Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/06/2023, 11:43

General

  • Target

    7b344712f4e70184c19ac4c0e9a1f626a7439b5d526f3a422e3dea2e5156fb5f.exe

  • Size

    773KB

  • MD5

    b943b8799c7e253363efffb940ecb5fd

  • SHA1

    7a436c03b17ed03e9677121134eddb9e0a20a5a1

  • SHA256

    7b344712f4e70184c19ac4c0e9a1f626a7439b5d526f3a422e3dea2e5156fb5f

  • SHA512

    fcb20fe7aec8eddd741b6095fc9ce714263a4d7563ac61ad87391cd5806cd6a3fefed642aa311967d6f6cf915a789a8fabc980174cdee68ce9cc4b2874750f2e

  • SSDEEP

    24576:yyqxTVUutFHqvkZVp68wvVjyvHMMnDjUa:Z2/tFK8DwFUMI

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.129:19068

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b344712f4e70184c19ac4c0e9a1f626a7439b5d526f3a422e3dea2e5156fb5f.exe
    "C:\Users\Admin\AppData\Local\Temp\7b344712f4e70184c19ac4c0e9a1f626a7439b5d526f3a422e3dea2e5156fb5f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1280
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0908637.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0908637.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1415264.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1415264.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4364
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6673818.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6673818.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4436
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9471300.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9471300.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4388
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5253896.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5253896.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2648
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1116
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 156
              6⤵
              • Program crash
              PID:992
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c3357451.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c3357451.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4404
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d2319343.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d2319343.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3320
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:516
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN lamod.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:1332
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "lamod.exe" /P "Admin:N"&&CACLS "lamod.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4604
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:3736
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "lamod.exe" /P "Admin:N"
                6⤵
                  PID:2372
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "lamod.exe" /P "Admin:R" /E
                  6⤵
                    PID:1604
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:2948
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:1164
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:4724
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e7287394.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e7287394.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:1568
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2284
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 152
                    3⤵
                    • Program crash
                    PID:2016
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 2648 -ip 2648
                1⤵
                  PID:220
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 1568 -ip 1568
                  1⤵
                    PID:4384

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                    Filesize

                    226B

                    MD5

                    916851e072fbabc4796d8916c5131092

                    SHA1

                    d48a602229a690c512d5fdaf4c8d77547a88e7a2

                    SHA256

                    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                    SHA512

                    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e7287394.exe

                    Filesize

                    309KB

                    MD5

                    2d73b4992dbfc20d6963bb587a03fd73

                    SHA1

                    b217332d80d59982d1fa15f36c9c04ad78e9c9ab

                    SHA256

                    ffce96d211ed0f568219fa37c8842e75d59394d63c440500f4196a903991218d

                    SHA512

                    e4bf32bd930496b095ac746595424300a6ef27d12eb83b8796e86b24d13e507ab436c9a7ba9e27b2112952cfb03f44e543b6cdfcd0ebf1badda0773b9f45a8b5

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e7287394.exe

                    Filesize

                    309KB

                    MD5

                    2d73b4992dbfc20d6963bb587a03fd73

                    SHA1

                    b217332d80d59982d1fa15f36c9c04ad78e9c9ab

                    SHA256

                    ffce96d211ed0f568219fa37c8842e75d59394d63c440500f4196a903991218d

                    SHA512

                    e4bf32bd930496b095ac746595424300a6ef27d12eb83b8796e86b24d13e507ab436c9a7ba9e27b2112952cfb03f44e543b6cdfcd0ebf1badda0773b9f45a8b5

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0908637.exe

                    Filesize

                    549KB

                    MD5

                    b552dccabb4523a72a88af1fd6f3d97f

                    SHA1

                    dc34bd42612cc7e22179e8131392b0fcc82b80cc

                    SHA256

                    e1e4974b2fdc9a36e950b92669d63d1842ed9ba50c69c4aa27acb661317200f5

                    SHA512

                    04db79b04e2a1d1df46c32faddb1ba41048d455b94144206722266b5f433ff882cec21ad9436d73f316d24e379012776ee297cfbfb3f1e15900b38dd8398639e

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0908637.exe

                    Filesize

                    549KB

                    MD5

                    b552dccabb4523a72a88af1fd6f3d97f

                    SHA1

                    dc34bd42612cc7e22179e8131392b0fcc82b80cc

                    SHA256

                    e1e4974b2fdc9a36e950b92669d63d1842ed9ba50c69c4aa27acb661317200f5

                    SHA512

                    04db79b04e2a1d1df46c32faddb1ba41048d455b94144206722266b5f433ff882cec21ad9436d73f316d24e379012776ee297cfbfb3f1e15900b38dd8398639e

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d2319343.exe

                    Filesize

                    208KB

                    MD5

                    0f0c82d5d21ce6a1ebc679699d3dac76

                    SHA1

                    45522e9c6cf96733f693c2989a354388e76e3587

                    SHA256

                    ff7c349a539c11e3e9ed66a2cc064c587afafa14707be9c72c09c6eba6a5dc29

                    SHA512

                    f8355a72b4b947373b8b257b8ce5155355a11ad332e39e9476c8ce5d4029f663d6d6f52f4becea55a4b27a9623b83516e75cc54e7f11818eb981b634c90f1adb

