Analysis

  • max time kernel
    107s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2023 20:24

General

  • Target

    1b9c75efc9255c0fb55897efc5725b5408cbcebcc90ba84caeca617e1154eb36.exe

  • Size

    1.1MB

  • MD5

    3946f9e39d1576a22a64e4f385a4c3e1

  • SHA1

    a1b0d9f82366d4974980f0c48037d22134dbece6

  • SHA256

    1b9c75efc9255c0fb55897efc5725b5408cbcebcc90ba84caeca617e1154eb36

  • SHA512

    772f8242f8da05b5e8633f21b4f7965dc23651fa73dbc8315fc46aaabf2959e5aae99ac274e3e45161c73fbb37d8cd9a36c6c4e95ea8c22cfecb775de2d6ea2c

  • SSDEEP

    12288:IMrXy90N97hd//uy9y3f//48Xh9mhFp55RPg9BXtoY2g4yYnw31wjYphHBWDDv78:fyIhd//ufv/Q6GhFpTKH7Ln37HY2x

Malware Config

Extracted

Family

redline

Botnet

linda

C2

185.161.248.75:4132

Attributes
  • auth_value

    21cdc21d041667b9c1679f88a1146770

Extracted

Family

redline

Botnet

horor

C2

185.161.248.75:4132

Attributes
  • auth_value

    b8d506fe48db15c38fb031d07f42d529

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b9c75efc9255c0fb55897efc5725b5408cbcebcc90ba84caeca617e1154eb36.exe
    "C:\Users\Admin\AppData\Local\Temp\1b9c75efc9255c0fb55897efc5725b5408cbcebcc90ba84caeca617e1154eb36.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4916
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7383103.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7383103.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4556
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0468477.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0468477.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4488
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5774056.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5774056.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3228
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8873597.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8873597.exe
          4⤵
          • Executes dropped EXE
          PID:224
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 928
            5⤵
            • Program crash
            PID:1744
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0547397.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0547397.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3600
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0547397.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0547397.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1632
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6715601.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6715601.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4496
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6715601.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6715601.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:5096
        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
          "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1504
          • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of UnmapMainImage
            PID:488
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 12
              6⤵
              • Program crash
              PID:2496
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 224 -ip 224
    1⤵
      PID:2804
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 488 -ip 488
      1⤵
        PID:4460

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\r0547397.exe.log
        Filesize

        425B

        MD5

        4eaca4566b22b01cd3bc115b9b0b2196

        SHA1

        e743e0792c19f71740416e7b3c061d9f1336bf94

        SHA256

        34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

        SHA512

        bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
        Filesize

        961KB

        MD5

        750e65edbc3701766e77948d5ae689d2

        SHA1

        3b2835377b46cc1abccfa274dfcc92585fe70379

        SHA256

        da5c2058c7121c2311e62dc2a31124f6c53b114a747dc0cb607cf5ebf14e523e

        SHA512

        b790810f55c97cce86c5ce592285c16be1329a26f38a72f406a621afe5317c42fce8652681b2650e29600232169d7a7fa789d5cee39184311322fcaed78c564f

      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
        Filesize

        961KB

        MD5

        750e65edbc3701766e77948d5ae689d2

        SHA1

        3b2835377b46cc1abccfa274dfcc92585fe70379

        SHA256

        da5c2058c7121c2311e62dc2a31124f6c53b114a747dc0cb607cf5ebf14e523e

        SHA512

        b790810f55c97cce86c5ce592285c16be1329a26f38a72f406a621afe5317c42fce8652681b2650e29600232169d7a7fa789d5cee39184311322fcaed78c564f

      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
        Filesize

        961KB

        MD5

        750e65edbc3701766e77948d5ae689d2

        SHA1

        3b2835377b46cc1abccfa274dfcc92585fe70379

        SHA256

        da5c2058c7121c2311e62dc2a31124f6c53b114a747dc0cb607cf5ebf14e523e

        SHA512

        b790810f55c97cce86c5ce592285c16be1329a26f38a72f406a621afe5317c42fce8652681b2650e29600232169d7a7fa789d5cee39184311322fcaed78c564f

