Analysis

  • max time kernel
    123s
  • max time network
    142s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31/05/2023, 20:27

General

  • Target

    81c0d3b4073c809806262c960c1884fb15f0c9cabcda43cde3c61a1099f37f57.exe

  • Size

    751KB

  • MD5

    13edc856f9ae5a0e027015f0d80cb335

  • SHA1

    30da5ecc81f9e543b5da1b2e91b83f17ba2676d9

  • SHA256

    81c0d3b4073c809806262c960c1884fb15f0c9cabcda43cde3c61a1099f37f57

  • SHA512

    b9172f8d8d11db4354c16b211d24066e51f4531c559b2dc4b3220cb0b568c16faa339e9f0c2233d2537de95be8a9d9f81f10ae8bd7a3f871412e556fb4988192

  • SSDEEP

    12288:hMrDy90LoPE2wBE2WUf4p/kYsltQ9onNiNU0MEjipY5QLJkv8X0Q5rDbc1Mqlpj:Cy7s2wLgp/xs7WonNiNUHc15QLSEX0yc

Malware Config

Extracted

Family

redline

Botnet

dars

C2

83.97.73.127:19045

Attributes
  • auth_value

    7cd208e6b6c927262304d5d4d88647fd

Extracted

Family

redline

Botnet

nitro

C2

83.97.73.127:19045

Attributes
  • auth_value

    1b68cf84b9b046f28b71cb39e44aa0e4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81c0d3b4073c809806262c960c1884fb15f0c9cabcda43cde3c61a1099f37f57.exe
    "C:\Users\Admin\AppData\Local\Temp\81c0d3b4073c809806262c960c1884fb15f0c9cabcda43cde3c61a1099f37f57.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4028
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4562119.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4562119.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3348
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4746835.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4746835.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1513321.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1513321.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1648
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3917394.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3917394.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4200
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4724
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3543271.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3543271.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4720
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3696
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:2612
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4892
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:776
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:4788
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:4412
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:4932
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:3900
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:4084
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:2244
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4378003.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4378003.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:4824
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2856
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:4428
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:808

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                226B

                MD5

                957779c42144282d8cd83192b8fbc7cf

                SHA1

                de83d08d2cca06b9ff3d1ef239d6b60b705d25fe

                SHA256

                0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51

                SHA512

                f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4378003.exe

                Filesize

                323KB

                MD5

                427033065192b1dc478aefb8e1e602bb

                SHA1

                91874f2e9e79f06339d0a32d57747635eef62e3f

                SHA256

                9c343886c7ce5dc0245d2e56afa3773e8770ccd4d5a19d38e9c7fc608e1f1ca5

                SHA512

                bb3396d396467e2e950c6713964b06a73bbec11f46ac8b5a57f34ba0dca130eabff3c96ef76452886b84efda1e3245fe1fcd40d8de09a61856c6a978e8903ee0

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4378003.exe

                Filesize

                323KB

                MD5

                427033065192b1dc478aefb8e1e602bb

                SHA1

                91874f2e9e79f06339d0a32d57747635eef62e3f

                SHA256

                9c343886c7ce5dc0245d2e56afa3773e8770ccd4d5a19d38e9c7fc608e1f1ca5

                SHA512

                bb3396d396467e2e950c6713964b06a73bbec11f46ac8b5a57f34ba0dca130eabff3c96ef76452886b84efda1e3245fe1fcd40d8de09a61856c6a978e8903ee0

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4562119.exe

                Filesize

                450KB

                MD5

                bd8f52501ac42230477cff2e1ec7ffe7

                SHA1

                7bf98b80bd49f82f38ebc3c2b0f30614537307e8

                SHA256

                4440295162aacc33adb34c5165bcee0b505103ef181a3715f5384726ae3299a8

                SHA512

                ad0da0228e1342387faa5726043b341e0a8103012b5dadc739f3850b5b8f34fe5f815a1ffb8b41088e8f646327d01fdd8b7f70529e9ee57961ad9778fb73ae0c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4562119.exe

                Filesize

                450KB

                MD5

                bd8f52501ac42230477cff2e1ec7ffe7

                SHA1

                7bf98b80bd49f82f38ebc3c2b0f30614537307e8

                SHA256

                4440295162aacc33adb34c5165bcee0b505103ef181a3715f5384726ae3299a8

                SHA512

                ad0da0228e1342387faa5726043b341e0a8103012b5dadc739f3850b5b8f34fe5f815a1ffb8b41088e8f646327d01fdd8b7f70529e9ee57961ad9778fb73ae0c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3543271.exe

