Analysis

  • max time kernel
    58s
  • max time network
    94s
  • platform
    windows10-1703_x64
  • resource
    win10-20231129-en
  • resource tags

    arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10/12/2023, 16:17

General

  • Target

    7c8a66395dc5f2b7a138c1475ba8329c662a4c905a24dccfaebb31794d605d4f.exe

  • Size

    331KB

  • MD5

    126db9a3b00b37cee0f84dcd3e924be1

  • SHA1

    f0076e596e39b878943efb9e6f3242d05be44ee0

  • SHA256

    7c8a66395dc5f2b7a138c1475ba8329c662a4c905a24dccfaebb31794d605d4f

  • SHA512

    5300bdfb4ee7008e61233851c284cd808aff5d51846c60542c33f3e914f42bb5eac160023a3fac3a7d2394162c4c4147c3b7d1743f0fca9e0a76d8d4ab090a72

  • SSDEEP

    6144:IWLFvUwJakJ2f2rKFbG7cPa7T+WV6ucjgU:IWLIkJ2f2rKFb+cQ9/FU

Malware Config

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Extracted

Family

djvu

C2

http://zexeq.com/test1/get.php

Attributes
  • extension

    .hhuy

  • offline_id

    gG3wF8nDWRqLztkHPAxMzpvNVlmLBMgQKmKiCNt1

  • payload_url

    http://brusuax.com/dl/build2.exe

    http://zexeq.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-5zKXJl7cwi Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0834ASdw

rsa_pubkey.plain

Signatures

  • Detect ZGRat V1 22 IoCs
  • Detected Djvu ransomware 13 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 3 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c8a66395dc5f2b7a138c1475ba8329c662a4c905a24dccfaebb31794d605d4f.exe
    "C:\Users\Admin\AppData\Local\Temp\7c8a66395dc5f2b7a138c1475ba8329c662a4c905a24dccfaebb31794d605d4f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4452
    • C:\Users\Admin\AppData\Local\Temp\7c8a66395dc5f2b7a138c1475ba8329c662a4c905a24dccfaebb31794d605d4f.exe
      "C:\Users\Admin\AppData\Local\Temp\7c8a66395dc5f2b7a138c1475ba8329c662a4c905a24dccfaebb31794d605d4f.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:3580
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3580 -s 496
        3⤵
        • Program crash
        PID:5056
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FC80.bat" "
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4856
    • C:\Windows\system32\reg.exe
      reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
      2⤵
        PID:3396
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FEE3.bat" "
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:888
      • C:\Windows\system32\reg.exe
        reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
        2⤵
          PID:776
      • C:\Users\Admin\AppData\Local\Temp\20F3.exe
        C:\Users\Admin\AppData\Local\Temp\20F3.exe
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        PID:4572
      • C:\Users\Admin\AppData\Local\Temp\77ED.exe
        C:\Users\Admin\AppData\Local\Temp\77ED.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:364
        • C:\Users\Admin\AppData\Local\Temp\77ED.exe
          C:\Users\Admin\AppData\Local\Temp\77ED.exe
          2⤵
          • Executes dropped EXE
          PID:2808
          • C:\Windows\SysWOW64\icacls.exe
            icacls "C:\Users\Admin\AppData\Local\85b42382-a0e8-4e4f-9fc3-d55721c76fd0" /deny *S-1-1-0:(OI)(CI)(DE,DC)
            3⤵
            • Modifies file permissions
            PID:2456
          • C:\Users\Admin\AppData\Local\Temp\77ED.exe
            "C:\Users\Admin\AppData\Local\Temp\77ED.exe" --Admin IsNotAutoStart IsNotTask
            3⤵
              PID:4660
              • C:\Users\Admin\AppData\Local\Temp\77ED.exe
                "C:\Users\Admin\AppData\Local\Temp\77ED.exe" --Admin IsNotAutoStart IsNotTask
                4⤵
                  PID:4316
          • C:\Users\Admin\AppData\Local\Temp\85D9.exe
            C:\Users\Admin\AppData\Local\Temp\85D9.exe
            1⤵
              PID:1140
            • C:\Users\Admin\AppData\Local\Temp\8B87.exe
              C:\Users\Admin\AppData\Local\Temp\8B87.exe
              1⤵
                PID:196

