Analysis

  • max time kernel
    126s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-06-2023 05:28

General

  • Target

    a90022e3ee1062b911b80d37dd715554d750e585a1a4c9b42c2521f892308f0a.exe

  • Size

    592KB

  • MD5

    e41179b3268d089443b9c8e47afe84d9

  • SHA1

    df0c399eb3e84e27912429f12137a3b44607e38c

  • SHA256

    a90022e3ee1062b911b80d37dd715554d750e585a1a4c9b42c2521f892308f0a

  • SHA512

    4e19e789ccaa02f38c1201082a73251a82440ef2ee98f762817cea1f96228cf2bf5866034e61a2518464f77a92aef89569c47c08c7a1c285f9982ffc91c75f06

  • SSDEEP

    12288:0MrXy90qRscpIQFD2SaTWnGW5wcpf7HG/CgjP0Lc6ZLp4P7ZjaxFy:7yjrG8qyGW5XdC/1b8c6X4QW

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.129:19068

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a90022e3ee1062b911b80d37dd715554d750e585a1a4c9b42c2521f892308f0a.exe
    "C:\Users\Admin\AppData\Local\Temp\a90022e3ee1062b911b80d37dd715554d750e585a1a4c9b42c2521f892308f0a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6228201.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6228201.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2296
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3025777.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3025777.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4844
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1495426.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1495426.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4788
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0649325.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0649325.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2204
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4265690.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4265690.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:112
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4336
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN lamod.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:3916
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "lamod.exe" /P "Admin:N"&&CACLS "lamod.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:432
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:5028
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "lamod.exe" /P "Admin:N"
                6⤵
                  PID:768
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "lamod.exe" /P "Admin:R" /E
                  6⤵
                    PID:4344
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:2400
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:4196
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:3852
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:3656
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i1623984.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i1623984.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:3436
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4208
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3436 -s 596
                    3⤵
                    • Program crash
                    PID:8
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3436 -ip 3436
                1⤵
                  PID:3464
                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  1⤵
                  • Executes dropped EXE
                  PID:4484
                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  1⤵
                  • Executes dropped EXE
                  PID:5064

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i1623984.exe

                  Filesize

                  282KB

                  MD5

                  316d7e9b0666ae4ad2f42304d780cdc9

                  SHA1

                  e9650497ff89e535096bbe671f58cdcfbb432bbc

                  SHA256

                  2a225923dcc3d1350873e6c27159a070ac670d880a3f42f21332b9921a5f8b7f

                  SHA512

                  98a11cf818ec3d62a4811fc8338d03e0a3954389bbf63542940df8eca1d08bc9644444b6d7a8fa4559a11dfffa33e4b09ace969659f4142d6b68930f566d6d74

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i1623984.exe

                  Filesize

                  282KB

                  MD5

                  316d7e9b0666ae4ad2f42304d780cdc9

                  SHA1

                  e9650497ff89e535096bbe671f58cdcfbb432bbc

                  SHA256

                  2a225923dcc3d1350873e6c27159a070ac670d880a3f42f21332b9921a5f8b7f

                  SHA512

                  98a11cf818ec3d62a4811fc8338d03e0a3954389bbf63542940df8eca1d08bc9644444b6d7a8fa4559a11dfffa33e4b09ace969659f4142d6b68930f566d6d74

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6228201.exe

                  Filesize

                  378KB

                  MD5

                  112415a42c13c416e47d86eb9bdf5aea

                  SHA1

                  fa3fc509fdde2b16e422008f1421bea00d9bb358

                  SHA256

                  dfbd7fb01e56c368f7ab4c3e8c559a597adcf97addceab76340c6730d08da4cc

                  SHA512

                  d2fecd89045ec0d0001467ff74de880fddcb5fc2cdef458710152217e30efad932daa5ccb827ed965adfbbd532bcba40d600cd5cd546cbd856f0505341e8ec39

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6228201.exe

                  Filesize

                  378KB

                  MD5

                  112415a42c13c416e47d86eb9bdf5aea

                  SHA1

                  fa3fc509fdde2b16e422008f1421bea00d9bb358

                  SHA256

                  dfbd7fb01e56c368f7ab4c3e8c559a597adcf97addceab76340c6730d08da4cc

                  SHA512

                  d2fecd89045ec0d0001467ff74de880fddcb5fc2cdef458710152217e30efad932daa5ccb827ed965adfbbd532bcba40d600cd5cd546cbd856f0505341e8ec39

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4265690.exe

                  Filesize

                  207KB

                  MD5

                  1f0a8c75d81b8e007afb9b62e53a6bec

                  SHA1

                  60b7e70fe9cdd78dd9b0d7ebb62d34f6dd40e954

                  SHA256

                  cdeea154c68c6845e10c7894fc79832b48c94df1ad8186b6de90f788ff103516

                  SHA512

                  744b4fd95136b656057e4fbf18d3e17f02843e2b9ef4225c5ed6a5c11ac3ae54bd34074666393b3da1946fc1af1695f5f0ea6c890d38e44572374e06ed88daa5

