c5b19b3b786f3a816e7a7c39156c89d693

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\PD6IADY1.cookie
      MD5

      5ae72d9973ba3ab633612e2b2ac41651

      SHA1

      8756bfdbe42fe35747b132fa72c76c83a42a90a8

      SHA256

      a47be6d8a42cabba465b9e0a4998e0b4efadf41141b5e49bf6d2f912db33a621

      SHA512

      a95eacc63c46017e39ef0cbda5328d2db6bac75bb0483908eec99ebab615828445827fa2f580ba118c0e61f7239918f3274f9f346e0d2b399331658ae7f8f847

    • C:\Users\Admin\Desktop\Dumper\2.7z
      MD5

      05020ef2b80079cebdb96ccd53f0c182

      SHA1

      13379410b61ccb3ffe9d2b848a3b4c93c30f3f5b

      SHA256

      242d8dbf162eff7b51cb2e0aa7040049bb8ba267dbd1387b4d7c6b44cb339573

      SHA512

      6fc10c2d582586d772ac1831a8cf6124b7a0dc8e8f8f21ba7d1d86aacaf114f7e261587c9269255542e2d1a14f88f92241f9ef3e6f0791be58582d58a245fc1f

    • C:\Users\Admin\Desktop\Dumper\2\1.bin
      MD5

      9bba41b1c7755ff7940c07d11544b30d

      SHA1

      9c639c4a4c4af135d22a5be6cbe0a391b26c141a

      SHA256

      d3f3f8c7a8d5fa516df86aa2629d4d8568e79d95d76ff74e878b2ff28fae6831

      SHA512

      cc957d5b3f309280054753bf33a62ef59c911bc854e7c95478144597d282dfc39a6471143b72076c1b4a1cae847f3bff299e3b72bce671185174cd2f9fef4da5

    • C:\Users\Admin\Desktop\Dumper\A.exe
      MD5

      0779b1abd335e0db09f167e55624f1b7

      SHA1

      4cdd0ee3c066b83a35076a2560a43f2c73ccbb5a

      SHA256

      301f3d81802a8990a0b53dc69f4afcc2e863ef3c133c55737e0028bac0fbfcef

      SHA512

      adebd419b451833047318840c06a516ddb93c44e5709dad9cc4f4a22971871915be03e436718a8e2528b80e5bbaad50fc570488fce2e59323faf00f76ae6849a

    • C:\Users\Admin\Desktop\Dumper\A.exe
      MD5

      0779b1abd335e0db09f167e55624f1b7

      SHA1

      4cdd0ee3c066b83a35076a2560a43f2c73ccbb5a

      SHA256

      301f3d81802a8990a0b53dc69f4afcc2e863ef3c133c55737e0028bac0fbfcef

      SHA512

      adebd419b451833047318840c06a516ddb93c44e5709dad9cc4f4a22971871915be03e436718a8e2528b80e5bbaad50fc570488fce2e59323faf00f76ae6849a

    • C:\Users\Admin\Desktop\Dumper\A.exe
      MD5

      0779b1abd335e0db09f167e55624f1b7

      SHA1

      4cdd0ee3c066b83a35076a2560a43f2c73ccbb5a

      SHA256

      301f3d81802a8990a0b53dc69f4afcc2e863ef3c133c55737e0028bac0fbfcef

      SHA512

      adebd419b451833047318840c06a516ddb93c44e5709dad9cc4f4a22971871915be03e436718a8e2528b80e5bbaad50fc570488fce2e59323faf00f76ae6849a

    • C:\Users\Admin\Desktop\Dumper\MetroFramework.Fonts.dll
      MD5

      65ef4b23060128743cef937a43b82aa3

      SHA1

      cc72536b84384ec8479b9734b947dce885ef5d31

      SHA256

      c843869aaca5135c2d47296985f35c71ca8af4431288d04d481c4e46cc93ee26

      SHA512

      d06690f9aac0c6500aed387f692b3305dfc0708b08fc2f27eaa44b108908ccd8267b07f8fb8608eef5c803039caeabf8f88a18b7e5b1d850f32bbb72bcd3b0b7

    • C:\Users\Admin\Desktop\Dumper\MetroFramework.dll
      MD5

      34ea7f7d66563f724318e322ff08f4db

      SHA1

      d0aa8038a92eb43def2fffbbf4114b02636117c5

      SHA256

      c2c12d31b4844e29de31594fc9632a372a553631de0a0a04c8af91668e37cf49

      SHA512

      dceb1f9435b9479f6aea9b0644ba8c46338a7f458c313822a9d9b3266d79af395b9b2797ed3217c7048db8b22955ec6fe8b0b1778077fa1de587123ad9e6b148

    • C:\Users\Admin\Desktop\Dumper\Nemesis.dll
      MD5

      cb105d3e5eb5a8f6ecedb6d8f4b757a1

      SHA1

      16f7830713eac8874bd04db23bed21c4197613ff

      SHA256

      55db85679a03270f13c82afac7c09d61743b087c7337297ffd77a27d393a5f8e

      SHA512

      d282bbc66eac7102cebf6bdefa1ed44874a3759f234116efb1f9bbaf1eab84f55cbab9b91fe76e64a5b332f5cdcef6658db6626b51a81179d72fc5a650ed9f07