                Filesize

                212KB

                MD5

                1d5c379ddfd694192a15b64f1df64e67

                SHA1

                803389a70b4fbe432e9880c96d30645ac91d47b2

                SHA256

                ddfa72393dad8aa409548a11a3592af3d71843e1e7ee0bf6f8d2031ad4fff8b2

                SHA512

                31f68c34ae3dbc744105d06236eb77da41c751bf3a50b24654535cdbb2ce7ec1c2c47c46d2d65f6083f86732938b7d7d9168cfea978508a584b699db1adce72c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3543271.exe

                Filesize

                212KB

                MD5

                1d5c379ddfd694192a15b64f1df64e67

                SHA1

                803389a70b4fbe432e9880c96d30645ac91d47b2

                SHA256

                ddfa72393dad8aa409548a11a3592af3d71843e1e7ee0bf6f8d2031ad4fff8b2

                SHA512

                31f68c34ae3dbc744105d06236eb77da41c751bf3a50b24654535cdbb2ce7ec1c2c47c46d2d65f6083f86732938b7d7d9168cfea978508a584b699db1adce72c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4746835.exe

                Filesize

                279KB

                MD5

                fff92c6401bae927f095a062b03b223d

                SHA1

                c1ae84e6cbd9c90376da4f43c55b7dbbad07d722

                SHA256

                9df8b0077468d65b0336ccd127493ecdb150264d873f9f62a695cc0246dc9300

                SHA512

                a37692aca8ffc9a7ccef04e5ca9cf28681275ac4a17c2a04b27b84d2c0bc641845fb2d2e5e0cbb6bee1e9e3772c6ee3881e4282f5818d968707aa92f9aa43e6c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4746835.exe

                Filesize

                279KB

                MD5

                fff92c6401bae927f095a062b03b223d

                SHA1

                c1ae84e6cbd9c90376da4f43c55b7dbbad07d722

                SHA256

                9df8b0077468d65b0336ccd127493ecdb150264d873f9f62a695cc0246dc9300

                SHA512

                a37692aca8ffc9a7ccef04e5ca9cf28681275ac4a17c2a04b27b84d2c0bc641845fb2d2e5e0cbb6bee1e9e3772c6ee3881e4282f5818d968707aa92f9aa43e6c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1513321.exe

                Filesize

                168KB

                MD5

                55bc728a8f85ebb73dd0e1e8a62b2228

                SHA1

                432f15ad75d823fea85cf8f7595cae1b441f8134

                SHA256

                92911d843eba19185d73e5e939ba09d59d66e3c44ba9b3fb4848b7e53b7f2ab9

                SHA512

                607310256bc08bed696545a689c2cf28a3421412f12f063a6b86b89e5aaac0e47c5daebaef260743e004334f6a7ceaecea6c5dff70d035661ba2837e8e9fccd2

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1513321.exe

                Filesize

                168KB

                MD5

                55bc728a8f85ebb73dd0e1e8a62b2228

                SHA1

                432f15ad75d823fea85cf8f7595cae1b441f8134

                SHA256

                92911d843eba19185d73e5e939ba09d59d66e3c44ba9b3fb4848b7e53b7f2ab9

                SHA512

                607310256bc08bed696545a689c2cf28a3421412f12f063a6b86b89e5aaac0e47c5daebaef260743e004334f6a7ceaecea6c5dff70d035661ba2837e8e9fccd2

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3917394.exe

                Filesize

                165KB

                MD5

                6d28afa2340b2482cec10d1ab0728bfb

                SHA1

                3f4d4dcc884ad01330634c695771084f9d9b8c99

                SHA256

                ca3c63feb6a0ece2497d368fe5700f9accca7bb260b91ba9e04dddd7c166250c

                SHA512

                2bb35ded6dec8ee6789f98f8fb2ac90b63064eec1c5999dc57a7e26248b66ccc0d6073c182cd364dda35411bac672d4c849ac5a97dddbeb83c2d553b6a187657

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3917394.exe

                Filesize

                165KB

                MD5

                6d28afa2340b2482cec10d1ab0728bfb

                SHA1

                3f4d4dcc884ad01330634c695771084f9d9b8c99

                SHA256

                ca3c63feb6a0ece2497d368fe5700f9accca7bb260b91ba9e04dddd7c166250c

                SHA512

                2bb35ded6dec8ee6789f98f8fb2ac90b63064eec1c5999dc57a7e26248b66ccc0d6073c182cd364dda35411bac672d4c849ac5a97dddbeb83c2d553b6a187657

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                212KB

                MD5

                1d5c379ddfd694192a15b64f1df64e67

                SHA1

                803389a70b4fbe432e9880c96d30645ac91d47b2

                SHA256

                ddfa72393dad8aa409548a11a3592af3d71843e1e7ee0bf6f8d2031ad4fff8b2

                SHA512

                31f68c34ae3dbc744105d06236eb77da41c751bf3a50b24654535cdbb2ce7ec1c2c47c46d2d65f6083f86732938b7d7d9168cfea978508a584b699db1adce72c