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                Filesize

                1KB

                MD5

                41ff3625b90b75348d1313e787e41cd1

                SHA1

                b9034fd0f7b6dfb7a1fc8ad3b2e13425205789e1

                SHA256

                e79d41c0938399b745f9aa779e5606cc5554907b1d01c75cc77ff04f8dd1c15c

                SHA512

                f795a72e365bcb1ad4a97d409e139d888d9d9bd02b4c4feed9ab4fb1332afb4907840bc72ed2c3460ec1875902ee433dd0a8b8dee5734c2cd3b89ac337a2d222

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

                Filesize

                724B

                MD5

                8202a1cd02e7d69597995cabbe881a12

                SHA1

                8858d9d934b7aa9330ee73de6c476acf19929ff6

                SHA256

                58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

                SHA512

                97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                Filesize

                410B

                MD5

                86312142e12b1237e98f036a57a676d4

                SHA1

                7743abd524e8784270f0c37e6bc5f480cb237306

                SHA256

                be3b005ff1e567bc6221406f07d81c44034c3fa719feb6c5b404b73698df6f30

                SHA512

                c52682df1eb4b27552610b62b6f02f5e1ac858deb55a30a70c2cb9dae3826b2dcf44d60da17942925a95b47f5a17088352b6ff082e9e4781171500b37810d07d

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

                Filesize

                392B

                MD5

                e7e767739be9b18ca4561629ad773b01

                SHA1

                1985f4ae44d5df219485c28a468d09adcbc6766a

                SHA256

                9a2132c2bfbff58a5f38359a0a8218560f3999b4ae3b4eac1301be68e703a72d

                SHA512

                764833fe8508ec7d495c5fbec02936d2f946cae6823629168e5e93b385b3bea358503c5a3b26a185a2bb644c64f8cbdcfa79ed39a4d370dfe07ce07b3b8bb88b

              • C:\Users\Admin\AppData\Local\85b42382-a0e8-4e4f-9fc3-d55721c76fd0\77ED.exe

                Filesize

                669KB

                MD5

                94164a25a12f16bdc1656b36cae89d42

                SHA1

                7f47e649755a1b3733b254dc6447413a4bebdb53

                SHA256

                ed61619e3b43e620761022eaefb6cfdf1a1fd0a635f7de803328921a991ca9d7

                SHA512

                bcd959c4ce526504e484d1c2b8b618d7964b63953fc72ae149a50aff92e4b7307c3e4bc4c606b41888a36b10561a1a4494364ec2ef206719c72a823014d5abca

              • C:\Users\Admin\AppData\Local\Temp\20F3.exe

                Filesize

                915KB

                MD5

                90fc086df34585e0997af04ceb52d8af

                SHA1

                2dff97bf855b828553438fadb6df8a5b378a8c05

                SHA256

                2e1320e7e2b6bd65d52945074097c00f26814641f4e1701d7473134092b75019

                SHA512

                c8354af2fc3d996ee48dc5b3541981f41ae1d7e682d322d5837071dfc4ce81f3edc8698dcd9984e8e00a7629eed60c698ec0d6075677ab236ac9badb2618c840

              • C:\Users\Admin\AppData\Local\Temp\20F3.exe

                Filesize

                819KB

                MD5

                7237addfd819cc3c973a2653b6660eab

                SHA1

                31c75a267558cd3a64a6d3dadb3553c35a58ac80

                SHA256

                1ce2ea3c7040cc486ff2e643ca905c58cd097b819e8f04c76899c6628b90a10b

                SHA512

                29630ee6060296b16d4456a879d3b6d88b574a44ef2f676ae105b436519e5a2869d8b0844150733070978b0dde85b7a893f40d7a826fa9edb7410a1784f2886e

              • C:\Users\Admin\AppData\Local\Temp\77ED.exe

                Filesize

                841KB

                MD5

                b3f073f6327848926c5c28cf56d20d12

                SHA1

                0ae749f80e8d835b59e770dd15ea49fd726cc887

                SHA256

                3175928cbae77b1422d399eaa781e20b01ef12049cf2e652894828115d92115a

                SHA512

                511e7a67a69c5dd224238d7790c27e91f484088f2a5b6d158864290f82eb43100b114cabac53366db2c80a234030171206ef17887b313238d00a81498eed74d9

              • C:\Users\Admin\AppData\Local\Temp\77ED.exe

                Filesize

                623KB

                MD5

                86f3c94a2354ad2b0983c91754e8a43e

                SHA1

                fed17cf23bb4666c0deea336d8a7f2a31d6687eb

                SHA256

                8a39f4a1ad7b9049520e162eda6fd4c782177f90e5f37f155f34aacd0aef8f9f

                SHA512

                2af8a14f86451a0678b5a3d84edd6c75a07d5b15e8515286b9e8f6edc2f84d94aecce43abeda4b61e06dc51c5699779741ca6d037f223715b21ad739e15b5388

