Analysis

  • max time kernel
    118s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-06-2023 15:57

General

  • Target

    e040fae69c72546da16f85b814de24c32b2918b3b529bb89ad9594f79e27408b.exe

  • Size

    624KB

  • MD5

    4dd096a372feedbaf69cc50e7dc9243b

  • SHA1

    fb79ac5c3751614f21c6abd0ef3c8a580f4d466b

  • SHA256

    e040fae69c72546da16f85b814de24c32b2918b3b529bb89ad9594f79e27408b

  • SHA512

    592e2fc571c4be45bff3d6ef57d2eb5c85202b1a3199b7bc02c1e7853390ef02f3542081923500ea70bb7c8937c9395421918f101860f6d142c3c112fd5635d8

  • SSDEEP

    12288:8Mrmy90B66JN+hL5fPn3AqkvzvzJVkgAr5SclhM+FoDKj5Px:yyj6gLxn3AqsXJm9NHFFT

Malware Config

Extracted

Family

redline

Botnet

dusa

C2

83.97.73.126:19046

Attributes
  • auth_value

    ee896466545fedf9de5406175fb82de5

Extracted

Family

redline

Botnet

brain

C2

83.97.73.126:19046

Attributes
  • auth_value

    5fb8269baadec0c49899b9a7a0c8851f

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e040fae69c72546da16f85b814de24c32b2918b3b529bb89ad9594f79e27408b.exe
    "C:\Users\Admin\AppData\Local\Temp\e040fae69c72546da16f85b814de24c32b2918b3b529bb89ad9594f79e27408b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4812
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6621801.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6621801.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4780
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3511526.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3511526.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2664
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3721370.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3721370.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4732
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3210820.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3210820.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:440
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:472
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5592682.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5592682.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3868
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1672
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:4060
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4368
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:492
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:3044
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:3640
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:4556
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:2344
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:2444
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:4428
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6388245.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6388245.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:1088
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1100
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:4132
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:2560

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Defense Evasion

              Modify Registry

              2
              T1112

              Disabling Security Tools

              1
              T1089

              Credential Access

              Credentials in Files

              2
              T1081

              Discovery

              Query Registry

              2
              T1012

              System Information Discovery

              2
              T1082

              Collection

              Data from Local System

              2
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log
                Filesize

                226B

                MD5

                916851e072fbabc4796d8916c5131092

                SHA1

                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                SHA256

                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                SHA512

                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6388245.exe
                Filesize

                265KB

                MD5

                3a6556433c3600ae14345bb866c7e5c8

                SHA1

                a1e9077e71a33485feb60bf62dae5cce789be81e

                SHA256

                400f42ddb81dd87a108f3c66507dccd3e8c1da12012254112ee7eca497598f90

                SHA512

                f57e3edbb0ef254972d5c0d9095b4ef52bbc498faf018a856f692adfe563b2292d9d9ced1bcc2809ca6951551525ccabeb58a33c8c8fd1d13f5ed67a9af6e95a

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6388245.exe
                Filesize

                265KB

                MD5

                3a6556433c3600ae14345bb866c7e5c8

                SHA1

                a1e9077e71a33485feb60bf62dae5cce789be81e

                SHA256

                400f42ddb81dd87a108f3c66507dccd3e8c1da12012254112ee7eca497598f90

                SHA512

                f57e3edbb0ef254972d5c0d9095b4ef52bbc498faf018a856f692adfe563b2292d9d9ced1bcc2809ca6951551525ccabeb58a33c8c8fd1d13f5ed67a9af6e95a

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6621801.exe
                Filesize

                424KB

                MD5

                3012eee5b189b4e90ddfa7865e7c3cae

                SHA1

                20618d2ae24dbf181239b8712a170ba911f3dc3f

                SHA256

                481fedbe0906aacaac1efdf245a15d5b61377d52e438caae48b76e430eb306ec

                SHA512

                bc9516002413c65a6576268f4256705fcfad5cb0176686c807da0b542347a1807bf9d25b86756af9d58e6c406d5c0ee6a8c37c5dbbd7dec549917c18ff271a7d

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6621801.exe
                Filesize

                424KB

                MD5

                3012eee5b189b4e90ddfa7865e7c3cae

                SHA1

                20618d2ae24dbf181239b8712a170ba911f3dc3f

                SHA256

                481fedbe0906aacaac1efdf245a15d5b61377d52e438caae48b76e430eb306ec

                SHA512

                bc9516002413c65a6576268f4256705fcfad5cb0176686c807da0b542347a1807bf9d25b86756af9d58e6c406d5c0ee6a8c37c5dbbd7dec549917c18ff271a7d