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d2319343.exe

                    Filesize

                    208KB

                    MD5

                    0f0c82d5d21ce6a1ebc679699d3dac76

                    SHA1

                    45522e9c6cf96733f693c2989a354388e76e3587

                    SHA256

                    ff7c349a539c11e3e9ed66a2cc064c587afafa14707be9c72c09c6eba6a5dc29

                    SHA512

                    f8355a72b4b947373b8b257b8ce5155355a11ad332e39e9476c8ce5d4029f663d6d6f52f4becea55a4b27a9623b83516e75cc54e7f11818eb981b634c90f1adb

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1415264.exe

                    Filesize

                    377KB

                    MD5

                    f558354a7e8b4a70ca3e659768a1e945

                    SHA1

                    79bbca917c6c42c0fd6a6e16f7ad7a967e58a472

                    SHA256

                    74e9fdf3ecd8a5bfe54a0fbb8e1c73ed566fa0a332f0fe2c7de6a8834c1f34ce

                    SHA512

                    93a58e00ae7b534c514f88470cd924d3e06201128d0782e6931cf35d39d91ff085bd17ffdc803f255c277809b92b30ef4bbbe1c6a62cc69593be8a7f66ab136d

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1415264.exe

                    Filesize

                    377KB

                    MD5

                    f558354a7e8b4a70ca3e659768a1e945

                    SHA1

                    79bbca917c6c42c0fd6a6e16f7ad7a967e58a472

                    SHA256

                    74e9fdf3ecd8a5bfe54a0fbb8e1c73ed566fa0a332f0fe2c7de6a8834c1f34ce

                    SHA512

                    93a58e00ae7b534c514f88470cd924d3e06201128d0782e6931cf35d39d91ff085bd17ffdc803f255c277809b92b30ef4bbbe1c6a62cc69593be8a7f66ab136d

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c3357451.exe

                    Filesize

                    172KB

                    MD5

                    d4d97d3a2f643ea5212b35c031eff9eb

                    SHA1

                    5aad6b49cf21929c7c2ad7f5500ea872a97e78a9

                    SHA256

                    139ad0b35c40ea403a08f4deca09a607024cbd7dc2fa187f3748d9da1cc7c54b

                    SHA512

                    61cf774ad79080af82f68815d295be0a403d6f79c393b93dcdc73aa7f4bbf83b78cba194edbb05f199aa1ea4f91f4d3e31d0358bf2b4516fa2827e8936502d75

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c3357451.exe

                    Filesize

                    172KB

                    MD5

                    d4d97d3a2f643ea5212b35c031eff9eb

                    SHA1

                    5aad6b49cf21929c7c2ad7f5500ea872a97e78a9

                    SHA256

                    139ad0b35c40ea403a08f4deca09a607024cbd7dc2fa187f3748d9da1cc7c54b

                    SHA512

                    61cf774ad79080af82f68815d295be0a403d6f79c393b93dcdc73aa7f4bbf83b78cba194edbb05f199aa1ea4f91f4d3e31d0358bf2b4516fa2827e8936502d75

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6673818.exe

                    Filesize

                    221KB

                    MD5

                    71038a56066711b018252b640a15407c

                    SHA1

                    21451a1291be56e118c603ae6f96492f0b652936

                    SHA256

                    e1e81cf8ce6f074b19b3ccf1164ee9693ba05f719e3b6e0ec5a855c825e14022

                    SHA512

                    b95056842369741d5a4e3f1890c1d7883cddef5a24d4a34347ad14c0ce253cefb0aee4395ca6ed49c7f15a8680032c86adcbd49692970342ee4c7bd8a5e38f16

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6673818.exe

                    Filesize

                    221KB

                    MD5

                    71038a56066711b018252b640a15407c

                    SHA1

                    21451a1291be56e118c603ae6f96492f0b652936

                    SHA256

                    e1e81cf8ce6f074b19b3ccf1164ee9693ba05f719e3b6e0ec5a855c825e14022

                    SHA512

                    b95056842369741d5a4e3f1890c1d7883cddef5a24d4a34347ad14c0ce253cefb0aee4395ca6ed49c7f15a8680032c86adcbd49692970342ee4c7bd8a5e38f16

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9471300.exe

                    Filesize

                    14KB

                    MD5

                    ee664894183e8137003f35925c7211d4

                    SHA1

                    2de569a1cf754b676bfcc77a070989969b5ec675

                    SHA256

                    fc1b6453f86fd5cab3bd49e39b7904414ac9f62107f2a5e87f84205d4249912b

                    SHA512

                    2ef9994e4296da2b6e5e9ab06f8b57408db7af2aa5017923d9cd81341bd73f011ac93ae69748a49f12ac0cf9b7ce0b8c0b04c04156ec5503ec9aead843124e84