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                212KB

                MD5

                1d5c379ddfd694192a15b64f1df64e67

                SHA1

                803389a70b4fbe432e9880c96d30645ac91d47b2

                SHA256

                ddfa72393dad8aa409548a11a3592af3d71843e1e7ee0bf6f8d2031ad4fff8b2

                SHA512

                31f68c34ae3dbc744105d06236eb77da41c751bf3a50b24654535cdbb2ce7ec1c2c47c46d2d65f6083f86732938b7d7d9168cfea978508a584b699db1adce72c

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                212KB

                MD5

                1d5c379ddfd694192a15b64f1df64e67

                SHA1

                803389a70b4fbe432e9880c96d30645ac91d47b2

                SHA256

                ddfa72393dad8aa409548a11a3592af3d71843e1e7ee0bf6f8d2031ad4fff8b2

                SHA512

                31f68c34ae3dbc744105d06236eb77da41c751bf3a50b24654535cdbb2ce7ec1c2c47c46d2d65f6083f86732938b7d7d9168cfea978508a584b699db1adce72c

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                212KB

                MD5

                1d5c379ddfd694192a15b64f1df64e67

                SHA1

                803389a70b4fbe432e9880c96d30645ac91d47b2

                SHA256

                ddfa72393dad8aa409548a11a3592af3d71843e1e7ee0bf6f8d2031ad4fff8b2

                SHA512

                31f68c34ae3dbc744105d06236eb77da41c751bf3a50b24654535cdbb2ce7ec1c2c47c46d2d65f6083f86732938b7d7d9168cfea978508a584b699db1adce72c

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                212KB

                MD5

                1d5c379ddfd694192a15b64f1df64e67

                SHA1

                803389a70b4fbe432e9880c96d30645ac91d47b2

                SHA256

                ddfa72393dad8aa409548a11a3592af3d71843e1e7ee0bf6f8d2031ad4fff8b2

                SHA512

                31f68c34ae3dbc744105d06236eb77da41c751bf3a50b24654535cdbb2ce7ec1c2c47c46d2d65f6083f86732938b7d7d9168cfea978508a584b699db1adce72c

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • memory/1648-146-0x0000000005560000-0x0000000005572000-memory.dmp

                Filesize

                72KB

              • memory/1648-147-0x0000000005450000-0x0000000005460000-memory.dmp

                Filesize

                64KB

              • memory/1648-142-0x0000000000B10000-0x0000000000B3E000-memory.dmp

                Filesize

                184KB

              • memory/1648-156-0x0000000008D10000-0x000000000923C000-memory.dmp

                Filesize

                5.2MB

              • memory/1648-155-0x0000000006F90000-0x0000000007152000-memory.dmp

                Filesize

                1.8MB

              • memory/1648-154-0x0000000005450000-0x0000000005460000-memory.dmp

                Filesize

                64KB

              • memory/1648-153-0x0000000005AA0000-0x0000000005B06000-memory.dmp

                Filesize

                408KB

              • memory/1648-152-0x0000000006A90000-0x0000000006F8E000-memory.dmp

                Filesize

                5.0MB

              • memory/1648-151-0x0000000005A00000-0x0000000005A92000-memory.dmp

                Filesize

                584KB

              • memory/1648-150-0x00000000058E0000-0x0000000005956000-memory.dmp

                Filesize

                472KB

              • memory/1648-143-0x0000000002C80000-0x0000000002C86000-memory.dmp

                Filesize

                24KB

              • memory/1648-144-0x0000000005B70000-0x0000000006176000-memory.dmp

                Filesize

                6.0MB

              • memory/1648-145-0x0000000005670000-0x000000000577A000-memory.dmp

                Filesize

                1.0MB

              • memory/1648-157-0x0000000006980000-0x00000000069D0000-memory.dmp

                Filesize

                320KB

              • memory/1648-149-0x0000000005610000-0x000000000565B000-memory.dmp

                Filesize

                300KB

              • memory/1648-148-0x00000000055C0000-0x00000000055FE000-memory.dmp

                Filesize

                248KB

              • memory/2856-197-0x0000000008D40000-0x0000000008D50000-memory.dmp

                Filesize

                64KB

              • memory/2856-196-0x000000000E330000-0x000000000E37B000-memory.dmp

                Filesize

                300KB

              • memory/2856-195-0x0000000008CD0000-0x0000000008CD6000-memory.dmp

                Filesize

                24KB

              • memory/2856-187-0x00000000045D0000-0x00000000045FE000-memory.dmp

                Filesize

                184KB

              • memory/4724-162-0x0000000004400000-0x000000000440A000-memory.dmp

                Filesize

                40KB