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5592682.exe
                Filesize

                217KB

                MD5

                e4e4b7e523103c017057e2ba34067e48

                SHA1

                b545045911781e30a4019e2a112fcd07377d4675

                SHA256

                c4894a410ab066a8b8c4df92e560bced7b3ee3399b950e9fe568185948f7ac15

                SHA512

                a603a444e3da666f1e2dfa7c20c2b44ace690e3d4a817c1b92cb386626204ce7b4db6a401428b61b3adbfdd6fbd8f922870b3c77fb94f1ed803aad8f16ee3fa3

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5592682.exe
                Filesize

                217KB

                MD5

                e4e4b7e523103c017057e2ba34067e48

                SHA1

                b545045911781e30a4019e2a112fcd07377d4675

                SHA256

                c4894a410ab066a8b8c4df92e560bced7b3ee3399b950e9fe568185948f7ac15

                SHA512

                a603a444e3da666f1e2dfa7c20c2b44ace690e3d4a817c1b92cb386626204ce7b4db6a401428b61b3adbfdd6fbd8f922870b3c77fb94f1ed803aad8f16ee3fa3

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3511526.exe
                Filesize

                252KB

                MD5

                8d214115ae1f75a82301a9ac4e680da5

                SHA1

                3e1bc0569e6fe962d2f9bbc839012e8787eab832

                SHA256

                5caa2304cce74ae487066425a1c3453424d329c905d0e46d7c3f52bd2a71632a

                SHA512

                dd24ab7639dc2bc155e221d6904a600f3747f379226084499d060cd7d056f3e59663600e54973da31c0e34b114c4aacd2214f0f35a828e5271dabe0c5bc5b27e

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3511526.exe
                Filesize

                252KB

                MD5

                8d214115ae1f75a82301a9ac4e680da5

                SHA1

                3e1bc0569e6fe962d2f9bbc839012e8787eab832

                SHA256

                5caa2304cce74ae487066425a1c3453424d329c905d0e46d7c3f52bd2a71632a

                SHA512

                dd24ab7639dc2bc155e221d6904a600f3747f379226084499d060cd7d056f3e59663600e54973da31c0e34b114c4aacd2214f0f35a828e5271dabe0c5bc5b27e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3721370.exe
                Filesize

                169KB

                MD5

                8d7e8723de0939bdc0e9adae8b28a91a

                SHA1

                392e37dad8f42348f1defca6409cc85f4409413f

                SHA256

                b4e0fd3a1b780727c25383ef6452776bb27f9cfb7509118250a82137742bf9c5

                SHA512

                54647c6e49a1d87c0eeada9934a6fb25e2e0591aca8c0f4dbaef5bb219c05f3bd918bb315bd974f1c3547f772236419233cb2b21d5d8b72e21de8656d67badfb

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3721370.exe
                Filesize

                169KB

                MD5

                8d7e8723de0939bdc0e9adae8b28a91a

                SHA1

                392e37dad8f42348f1defca6409cc85f4409413f

                SHA256

                b4e0fd3a1b780727c25383ef6452776bb27f9cfb7509118250a82137742bf9c5

                SHA512

                54647c6e49a1d87c0eeada9934a6fb25e2e0591aca8c0f4dbaef5bb219c05f3bd918bb315bd974f1c3547f772236419233cb2b21d5d8b72e21de8656d67badfb

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3210820.exe
                Filesize

                108KB

                MD5

                6aa8570ef5a6ef15388472f9283644ce

                SHA1

                12595538710c1158990242bb0d1103937ed9f955

                SHA256

                012d5e4ced19d4df0510308fdf2feb95ce80767c7311621130e51c09eb45daa0

                SHA512

                d14a9e72c812db3d49090bedf08c4327ae9fbc5ade62f959d5d0909a33de8302af5e25a66b1b9ed543421eb00d86405dde3c98ec413e4eeb536d2042372e65ea

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3210820.exe
                Filesize

                108KB

                MD5

                6aa8570ef5a6ef15388472f9283644ce

                SHA1

                12595538710c1158990242bb0d1103937ed9f955

                SHA256

                012d5e4ced19d4df0510308fdf2feb95ce80767c7311621130e51c09eb45daa0

                SHA512

                d14a9e72c812db3d49090bedf08c4327ae9fbc5ade62f959d5d0909a33de8302af5e25a66b1b9ed543421eb00d86405dde3c98ec413e4eeb536d2042372e65ea