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4265690.exe

                  Filesize

                  207KB

                  MD5

                  1f0a8c75d81b8e007afb9b62e53a6bec

                  SHA1

                  60b7e70fe9cdd78dd9b0d7ebb62d34f6dd40e954

                  SHA256

                  cdeea154c68c6845e10c7894fc79832b48c94df1ad8186b6de90f788ff103516

                  SHA512

                  744b4fd95136b656057e4fbf18d3e17f02843e2b9ef4225c5ed6a5c11ac3ae54bd34074666393b3da1946fc1af1695f5f0ea6c890d38e44572374e06ed88daa5

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3025777.exe

                  Filesize

                  206KB

                  MD5

                  321a59af478f594a532217eb9bb7a8a9

                  SHA1

                  cbb8b4d9d0822019391ce51a9b8038ca9de494e1

                  SHA256

                  9a17a1f5d110640a38b217ea833316f6cd9d2d536d04f512332454abcd1ea3b0

                  SHA512

                  ce98015bdcb2eb88ed669ced628f7d8de768388377d95932ace876eaa859ec2cbff17bf4d2a5c4369f2fd8b853cbbd7630cf186346868803267a4f7b6899d264

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3025777.exe

                  Filesize

                  206KB

                  MD5

                  321a59af478f594a532217eb9bb7a8a9

                  SHA1

                  cbb8b4d9d0822019391ce51a9b8038ca9de494e1

                  SHA256

                  9a17a1f5d110640a38b217ea833316f6cd9d2d536d04f512332454abcd1ea3b0

                  SHA512

                  ce98015bdcb2eb88ed669ced628f7d8de768388377d95932ace876eaa859ec2cbff17bf4d2a5c4369f2fd8b853cbbd7630cf186346868803267a4f7b6899d264

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1495426.exe

                  Filesize

                  173KB

                  MD5

                  ad2eb530305e247b5e53f46f240871d7

                  SHA1

                  c02b1bd5ed82625f2f3ef7b5bf20a12c7f279d52

                  SHA256

                  66c8cc2787c7cac95cc3b2bbcadbab67e1800f6f450084d8000cfc7c89399bea

                  SHA512

                  fe32fd9bc27825eb64610523cfa2f7c688123762b494fe5b4ad393304d885e991ef1c7cc4bb0945d0b13d307c5103c2cd6c21cb7f0e40c90b99c5ed3797d799b

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1495426.exe

                  Filesize

                  173KB

                  MD5

                  ad2eb530305e247b5e53f46f240871d7

                  SHA1

                  c02b1bd5ed82625f2f3ef7b5bf20a12c7f279d52

                  SHA256

                  66c8cc2787c7cac95cc3b2bbcadbab67e1800f6f450084d8000cfc7c89399bea

                  SHA512

                  fe32fd9bc27825eb64610523cfa2f7c688123762b494fe5b4ad393304d885e991ef1c7cc4bb0945d0b13d307c5103c2cd6c21cb7f0e40c90b99c5ed3797d799b

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0649325.exe

                  Filesize

                  13KB

                  MD5

                  72057ee086a089ddec8dc8964156736a

                  SHA1

                  ee0f5c905799e12f765dbed4780e18a4f34da84d

                  SHA256

                  b30ccb9c058e64e6fc2867d7eb8939a14bbbee2e15c9f55106cc41883dea54a2

                  SHA512

                  d183bc5a3b488cbfd867c90f5a43f28e5153329fa269575d72376f50499ad85043ac255388655ccb3da57fc686e46de4bf66e5fa96aac2006b9c927d20cc5bce

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0649325.exe

                  Filesize

                  13KB

                  MD5

                  72057ee086a089ddec8dc8964156736a

                  SHA1

                  ee0f5c905799e12f765dbed4780e18a4f34da84d

                  SHA256

                  b30ccb9c058e64e6fc2867d7eb8939a14bbbee2e15c9f55106cc41883dea54a2

                  SHA512

                  d183bc5a3b488cbfd867c90f5a43f28e5153329fa269575d72376f50499ad85043ac255388655ccb3da57fc686e46de4bf66e5fa96aac2006b9c927d20cc5bce

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                  Filesize

                  207KB

                  MD5

                  1f0a8c75d81b8e007afb9b62e53a6bec

                  SHA1

                  60b7e70fe9cdd78dd9b0d7ebb62d34f6dd40e954

                  SHA256

                  cdeea154c68c6845e10c7894fc79832b48c94df1ad8186b6de90f788ff103516

                  SHA512

                  744b4fd95136b656057e4fbf18d3e17f02843e2b9ef4225c5ed6a5c11ac3ae54bd34074666393b3da1946fc1af1695f5f0ea6c890d38e44572374e06ed88daa5

