Analysis

  • max time kernel
    31s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08/03/2023, 03:55

General

  • Target

    5dff814f55f2ca708d6f0315803516c8218c78fa069b54ec365f69669152e8d3.exe

  • Size

    702KB

  • MD5

    56884a89323e17c0f19223181210a6ad

  • SHA1

    ac78676b5796a8222a3610173a952aaabb47c4c7

  • SHA256

    5dff814f55f2ca708d6f0315803516c8218c78fa069b54ec365f69669152e8d3

  • SHA512

    bbbc6339f0749d0fa56f367b6b009ca1c2ca809d01f8c06c88ee43c32acf9fc116d45e90c5a3ce0e96666efdaafda6db25333d87bdae14b15f73dbc9d47c88a6

  • SSDEEP

    12288:XMrTy90FT3blFiWpdCoXFGtiPaaQ1MAiXbv7Y+ZYeyn0iINvsxf/elyfQFw:cyGBASIoVVkt0iINExf/RB

Malware Config

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5dff814f55f2ca708d6f0315803516c8218c78fa069b54ec365f69669152e8d3.exe
    "C:\Users\Admin\AppData\Local\Temp\5dff814f55f2ca708d6f0315803516c8218c78fa069b54ec365f69669152e8d3.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yksG81MN22.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yksG81MN22.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkqh86fw69.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkqh86fw69.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1184
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukWg46dN52.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukWg46dN52.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:992
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukWg46dN52.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukWg46dN52.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1528
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkvr98mK72.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkvr98mK72.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1188

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkvr98mK72.exe

          Filesize

          176KB

          MD5

          4afd2123b8ce9c6c48f34b5940b90f3a

          SHA1

          c23a0eaec67b49e99e2b68f446f79823e2735334

          SHA256

          adc35ca672aa934b10c77035cd3f3e3f3bdae770fc5bad6d57c48c99a6674b93

          SHA512

          4124cffe814f1c2d06d59990479ceca2c9bfefbee7511a3946320afcd2123bf43a312d3a9c3209aa519e4e23d33924d8226e11aee065537e63f4c654e124acd9

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkvr98mK72.exe

          Filesize

          176KB

          MD5

          4afd2123b8ce9c6c48f34b5940b90f3a

          SHA1

          c23a0eaec67b49e99e2b68f446f79823e2735334

          SHA256

          adc35ca672aa934b10c77035cd3f3e3f3bdae770fc5bad6d57c48c99a6674b93

          SHA512

          4124cffe814f1c2d06d59990479ceca2c9bfefbee7511a3946320afcd2123bf43a312d3a9c3209aa519e4e23d33924d8226e11aee065537e63f4c654e124acd9

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yksG81MN22.exe

          Filesize

          558KB

          MD5

          43d0f7d361fe7b18d33efb1d700d60cd

          SHA1

          f6b3f6aa19346385d5a444ad63869a7cfccb582f

          SHA256

          d93d174a102cf5fc8f90ba8a6ae63f2750086c6c55c7c55ade402f4c66ae0062

          SHA512

          1c51b48c9babd7c0b40b824beb99a2ab345f8aaa088f98eab806ebc89ffdffcb575fcd07ec5419f819ff1efb0a210f6de17ef8cac94d355ea358c738670c84b5

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yksG81MN22.exe

          Filesize

          558KB

          MD5

          43d0f7d361fe7b18d33efb1d700d60cd

          SHA1

          f6b3f6aa19346385d5a444ad63869a7cfccb582f

          SHA256

          d93d174a102cf5fc8f90ba8a6ae63f2750086c6c55c7c55ade402f4c66ae0062

          SHA512

          1c51b48c9babd7c0b40b824beb99a2ab345f8aaa088f98eab806ebc89ffdffcb575fcd07ec5419f819ff1efb0a210f6de17ef8cac94d355ea358c738670c84b5