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                Filesize

                217KB

                MD5

                e4e4b7e523103c017057e2ba34067e48

                SHA1

                b545045911781e30a4019e2a112fcd07377d4675

                SHA256

                c4894a410ab066a8b8c4df92e560bced7b3ee3399b950e9fe568185948f7ac15

                SHA512

                a603a444e3da666f1e2dfa7c20c2b44ace690e3d4a817c1b92cb386626204ce7b4db6a401428b61b3adbfdd6fbd8f922870b3c77fb94f1ed803aad8f16ee3fa3

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                Filesize

                217KB

                MD5

                e4e4b7e523103c017057e2ba34067e48

                SHA1

                b545045911781e30a4019e2a112fcd07377d4675

                SHA256

                c4894a410ab066a8b8c4df92e560bced7b3ee3399b950e9fe568185948f7ac15

                SHA512

                a603a444e3da666f1e2dfa7c20c2b44ace690e3d4a817c1b92cb386626204ce7b4db6a401428b61b3adbfdd6fbd8f922870b3c77fb94f1ed803aad8f16ee3fa3

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                Filesize

                217KB

                MD5

                e4e4b7e523103c017057e2ba34067e48

                SHA1

                b545045911781e30a4019e2a112fcd07377d4675

                SHA256

                c4894a410ab066a8b8c4df92e560bced7b3ee3399b950e9fe568185948f7ac15

                SHA512

                a603a444e3da666f1e2dfa7c20c2b44ace690e3d4a817c1b92cb386626204ce7b4db6a401428b61b3adbfdd6fbd8f922870b3c77fb94f1ed803aad8f16ee3fa3

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                Filesize

                217KB

                MD5

                e4e4b7e523103c017057e2ba34067e48

                SHA1

                b545045911781e30a4019e2a112fcd07377d4675

                SHA256

                c4894a410ab066a8b8c4df92e560bced7b3ee3399b950e9fe568185948f7ac15

                SHA512

                a603a444e3da666f1e2dfa7c20c2b44ace690e3d4a817c1b92cb386626204ce7b4db6a401428b61b3adbfdd6fbd8f922870b3c77fb94f1ed803aad8f16ee3fa3

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                Filesize

                217KB

                MD5

                e4e4b7e523103c017057e2ba34067e48

                SHA1

                b545045911781e30a4019e2a112fcd07377d4675

                SHA256

                c4894a410ab066a8b8c4df92e560bced7b3ee3399b950e9fe568185948f7ac15

                SHA512

                a603a444e3da666f1e2dfa7c20c2b44ace690e3d4a817c1b92cb386626204ce7b4db6a401428b61b3adbfdd6fbd8f922870b3c77fb94f1ed803aad8f16ee3fa3

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/472-172-0x0000000000400000-0x000000000040A000-memory.dmp
                Filesize

                40KB

              • memory/1100-193-0x0000000000400000-0x000000000042E000-memory.dmp
                Filesize

                184KB

              • memory/1100-198-0x0000000005190000-0x00000000051A0000-memory.dmp
                Filesize

                64KB

              • memory/4732-157-0x000000000A970000-0x000000000A982000-memory.dmp
                Filesize

                72KB

              • memory/4732-167-0x00000000052D0000-0x00000000052E0000-memory.dmp
                Filesize

                64KB

              • memory/4732-166-0x000000000CB80000-0x000000000D0AC000-memory.dmp
                Filesize

                5.2MB

              • memory/4732-165-0x000000000C480000-0x000000000C642000-memory.dmp
                Filesize

                1.8MB

              • memory/4732-164-0x000000000BA30000-0x000000000BA80000-memory.dmp
                Filesize

                320KB

              • memory/4732-163-0x000000000BED0000-0x000000000C474000-memory.dmp
                Filesize

                5.6MB

              • memory/4732-162-0x000000000AD60000-0x000000000ADC6000-memory.dmp
                Filesize

                408KB

              • memory/4732-161-0x000000000AE00000-0x000000000AE92000-memory.dmp
                Filesize

                584KB

              • memory/4732-160-0x000000000ACE0000-0x000000000AD56000-memory.dmp
                Filesize

                472KB

              • memory/4732-159-0x00000000052D0000-0x00000000052E0000-memory.dmp
                Filesize

                64KB

              • memory/4732-158-0x000000000A9D0000-0x000000000AA0C000-memory.dmp
                Filesize

                240KB

              • memory/4732-156-0x000000000AA40000-0x000000000AB4A000-memory.dmp
                Filesize

                1.0MB

              • memory/4732-155-0x000000000AEC0000-0x000000000B4D8000-memory.dmp
                Filesize

                6.1MB

              • memory/4732-154-0x0000000000AC0000-0x0000000000AEE000-memory.dmp
                Filesize

                184KB