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                  Filesize

                  207KB

                  MD5

                  1f0a8c75d81b8e007afb9b62e53a6bec

                  SHA1

                  60b7e70fe9cdd78dd9b0d7ebb62d34f6dd40e954

                  SHA256

                  cdeea154c68c6845e10c7894fc79832b48c94df1ad8186b6de90f788ff103516

                  SHA512

                  744b4fd95136b656057e4fbf18d3e17f02843e2b9ef4225c5ed6a5c11ac3ae54bd34074666393b3da1946fc1af1695f5f0ea6c890d38e44572374e06ed88daa5

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                  Filesize

                  207KB

                  MD5

                  1f0a8c75d81b8e007afb9b62e53a6bec

                  SHA1

                  60b7e70fe9cdd78dd9b0d7ebb62d34f6dd40e954

                  SHA256

                  cdeea154c68c6845e10c7894fc79832b48c94df1ad8186b6de90f788ff103516

                  SHA512

                  744b4fd95136b656057e4fbf18d3e17f02843e2b9ef4225c5ed6a5c11ac3ae54bd34074666393b3da1946fc1af1695f5f0ea6c890d38e44572374e06ed88daa5

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                  Filesize

                  207KB

                  MD5

                  1f0a8c75d81b8e007afb9b62e53a6bec

                  SHA1

                  60b7e70fe9cdd78dd9b0d7ebb62d34f6dd40e954

                  SHA256

                  cdeea154c68c6845e10c7894fc79832b48c94df1ad8186b6de90f788ff103516

                  SHA512

                  744b4fd95136b656057e4fbf18d3e17f02843e2b9ef4225c5ed6a5c11ac3ae54bd34074666393b3da1946fc1af1695f5f0ea6c890d38e44572374e06ed88daa5

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                  Filesize

                  207KB

                  MD5

                  1f0a8c75d81b8e007afb9b62e53a6bec

                  SHA1

                  60b7e70fe9cdd78dd9b0d7ebb62d34f6dd40e954

                  SHA256

                  cdeea154c68c6845e10c7894fc79832b48c94df1ad8186b6de90f788ff103516

                  SHA512

                  744b4fd95136b656057e4fbf18d3e17f02843e2b9ef4225c5ed6a5c11ac3ae54bd34074666393b3da1946fc1af1695f5f0ea6c890d38e44572374e06ed88daa5

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  a5ed103ec4719a27ab3d3c01dac66f01

                  SHA1

                  c830d6980d7edea60568a518eccd36c0bc2a4924

                  SHA256

                  dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                  SHA512

                  b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  a5ed103ec4719a27ab3d3c01dac66f01

                  SHA1

                  c830d6980d7edea60568a518eccd36c0bc2a4924

                  SHA256

                  dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                  SHA512

                  b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  a5ed103ec4719a27ab3d3c01dac66f01

                  SHA1

                  c830d6980d7edea60568a518eccd36c0bc2a4924

                  SHA256

                  dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                  SHA512

                  b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                  Filesize

                  162B

                  MD5

                  1b7c22a214949975556626d7217e9a39

                  SHA1

                  d01c97e2944166ed23e47e4a62ff471ab8fa031f

                  SHA256

                  340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                  SHA512

                  ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                • memory/2204-172-0x0000000000120000-0x000000000012A000-memory.dmp

                  Filesize

                  40KB

                • memory/4208-190-0x0000000000400000-0x0000000000430000-memory.dmp

                  Filesize

                  192KB

                • memory/4208-195-0x0000000005060000-0x0000000005070000-memory.dmp

                  Filesize

                  64KB

                • memory/4788-157-0x0000000004B10000-0x0000000004B22000-memory.dmp

                  Filesize

                  72KB

                • memory/4788-167-0x0000000006120000-0x0000000006170000-memory.dmp

                  Filesize

                  320KB

                • memory/4788-166-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

                  Filesize

                  64KB

                • memory/4788-165-0x00000000083A0000-0x00000000088CC000-memory.dmp

                  Filesize

                  5.2MB

                • memory/4788-164-0x0000000005EF0000-0x00000000060B2000-memory.dmp

                  Filesize

                  1.8MB

                • memory/4788-163-0x0000000005030000-0x0000000005096000-memory.dmp

                  Filesize

                  408KB

                • memory/4788-162-0x00000000061D0000-0x0000000006774000-memory.dmp

                  Filesize

                  5.6MB

                • memory/4788-161-0x0000000004F90000-0x0000000005022000-memory.dmp

                  Filesize

                  584KB

                • memory/4788-160-0x0000000004E70000-0x0000000004EE6000-memory.dmp

                  Filesize

                  472KB

                • memory/4788-159-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

                  Filesize

                  64KB

                • memory/4788-158-0x0000000004B70000-0x0000000004BAC000-memory.dmp

                  Filesize

                  240KB

                • memory/4788-156-0x0000000004C00000-0x0000000004D0A000-memory.dmp

                  Filesize

                  1.0MB

                • memory/4788-155-0x0000000005110000-0x0000000005728000-memory.dmp

                  Filesize

                  6.1MB

                • memory/4788-154-0x00000000001A0000-0x00000000001D0000-memory.dmp

                  Filesize

                  192KB