              • C:\Users\Admin\AppData\Local\Temp\85D9.exe

                Filesize

                524KB

                MD5

                375c99e5d58802759576540a35f939b6

                SHA1

                d3d8c002ade2e850d08122f909bed7db090d028f

                SHA256

                8b5124816a923eca5d342a274e8f199155104e72102833062bed27667432bb8c

                SHA512

                d01390280a6ae6d8e0115866e11e31a8d4e89086c1066fcb561827d62f0e611769265b3df8940de87c3ce6dac0bf65d60ee9d5ade9e5f1d368a87c27b1a8a1c9

              • C:\Users\Admin\AppData\Local\Temp\85D9.exe

                Filesize

                354KB

                MD5

                943e44e98bca980272d0748d7650affe

                SHA1

                b28a818945542d29eddf5207e1c93c9d10e08bfe

                SHA256

                268b4a52cd6dbe95aeec936330a360e20fe625526a8b2d77c264fc1ff6c0d08c

                SHA512

                124c1df7b0ffa270dc3e14526623d754fcc9b00a1bf5567efbfee7ff5e86fb4242ad20fa3b965a770b8618344273cb08cae2513342d5774c8aa54c794f5120e1

              • C:\Users\Admin\AppData\Local\Temp\FC80.bat

                Filesize

                77B

                MD5

                55cc761bf3429324e5a0095cab002113

                SHA1

                2cc1ef4542a4e92d4158ab3978425d517fafd16d

                SHA256

                d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a

                SHA512

                33f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155

              • memory/364-69-0x0000000000CA4000-0x0000000000D35000-memory.dmp

                Filesize

                580KB

              • memory/364-70-0x00000000028B0000-0x00000000029CB000-memory.dmp

                Filesize

                1.1MB

              • memory/1140-128-0x0000028E707E0000-0x0000028E7090A000-memory.dmp

                Filesize

                1.2MB

              • memory/1140-104-0x00007FF90C490000-0x00007FF90CE7C000-memory.dmp

                Filesize

                9.9MB

              • memory/1140-132-0x0000028E707E0000-0x0000028E7090A000-memory.dmp

                Filesize

                1.2MB

              • memory/1140-126-0x0000028E707E0000-0x0000028E7090A000-memory.dmp

                Filesize

                1.2MB

              • memory/1140-130-0x0000028E707E0000-0x0000028E7090A000-memory.dmp

                Filesize

                1.2MB

              • memory/1140-124-0x0000028E707E0000-0x0000028E7090A000-memory.dmp

                Filesize

                1.2MB

              • memory/1140-116-0x0000028E707E0000-0x0000028E7090A000-memory.dmp

                Filesize

                1.2MB

              • memory/1140-112-0x0000028E707E0000-0x0000028E7090A000-memory.dmp

                Filesize

                1.2MB

              • memory/1140-110-0x0000028E707E0000-0x0000028E7090A000-memory.dmp

                Filesize

                1.2MB

              • memory/1140-108-0x0000028E707E0000-0x0000028E7090A000-memory.dmp

                Filesize

                1.2MB

              • memory/1140-106-0x0000028E707E0000-0x0000028E7090A000-memory.dmp

                Filesize

                1.2MB

              • memory/1140-105-0x0000028E707E0000-0x0000028E7090A000-memory.dmp

                Filesize

                1.2MB

              • memory/1140-122-0x0000028E707E0000-0x0000028E7090A000-memory.dmp

                Filesize

                1.2MB

              • memory/1140-141-0x0000028E707E0000-0x0000028E7090A000-memory.dmp

                Filesize

                1.2MB

              • memory/1140-120-0x0000028E707E0000-0x0000028E7090A000-memory.dmp

                Filesize

                1.2MB

              • memory/1140-103-0x0000028E707E0000-0x0000028E70910000-memory.dmp

                Filesize

                1.2MB

              • memory/1140-102-0x0000028E561C0000-0x0000028E562FA000-memory.dmp

                Filesize

                1.2MB

              • memory/1140-118-0x0000028E707E0000-0x0000028E7090A000-memory.dmp

                Filesize

                1.2MB

              • memory/1140-114-0x0000028E707E0000-0x0000028E7090A000-memory.dmp

                Filesize

                1.2MB

              • memory/1140-143-0x0000028E707E0000-0x0000028E7090A000-memory.dmp

                Filesize

                1.2MB

              • memory/1140-151-0x0000028E707E0000-0x0000028E7090A000-memory.dmp

                Filesize

                1.2MB

              • memory/1140-153-0x0000028E707E0000-0x0000028E7090A000-memory.dmp

                Filesize

                1.2MB

              • memory/1140-149-0x0000028E707E0000-0x0000028E7090A000-memory.dmp

                Filesize

                1.2MB

              • memory/1140-147-0x0000028E707E0000-0x0000028E7090A000-memory.dmp

                Filesize

                1.2MB

              • memory/1140-145-0x0000028E707E0000-0x0000028E7090A000-memory.dmp