      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
        Filesize

        961KB

        MD5

        750e65edbc3701766e77948d5ae689d2

        SHA1

        3b2835377b46cc1abccfa274dfcc92585fe70379

        SHA256

        da5c2058c7121c2311e62dc2a31124f6c53b114a747dc0cb607cf5ebf14e523e

        SHA512

        b790810f55c97cce86c5ce592285c16be1329a26f38a72f406a621afe5317c42fce8652681b2650e29600232169d7a7fa789d5cee39184311322fcaed78c564f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6715601.exe
        Filesize

        961KB

        MD5

        750e65edbc3701766e77948d5ae689d2

        SHA1

        3b2835377b46cc1abccfa274dfcc92585fe70379

        SHA256

        da5c2058c7121c2311e62dc2a31124f6c53b114a747dc0cb607cf5ebf14e523e

        SHA512

        b790810f55c97cce86c5ce592285c16be1329a26f38a72f406a621afe5317c42fce8652681b2650e29600232169d7a7fa789d5cee39184311322fcaed78c564f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6715601.exe
        Filesize

        961KB

        MD5

        750e65edbc3701766e77948d5ae689d2

        SHA1

        3b2835377b46cc1abccfa274dfcc92585fe70379

        SHA256

        da5c2058c7121c2311e62dc2a31124f6c53b114a747dc0cb607cf5ebf14e523e

        SHA512

        b790810f55c97cce86c5ce592285c16be1329a26f38a72f406a621afe5317c42fce8652681b2650e29600232169d7a7fa789d5cee39184311322fcaed78c564f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6715601.exe
        Filesize

        961KB

        MD5

        750e65edbc3701766e77948d5ae689d2

        SHA1

        3b2835377b46cc1abccfa274dfcc92585fe70379

        SHA256

        da5c2058c7121c2311e62dc2a31124f6c53b114a747dc0cb607cf5ebf14e523e

        SHA512

        b790810f55c97cce86c5ce592285c16be1329a26f38a72f406a621afe5317c42fce8652681b2650e29600232169d7a7fa789d5cee39184311322fcaed78c564f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7383103.exe
        Filesize

        702KB

        MD5

        6666a671aae4c0a99677ed94ff34a6c8

        SHA1

        f9cfb69581051f239a08432d0dbb9a7156e6c766

        SHA256

        b7f2eb344c3d677d657c4d2e94faf786e52b7d144ede03f9a8b0cce7e585e366

        SHA512

        31d30293a7d188b84fcf2dac7b409d54994cd74e9f2b22357dd9963d97135a903337837eeee4d90eac972c5970a7c1d54f1df277cb557ac8f6ee9f1653cfdf82

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7383103.exe
        Filesize

        702KB

        MD5

        6666a671aae4c0a99677ed94ff34a6c8

        SHA1

        f9cfb69581051f239a08432d0dbb9a7156e6c766

        SHA256

        b7f2eb344c3d677d657c4d2e94faf786e52b7d144ede03f9a8b0cce7e585e366

        SHA512

        31d30293a7d188b84fcf2dac7b409d54994cd74e9f2b22357dd9963d97135a903337837eeee4d90eac972c5970a7c1d54f1df277cb557ac8f6ee9f1653cfdf82

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0547397.exe
        Filesize

        903KB

        MD5

        1547083e2453493bd656e7338c791819

        SHA1

        6684ddb44ce5c079e91053588fdeb0d0225bc73c

        SHA256

        4bcfb3b3f92db7dea7f5a48dfce24bd001884e4c1fc08eb0e7d44129d56da2cf

        SHA512

        9da78dde6a55e7b8bac234a84926740981fc9b1bce074de923ab901c7a27f0ee0a18f39de42d0e852679b11a65955e390098d3ae163e7ac0b895f5b44b2be815

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0547397.exe
        Filesize

        903KB

        MD5

        1547083e2453493bd656e7338c791819

        SHA1

        6684ddb44ce5c079e91053588fdeb0d0225bc73c

        SHA256

        4bcfb3b3f92db7dea7f5a48dfce24bd001884e4c1fc08eb0e7d44129d56da2cf

        SHA512

        9da78dde6a55e7b8bac234a84926740981fc9b1bce074de923ab901c7a27f0ee0a18f39de42d0e852679b11a65955e390098d3ae163e7ac0b895f5b44b2be815