    • C:\Users\Admin\Desktop\Dumper\Nemesis.exe
      MD5

      9635d5391c79b7dd9836211e7782bd95

      SHA1

      5b611f7014ec17a2ded672a7c9f9c3cf32ba88cf

      SHA256

      c794abac9761a004f8c2821fa745591d2bd641380fb17d020f6452f0a6b24328

      SHA512

      66ae80c2d89eb8cc865562423f84992d155f8204e19c8b079de4265a1550ad4e857debbb1ef0c32489f0049692a4be649b56291aa2064ab0f312ab5cc373366b

    • C:\Users\Admin\Desktop\Dumper\Nemesis.exe
      MD5

      9635d5391c79b7dd9836211e7782bd95

      SHA1

      5b611f7014ec17a2ded672a7c9f9c3cf32ba88cf

      SHA256

      c794abac9761a004f8c2821fa745591d2bd641380fb17d020f6452f0a6b24328

      SHA512

      66ae80c2d89eb8cc865562423f84992d155f8204e19c8b079de4265a1550ad4e857debbb1ef0c32489f0049692a4be649b56291aa2064ab0f312ab5cc373366b

    • C:\Users\Admin\Desktop\Dumper\Nemesis.exe.config
      MD5

      bc1bd48124e30ae229e8e737a4f7255f

      SHA1

      dccc5aa0c30844a71dc58a1d14466cc5c1304685

      SHA256

      bfc4546fb1d03580a6ab7d8e2cd4065fe8d1601e0fea2b0f487b8c5c4e26f70b

      SHA512

      a77e25fa230b5fefe8a1e56edd84c250df2d8255abf6cfa4730e1e839185d590789a5ec19cd995dba7052e64f69a090996e5b740584fd0ab27cbee78f9e7251b

    • C:\Users\Admin\Downloads\Dumper.rar.at1gmzy.partial
      MD5

      8b35432b24b1d5990634051631bf07f2

      SHA1

      6de89e5eb125fac158f62bf4eafe447d8266f1ac

      SHA256

      57ffd6eb72c70f8885aaf6afa5faf0b213bfec0b90340576c5375c9f94ab656e

      SHA512

      d3c110f33de96555a5aeb9103df8ded50823c497f11f6d9f239c8e354fba9a7f97d2da71f46013e31f325394bb2e3fc7a65ad06859e25972514d873d2b7242a5

    • \Users\Admin\Desktop\Dumper\Nemesis.dll
      MD5

      cb105d3e5eb5a8f6ecedb6d8f4b757a1

      SHA1

      16f7830713eac8874bd04db23bed21c4197613ff

      SHA256

      55db85679a03270f13c82afac7c09d61743b087c7337297ffd77a27d393a5f8e

      SHA512

      d282bbc66eac7102cebf6bdefa1ed44874a3759f234116efb1f9bbaf1eab84f55cbab9b91fe76e64a5b332f5cdcef6658db6626b51a81179d72fc5a650ed9f07

    • memory/932-244-0x0000025B00170000-0x0000025B00171000-memory.dmp
      Filesize

      4KB

    • memory/932-243-0x0000025B002A0000-0x0000025B002A2000-memory.dmp
      Filesize

      8KB

    • memory/1076-143-0x0000000000000000-mapping.dmp
    • memory/2504-254-0x000002A0E8D40000-0x000002A0E8D42000-memory.dmp
      Filesize

      8KB

    • memory/2572-140-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-118-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-153-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-154-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-158-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-159-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-160-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-166-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-167-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-168-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-169-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-170-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-171-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-172-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-150-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-174-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-175-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-178-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-179-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-148-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-147-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-144-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-145-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-184-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-141-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-152-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-139-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-138-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-137-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-135-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-134-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-119-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-120-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-122-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-132-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-131-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-123-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-124-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-130-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-128-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-127-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-126-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2572-125-0x00007FFB1C7D0000-0x00007FFB1C83B000-memory.dmp
      Filesize

      428KB

    • memory/2684-246-0x0000021835E99000-0x0000021835E9F000-memory.dmp
      Filesize

      24KB

    • memory/2684-226-0x0000021835E97000-0x0000021835E99000-memory.dmp
      Filesize

      8KB

    • memory/2684-225-0x0000021835E95000-0x0000021835E97000-memory.dmp
      Filesize

      8KB

    • memory/2684-222-0x0000021835E94000-0x0000021835E95000-memory.dmp
      Filesize

      4KB

    • memory/2684-221-0x0000021835E92000-0x0000021835E94000-memory.dmp
      Filesize

      8KB

    • memory/2684-220-0x0000021835E90000-0x0000021835E92000-memory.dmp
      Filesize

      8KB