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkqh86fw69.exe

          Filesize

          363KB

          MD5

          5f9106c1a4ae0150887ac3eadc521f31

          SHA1

          b7c59f033e09829e70ebf380ef9c33aff98d2bf4

          SHA256

          ddda2d12c18f4944b44af8c6bb030ae608060d087483c423acf217c4c4ed5411

          SHA512

          80ab71ecb332f2316abf7cb73c4811bf2162c2e95fc0670fcd8d26370158e2b2f342328ece12e9edeed90a7568d24d0048bdb9ee3ea928fd80d1499851c5caf3

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkqh86fw69.exe

          Filesize

          363KB

          MD5

          5f9106c1a4ae0150887ac3eadc521f31

          SHA1

          b7c59f033e09829e70ebf380ef9c33aff98d2bf4

          SHA256

          ddda2d12c18f4944b44af8c6bb030ae608060d087483c423acf217c4c4ed5411

          SHA512

          80ab71ecb332f2316abf7cb73c4811bf2162c2e95fc0670fcd8d26370158e2b2f342328ece12e9edeed90a7568d24d0048bdb9ee3ea928fd80d1499851c5caf3

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkqh86fw69.exe

          Filesize

          363KB

          MD5

          5f9106c1a4ae0150887ac3eadc521f31

          SHA1

          b7c59f033e09829e70ebf380ef9c33aff98d2bf4

          SHA256

          ddda2d12c18f4944b44af8c6bb030ae608060d087483c423acf217c4c4ed5411

          SHA512

          80ab71ecb332f2316abf7cb73c4811bf2162c2e95fc0670fcd8d26370158e2b2f342328ece12e9edeed90a7568d24d0048bdb9ee3ea928fd80d1499851c5caf3

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukWg46dN52.exe

          Filesize

          421KB

          MD5

          a1a8c7e021590c6ccb05a2a54e7d6f12

          SHA1

          76cabb2806779c8bcaba0f6ca25de05d2a4cda32

          SHA256

          ffa315cca20806209add23fb058b99380ac07212267bf8fceb265976a24207b8

          SHA512

          556cb80ba26000eb1426c652b995add13e2f8eb062820d34549317e82e785805b10d19b72942c505e3e1a0c5d985e9e01fcff7ab41124d903b72ce0570acaac2

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukWg46dN52.exe

          Filesize

          421KB

          MD5

          a1a8c7e021590c6ccb05a2a54e7d6f12

          SHA1

          76cabb2806779c8bcaba0f6ca25de05d2a4cda32

          SHA256

          ffa315cca20806209add23fb058b99380ac07212267bf8fceb265976a24207b8

          SHA512

          556cb80ba26000eb1426c652b995add13e2f8eb062820d34549317e82e785805b10d19b72942c505e3e1a0c5d985e9e01fcff7ab41124d903b72ce0570acaac2

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukWg46dN52.exe

          Filesize

          421KB

          MD5

          a1a8c7e021590c6ccb05a2a54e7d6f12

          SHA1

          76cabb2806779c8bcaba0f6ca25de05d2a4cda32

          SHA256

          ffa315cca20806209add23fb058b99380ac07212267bf8fceb265976a24207b8

          SHA512

          556cb80ba26000eb1426c652b995add13e2f8eb062820d34549317e82e785805b10d19b72942c505e3e1a0c5d985e9e01fcff7ab41124d903b72ce0570acaac2

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukWg46dN52.exe

          Filesize

          421KB

          MD5

          a1a8c7e021590c6ccb05a2a54e7d6f12

          SHA1

          76cabb2806779c8bcaba0f6ca25de05d2a4cda32

          SHA256

          ffa315cca20806209add23fb058b99380ac07212267bf8fceb265976a24207b8

          SHA512

          556cb80ba26000eb1426c652b995add13e2f8eb062820d34549317e82e785805b10d19b72942c505e3e1a0c5d985e9e01fcff7ab41124d903b72ce0570acaac2