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9471300.exe

                    Filesize

                    14KB

                    MD5

                    ee664894183e8137003f35925c7211d4

                    SHA1

                    2de569a1cf754b676bfcc77a070989969b5ec675

                    SHA256

                    fc1b6453f86fd5cab3bd49e39b7904414ac9f62107f2a5e87f84205d4249912b

                    SHA512

                    2ef9994e4296da2b6e5e9ab06f8b57408db7af2aa5017923d9cd81341bd73f011ac93ae69748a49f12ac0cf9b7ce0b8c0b04c04156ec5503ec9aead843124e84

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5253896.exe

                    Filesize

                    148KB

                    MD5

                    584605e6507e3459e4e4582a78b75309

                    SHA1

                    53222a7e6672eb11e1f86545b69991d99d8389cb

                    SHA256

                    f6caf3aed2dfc51594cfaf9113325a6483346a0e380792a26d0797cbd87c681d

                    SHA512

                    cecd67625623d8f348b5637d1b3986c38bf00d5c868fa4808795ce7d7170b52a8134d955b004c26cbfcd7d0302ec2c2ec1a63875df121876b28c560b887499a8

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5253896.exe

                    Filesize

                    148KB

                    MD5

                    584605e6507e3459e4e4582a78b75309

                    SHA1

                    53222a7e6672eb11e1f86545b69991d99d8389cb

                    SHA256

                    f6caf3aed2dfc51594cfaf9113325a6483346a0e380792a26d0797cbd87c681d

                    SHA512

                    cecd67625623d8f348b5637d1b3986c38bf00d5c868fa4808795ce7d7170b52a8134d955b004c26cbfcd7d0302ec2c2ec1a63875df121876b28c560b887499a8

                  • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                    Filesize

                    208KB

                    MD5

                    0f0c82d5d21ce6a1ebc679699d3dac76

                    SHA1

                    45522e9c6cf96733f693c2989a354388e76e3587

                    SHA256

                    ff7c349a539c11e3e9ed66a2cc064c587afafa14707be9c72c09c6eba6a5dc29

                    SHA512

                    f8355a72b4b947373b8b257b8ce5155355a11ad332e39e9476c8ce5d4029f663d6d6f52f4becea55a4b27a9623b83516e75cc54e7f11818eb981b634c90f1adb

                  • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                    Filesize

                    208KB

                    MD5

                    0f0c82d5d21ce6a1ebc679699d3dac76

                    SHA1

                    45522e9c6cf96733f693c2989a354388e76e3587

                    SHA256

                    ff7c349a539c11e3e9ed66a2cc064c587afafa14707be9c72c09c6eba6a5dc29

                    SHA512

                    f8355a72b4b947373b8b257b8ce5155355a11ad332e39e9476c8ce5d4029f663d6d6f52f4becea55a4b27a9623b83516e75cc54e7f11818eb981b634c90f1adb

                  • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                    Filesize

                    208KB

                    MD5

                    0f0c82d5d21ce6a1ebc679699d3dac76

                    SHA1

                    45522e9c6cf96733f693c2989a354388e76e3587

                    SHA256

                    ff7c349a539c11e3e9ed66a2cc064c587afafa14707be9c72c09c6eba6a5dc29

                    SHA512

                    f8355a72b4b947373b8b257b8ce5155355a11ad332e39e9476c8ce5d4029f663d6d6f52f4becea55a4b27a9623b83516e75cc54e7f11818eb981b634c90f1adb

                  • memory/1116-166-0x0000000000400000-0x000000000040A000-memory.dmp

                    Filesize

                    40KB

                  • memory/2284-212-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2284-206-0x0000000000400000-0x0000000000430000-memory.dmp

                    Filesize

                    192KB

                  • memory/4388-161-0x0000000000730000-0x000000000073A000-memory.dmp

                    Filesize

                    40KB

                  • memory/4404-178-0x000000000ADB0000-0x000000000ADEC000-memory.dmp

                    Filesize

                    240KB

                  • memory/4404-186-0x000000000BEF0000-0x000000000C0B2000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/4404-187-0x000000000CBF0000-0x000000000D11C000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/4404-188-0x000000000BEA0000-0x000000000BEF0000-memory.dmp

                    Filesize

                    320KB

                  • memory/4404-185-0x000000000C110000-0x000000000C6B4000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/4404-184-0x0000000002FA0000-0x0000000003006000-memory.dmp

                    Filesize

                    408KB

                  • memory/4404-183-0x000000000B9C0000-0x000000000BA52000-memory.dmp

                    Filesize

                    584KB

                  • memory/4404-182-0x0000000002F20000-0x0000000002F96000-memory.dmp

                    Filesize

                    472KB

                  • memory/4404-181-0x00000000057F0000-0x0000000005800000-memory.dmp

                    Filesize

                    64KB

                  • memory/4404-179-0x00000000057F0000-0x0000000005800000-memory.dmp

                    Filesize

                    64KB

                  • memory/4404-177-0x000000000AD50000-0x000000000AD62000-memory.dmp

                    Filesize

                    72KB

                  • memory/4404-176-0x000000000AE10000-0x000000000AF1A000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/4404-175-0x000000000B2A0000-0x000000000B8B8000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/4404-174-0x0000000000E90000-0x0000000000EC0000-memory.dmp

                    Filesize

                    192KB