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0547397.exe
        Filesize

        903KB

        MD5

        1547083e2453493bd656e7338c791819

        SHA1

        6684ddb44ce5c079e91053588fdeb0d0225bc73c

        SHA256

        4bcfb3b3f92db7dea7f5a48dfce24bd001884e4c1fc08eb0e7d44129d56da2cf

        SHA512

        9da78dde6a55e7b8bac234a84926740981fc9b1bce074de923ab901c7a27f0ee0a18f39de42d0e852679b11a65955e390098d3ae163e7ac0b895f5b44b2be815

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0468477.exe
        Filesize

        305KB

        MD5

        07277b93f33d6574c92d5dcf722c2194

        SHA1

        eda7d332c257fbe04cd670b86e2af079a421d220

        SHA256

        769e871ae62d640eec5cd69539a09a3f364275a0c53e903d3a2fd2dbfc511b12

        SHA512

        f022a4d08c745b17e156fdf2fe737ce24e96c7ef03ced63af56a360e93bbe8832486feb1e2517cfcbba7dfef8c8f81818e213c4ff4ea6921ead81b6a6063437d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0468477.exe
        Filesize

        305KB

        MD5

        07277b93f33d6574c92d5dcf722c2194

        SHA1

        eda7d332c257fbe04cd670b86e2af079a421d220

        SHA256

        769e871ae62d640eec5cd69539a09a3f364275a0c53e903d3a2fd2dbfc511b12

        SHA512

        f022a4d08c745b17e156fdf2fe737ce24e96c7ef03ced63af56a360e93bbe8832486feb1e2517cfcbba7dfef8c8f81818e213c4ff4ea6921ead81b6a6063437d

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5774056.exe
        Filesize

        184KB

        MD5

        6eafa181b94da7cbd3f29d1e5bb982c7

        SHA1

        805349794f0f39fa659bc83f0e8e4acdf5a84e24

        SHA256

        9ad810449a3e4d58cdd37018a02645115077dd50ef029a2312fda79f5246abe7

        SHA512

        068fe8d5ce85923d7cbf329e05191f9f71f9bf669d85d38017be0dc01db461c1e6d4daa11c4a23f73dbbdbd77a8dd20aa42ba43683ae3f97e7ecceb5976f0900

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5774056.exe
        Filesize

        184KB

        MD5

        6eafa181b94da7cbd3f29d1e5bb982c7

        SHA1

        805349794f0f39fa659bc83f0e8e4acdf5a84e24

        SHA256

        9ad810449a3e4d58cdd37018a02645115077dd50ef029a2312fda79f5246abe7

        SHA512

        068fe8d5ce85923d7cbf329e05191f9f71f9bf669d85d38017be0dc01db461c1e6d4daa11c4a23f73dbbdbd77a8dd20aa42ba43683ae3f97e7ecceb5976f0900

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8873597.exe
        Filesize

        145KB

        MD5

        bec9b2c339615363e198ce0b8e8112f9

        SHA1

        9978ac8c7d2bba3e9cc6ed43f75f59ae7443c83b

        SHA256

        b80107eaaaa73d2d244410c026d1ed2b0e200c7caca0b16a214439cb86284f5a

        SHA512

        daa30d2fd900c5767b6e12e3c30bae88cdb079dc4cc409f8d1f3e12c39834babc57cc3710ba8983a24c0e198457a1812ed467c82e5efe77b3d519ca6a7ce5ee7

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8873597.exe
        Filesize

        145KB

        MD5

        bec9b2c339615363e198ce0b8e8112f9

        SHA1

        9978ac8c7d2bba3e9cc6ed43f75f59ae7443c83b

        SHA256

        b80107eaaaa73d2d244410c026d1ed2b0e200c7caca0b16a214439cb86284f5a

        SHA512

        daa30d2fd900c5767b6e12e3c30bae88cdb079dc4cc409f8d1f3e12c39834babc57cc3710ba8983a24c0e198457a1812ed467c82e5efe77b3d519ca6a7ce5ee7