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\xkvr98mK72.exe

          Filesize

          176KB

          MD5

          4afd2123b8ce9c6c48f34b5940b90f3a

          SHA1

          c23a0eaec67b49e99e2b68f446f79823e2735334

          SHA256

          adc35ca672aa934b10c77035cd3f3e3f3bdae770fc5bad6d57c48c99a6674b93

          SHA512

          4124cffe814f1c2d06d59990479ceca2c9bfefbee7511a3946320afcd2123bf43a312d3a9c3209aa519e4e23d33924d8226e11aee065537e63f4c654e124acd9

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\xkvr98mK72.exe

          Filesize

          176KB

          MD5

          4afd2123b8ce9c6c48f34b5940b90f3a

          SHA1

          c23a0eaec67b49e99e2b68f446f79823e2735334

          SHA256

          adc35ca672aa934b10c77035cd3f3e3f3bdae770fc5bad6d57c48c99a6674b93

          SHA512

          4124cffe814f1c2d06d59990479ceca2c9bfefbee7511a3946320afcd2123bf43a312d3a9c3209aa519e4e23d33924d8226e11aee065537e63f4c654e124acd9

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\yksG81MN22.exe

          Filesize

          558KB

          MD5

          43d0f7d361fe7b18d33efb1d700d60cd

          SHA1

          f6b3f6aa19346385d5a444ad63869a7cfccb582f

          SHA256

          d93d174a102cf5fc8f90ba8a6ae63f2750086c6c55c7c55ade402f4c66ae0062

          SHA512

          1c51b48c9babd7c0b40b824beb99a2ab345f8aaa088f98eab806ebc89ffdffcb575fcd07ec5419f819ff1efb0a210f6de17ef8cac94d355ea358c738670c84b5

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\yksG81MN22.exe

          Filesize

          558KB

          MD5

          43d0f7d361fe7b18d33efb1d700d60cd

          SHA1

          f6b3f6aa19346385d5a444ad63869a7cfccb582f

          SHA256

          d93d174a102cf5fc8f90ba8a6ae63f2750086c6c55c7c55ade402f4c66ae0062

          SHA512

          1c51b48c9babd7c0b40b824beb99a2ab345f8aaa088f98eab806ebc89ffdffcb575fcd07ec5419f819ff1efb0a210f6de17ef8cac94d355ea358c738670c84b5

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tkqh86fw69.exe

          Filesize

          363KB

          MD5

          5f9106c1a4ae0150887ac3eadc521f31

          SHA1

          b7c59f033e09829e70ebf380ef9c33aff98d2bf4

          SHA256

          ddda2d12c18f4944b44af8c6bb030ae608060d087483c423acf217c4c4ed5411

          SHA512

          80ab71ecb332f2316abf7cb73c4811bf2162c2e95fc0670fcd8d26370158e2b2f342328ece12e9edeed90a7568d24d0048bdb9ee3ea928fd80d1499851c5caf3

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tkqh86fw69.exe

          Filesize

          363KB

          MD5

          5f9106c1a4ae0150887ac3eadc521f31

          SHA1

          b7c59f033e09829e70ebf380ef9c33aff98d2bf4

          SHA256

          ddda2d12c18f4944b44af8c6bb030ae608060d087483c423acf217c4c4ed5411

          SHA512

          80ab71ecb332f2316abf7cb73c4811bf2162c2e95fc0670fcd8d26370158e2b2f342328ece12e9edeed90a7568d24d0048bdb9ee3ea928fd80d1499851c5caf3

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tkqh86fw69.exe

          Filesize

          363KB

          MD5

          5f9106c1a4ae0150887ac3eadc521f31

          SHA1

          b7c59f033e09829e70ebf380ef9c33aff98d2bf4

          SHA256

          ddda2d12c18f4944b44af8c6bb030ae608060d087483c423acf217c4c4ed5411

          SHA512

          80ab71ecb332f2316abf7cb73c4811bf2162c2e95fc0670fcd8d26370158e2b2f342328ece12e9edeed90a7568d24d0048bdb9ee3ea928fd80d1499851c5caf3