                Filesize

                1.2MB

              • memory/2808-83-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/2808-64-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/2808-68-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/2808-71-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/2808-66-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/3404-5-0x0000000000860000-0x0000000000876000-memory.dmp

                Filesize

                88KB

              • memory/3580-9-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/3580-4-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/3580-1-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/4316-89-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/4316-91-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/4316-90-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/4316-136-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/4316-96-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/4316-97-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/4316-139-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/4316-140-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/4452-2-0x0000000000F50000-0x0000000001050000-memory.dmp

                Filesize

                1024KB

              • memory/4452-3-0x0000000000CE0000-0x0000000000CE9000-memory.dmp

                Filesize

                36KB

              • memory/4572-56-0x0000000076250000-0x0000000076320000-memory.dmp

                Filesize

                832KB

              • memory/4572-36-0x00000000732A0000-0x000000007398E000-memory.dmp

                Filesize

                6.9MB

              • memory/4572-46-0x0000000008190000-0x00000000081F6000-memory.dmp

                Filesize

                408KB

              • memory/4572-41-0x0000000008D40000-0x0000000009346000-memory.dmp

                Filesize

                6.0MB

              • memory/4572-42-0x0000000008730000-0x000000000883A000-memory.dmp

                Filesize

                1.0MB

              • memory/4572-44-0x0000000007F70000-0x0000000007FAE000-memory.dmp

                Filesize

                248KB

              • memory/4572-45-0x0000000007FE0000-0x000000000802B000-memory.dmp

                Filesize

                300KB

              • memory/4572-43-0x0000000007DB0000-0x0000000007DC2000-memory.dmp

                Filesize

                72KB

              • memory/4572-40-0x0000000003630000-0x000000000363A000-memory.dmp

                Filesize

                40KB

              • memory/4572-39-0x0000000007DD0000-0x0000000007E62000-memory.dmp

                Filesize

                584KB

              • memory/4572-38-0x0000000008230000-0x000000000872E000-memory.dmp

                Filesize

                5.0MB

              • memory/4572-49-0x00000000097C0000-0x0000000009982000-memory.dmp

                Filesize

                1.8MB

              • memory/4572-37-0x0000000000240000-0x0000000000D0A000-memory.dmp

                Filesize

                10.8MB

              • memory/4572-47-0x00000000095A0000-0x00000000095F0000-memory.dmp

                Filesize

                320KB

              • memory/4572-50-0x0000000009EC0000-0x000000000A3EC000-memory.dmp

                Filesize

                5.2MB

              • memory/4572-52-0x0000000000240000-0x0000000000D0A000-memory.dmp

                Filesize

                10.8MB

              • memory/4572-33-0x0000000077DB4000-0x0000000077DB5000-memory.dmp

                Filesize

                4KB

              • memory/4572-30-0x0000000076250000-0x0000000076320000-memory.dmp

                Filesize

                832KB

              • memory/4572-31-0x0000000075450000-0x0000000075612000-memory.dmp

                Filesize

                1.8MB

              • memory/4572-29-0x0000000076250000-0x0000000076320000-memory.dmp

                Filesize

                832KB

              • memory/4572-28-0x0000000076250000-0x0000000076320000-memory.dmp

                Filesize

                832KB

              • memory/4572-27-0x0000000000240000-0x0000000000D0A000-memory.dmp

                Filesize

                10.8MB

              • memory/4572-53-0x0000000076250000-0x0000000076320000-memory.dmp

                Filesize

                832KB

              • memory/4572-54-0x0000000075450000-0x0000000075612000-memory.dmp

                Filesize

                1.8MB

              • memory/4572-57-0x0000000076250000-0x0000000076320000-memory.dmp

                Filesize

                832KB

              • memory/4572-67-0x00000000732A0000-0x000000007398E000-memory.dmp

                Filesize

                6.9MB

              • memory/4660-86-0x00000000027B0000-0x0000000002843000-memory.dmp

                Filesize

                588KB