      • memory/224-193-0x0000000000890000-0x00000000008BA000-memory.dmp
        Filesize

        168KB

      • memory/488-246-0x0000000000340000-0x0000000000340000-memory.dmp
      • memory/1504-234-0x0000000007220000-0x0000000007230000-memory.dmp
        Filesize

        64KB

      • memory/1632-243-0x0000000006FD0000-0x0000000007046000-memory.dmp
        Filesize

        472KB

      • memory/1632-210-0x0000000005560000-0x0000000005572000-memory.dmp
        Filesize

        72KB

      • memory/1632-208-0x0000000005630000-0x000000000573A000-memory.dmp
        Filesize

        1.0MB

      • memory/1632-207-0x0000000005AB0000-0x00000000060C8000-memory.dmp
        Filesize

        6.1MB

      • memory/1632-211-0x00000000055C0000-0x00000000055FC000-memory.dmp
        Filesize

        240KB

      • memory/1632-212-0x0000000005860000-0x0000000005870000-memory.dmp
        Filesize

        64KB

      • memory/1632-235-0x00000000060D0000-0x0000000006162000-memory.dmp
        Filesize

        584KB

      • memory/1632-236-0x0000000005A10000-0x0000000005A76000-memory.dmp
        Filesize

        408KB

      • memory/1632-240-0x0000000006E00000-0x0000000006FC2000-memory.dmp
        Filesize

        1.8MB

      • memory/1632-241-0x0000000007500000-0x0000000007A2C000-memory.dmp
        Filesize

        5.2MB

      • memory/1632-242-0x0000000005860000-0x0000000005870000-memory.dmp
        Filesize

        64KB

      • memory/1632-199-0x0000000000400000-0x000000000042A000-memory.dmp
        Filesize

        168KB

      • memory/1632-244-0x0000000006DA0000-0x0000000006DF0000-memory.dmp
        Filesize

        320KB

      • memory/3228-171-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/3228-181-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/3228-165-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/3228-188-0x0000000004990000-0x00000000049A0000-memory.dmp
        Filesize

        64KB

      • memory/3228-187-0x0000000004990000-0x00000000049A0000-memory.dmp
        Filesize

        64KB

      • memory/3228-154-0x0000000004990000-0x00000000049A0000-memory.dmp
        Filesize

        64KB

      • memory/3228-186-0x0000000004990000-0x00000000049A0000-memory.dmp
        Filesize

        64KB

      • memory/3228-185-0x0000000004990000-0x00000000049A0000-memory.dmp
        Filesize

        64KB

      • memory/3228-167-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/3228-184-0x0000000004990000-0x00000000049A0000-memory.dmp
        Filesize

        64KB

      • memory/3228-183-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/3228-163-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/3228-155-0x00000000049A0000-0x0000000004F44000-memory.dmp
        Filesize

        5.6MB

      • memory/3228-179-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/3228-156-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/3228-157-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/3228-159-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/3228-177-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/3228-175-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/3228-173-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/3228-161-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/3228-169-0x0000000004960000-0x0000000004976000-memory.dmp
        Filesize

        88KB

      • memory/3600-198-0x00000000075F0000-0x0000000007600000-memory.dmp
        Filesize

        64KB

      • memory/3600-197-0x00000000007D0000-0x00000000008B8000-memory.dmp
        Filesize

        928KB

      • memory/4496-209-0x00000000076D0000-0x00000000076E0000-memory.dmp
        Filesize

        64KB

      • memory/4496-206-0x0000000000800000-0x00000000008F6000-memory.dmp
        Filesize

        984KB

      • memory/5096-233-0x0000000000400000-0x0000000000438000-memory.dmp
        Filesize

        224KB

      • memory/5096-219-0x0000000000400000-0x0000000000438000-memory.dmp
        Filesize

        224KB

      • memory/5096-217-0x0000000000400000-0x0000000000438000-memory.dmp
        Filesize

        224KB

      • memory/5096-216-0x0000000000400000-0x0000000000438000-memory.dmp
        Filesize

        224KB

      • memory/5096-213-0x0000000000400000-0x0000000000438000-memory.dmp
        Filesize

        224KB