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ukWg46dN52.exe

          Filesize

          421KB

          MD5

          a1a8c7e021590c6ccb05a2a54e7d6f12

          SHA1

          76cabb2806779c8bcaba0f6ca25de05d2a4cda32

          SHA256

          ffa315cca20806209add23fb058b99380ac07212267bf8fceb265976a24207b8

          SHA512

          556cb80ba26000eb1426c652b995add13e2f8eb062820d34549317e82e785805b10d19b72942c505e3e1a0c5d985e9e01fcff7ab41124d903b72ce0570acaac2

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ukWg46dN52.exe

          Filesize

          421KB

          MD5

          a1a8c7e021590c6ccb05a2a54e7d6f12

          SHA1

          76cabb2806779c8bcaba0f6ca25de05d2a4cda32

          SHA256

          ffa315cca20806209add23fb058b99380ac07212267bf8fceb265976a24207b8

          SHA512

          556cb80ba26000eb1426c652b995add13e2f8eb062820d34549317e82e785805b10d19b72942c505e3e1a0c5d985e9e01fcff7ab41124d903b72ce0570acaac2

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ukWg46dN52.exe

          Filesize

          421KB

          MD5

          a1a8c7e021590c6ccb05a2a54e7d6f12

          SHA1

          76cabb2806779c8bcaba0f6ca25de05d2a4cda32

          SHA256

          ffa315cca20806209add23fb058b99380ac07212267bf8fceb265976a24207b8

          SHA512

          556cb80ba26000eb1426c652b995add13e2f8eb062820d34549317e82e785805b10d19b72942c505e3e1a0c5d985e9e01fcff7ab41124d903b72ce0570acaac2

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ukWg46dN52.exe

          Filesize

          421KB

          MD5

          a1a8c7e021590c6ccb05a2a54e7d6f12

          SHA1

          76cabb2806779c8bcaba0f6ca25de05d2a4cda32

          SHA256

          ffa315cca20806209add23fb058b99380ac07212267bf8fceb265976a24207b8

          SHA512

          556cb80ba26000eb1426c652b995add13e2f8eb062820d34549317e82e785805b10d19b72942c505e3e1a0c5d985e9e01fcff7ab41124d903b72ce0570acaac2

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ukWg46dN52.exe

          Filesize

          421KB

          MD5

          a1a8c7e021590c6ccb05a2a54e7d6f12

          SHA1

          76cabb2806779c8bcaba0f6ca25de05d2a4cda32

          SHA256

          ffa315cca20806209add23fb058b99380ac07212267bf8fceb265976a24207b8

          SHA512

          556cb80ba26000eb1426c652b995add13e2f8eb062820d34549317e82e785805b10d19b72942c505e3e1a0c5d985e9e01fcff7ab41124d903b72ce0570acaac2

        • memory/992-128-0x00000000002F0000-0x000000000033C000-memory.dmp

          Filesize

          304KB

        • memory/1184-89-0x00000000045B0000-0x00000000045C2000-memory.dmp

          Filesize

          72KB

        • memory/1184-78-0x0000000002F90000-0x0000000002FAA000-memory.dmp

          Filesize

          104KB

        • memory/1184-105-0x00000000045B0000-0x00000000045C2000-memory.dmp

          Filesize

          72KB

        • memory/1184-107-0x00000000045B0000-0x00000000045C2000-memory.dmp

          Filesize

          72KB

        • memory/1184-109-0x00000000045B0000-0x00000000045C2000-memory.dmp

          Filesize

          72KB

        • memory/1184-110-0x00000000071E0000-0x0000000007220000-memory.dmp

          Filesize

          256KB

        • memory/1184-111-0x0000000000400000-0x0000000002BC9000-memory.dmp

          Filesize

          39.8MB

        • memory/1184-112-0x0000000000400000-0x0000000002BC9000-memory.dmp

          Filesize

          39.8MB

        • memory/1184-101-0x00000000045B0000-0x00000000045C2000-memory.dmp

          Filesize

          72KB

        • memory/1184-99-0x00000000045B0000-0x00000000045C2000-memory.dmp

          Filesize

          72KB

        • memory/1184-97-0x00000000045B0000-0x00000000045C2000-memory.dmp

          Filesize

          72KB

        • memory/1184-95-0x00000000045B0000-0x00000000045C2000-memory.dmp

          Filesize

          72KB

        • memory/1184-93-0x00000000045B0000-0x00000000045C2000-memory.dmp

          Filesize

          72KB

        • memory/1184-91-0x00000000045B0000-0x00000000045C2000-memory.dmp

          Filesize

          72KB

        • memory/1184-87-0x00000000045B0000-0x00000000045C2000-memory.dmp

          Filesize

          72KB

        • memory/1184-79-0x0000000002D60000-0x0000000002D8D000-memory.dmp

          Filesize

          180KB

        • memory/1184-85-0x00000000045B0000-0x00000000045C2000-memory.dmp

          Filesize

          72KB

        • memory/1184-103-0x00000000045B0000-0x00000000045C2000-memory.dmp

          Filesize

          72KB

        • memory/1184-83-0x00000000045B0000-0x00000000045C2000-memory.dmp

          Filesize

          72KB

        • memory/1184-82-0x00000000045B0000-0x00000000045C2000-memory.dmp

          Filesize

          72KB

        • memory/1184-81-0x00000000045B0000-0x00000000045C8000-memory.dmp

          Filesize

          96KB

        • memory/1184-80-0x00000000071E0000-0x0000000007220000-memory.dmp

          Filesize

          256KB

        • memory/1188-138-0x0000000000B40000-0x0000000000B72000-memory.dmp

          Filesize

          200KB

        • memory/1188-840-0x0000000004F70000-0x0000000004FB0000-memory.dmp

          Filesize

          256KB

        • memory/1528-150-0x00000000006D0000-0x000000000070E000-memory.dmp

          Filesize

          248KB

        • memory/1528-143-0x0000000004A50000-0x0000000004A90000-memory.dmp

          Filesize

          256KB

        • memory/1528-124-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/1528-140-0x00000000006D0000-0x0000000000714000-memory.dmp

          Filesize

          272KB

        • memory/1528-142-0x00000000006D0000-0x000000000070E000-memory.dmp

          Filesize

          248KB

        • memory/1528-144-0x00000000006D0000-0x000000000070E000-memory.dmp

          Filesize

          248KB

        • memory/1528-152-0x00000000006D0000-0x000000000070E000-memory.dmp

          Filesize

          248KB

        • memory/1528-141-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/1528-146-0x00000000006D0000-0x000000000070E000-memory.dmp

          Filesize

          248KB

        • memory/1528-148-0x00000000006D0000-0x000000000070E000-memory.dmp

          Filesize

          248KB

        • memory/1528-139-0x0000000000460000-0x00000000004A6000-memory.dmp

          Filesize

          280KB

        • memory/1528-129-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/1528-162-0x00000000006D0000-0x000000000070E000-memory.dmp

          Filesize

          248KB

        • memory/1528-156-0x00000000006D0000-0x000000000070E000-memory.dmp

          Filesize

          248KB

        • memory/1528-158-0x00000000006D0000-0x000000000070E000-memory.dmp

          Filesize

          248KB

        • memory/1528-160-0x00000000006D0000-0x000000000070E000-memory.dmp

          Filesize

          248KB

        • memory/1528-154-0x00000000006D0000-0x000000000070E000-memory.dmp

          Filesize

          248KB

        • memory/1528-164-0x00000000006D0000-0x000000000070E000-memory.dmp

          Filesize

          248KB

        • memory/1528-166-0x00000000006D0000-0x000000000070E000-memory.dmp

          Filesize

          248KB

        • memory/1528-168-0x00000000006D0000-0x000000000070E000-memory.dmp

          Filesize

          248KB

        • memory/1528-170-0x00000000006D0000-0x000000000070E000-memory.dmp

          Filesize

          248KB

        • memory/1528-125-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/1528-1050-0x0000000004A50000-0x0000000004A90000-memory.dmp

          Filesize

          256KB

        • memory/1528-1054-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB