Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    08/06/2023, 11:48

General

  • Target

    ccb5bede9e68125f1b174d03e1105962132ae7319883d1efa86e26f31c4c56f5.exe

  • Size

    602KB

  • MD5

    30e817d08d5a005923caa88c54e077f4

  • SHA1

    8d2dc185d244f9c623b6ea9e944e5ebc8dee7997

  • SHA256

    ccb5bede9e68125f1b174d03e1105962132ae7319883d1efa86e26f31c4c56f5

  • SHA512

    48a31294649e362810a172ca28240cb687ef19f5c179c40c77dc2fe4e41ee5b565322bb461c822d7f4edc30cfe232f966bc076443ac60f04c09c27d05c555269

  • SSDEEP

    12288:AMrxy909s8ASFV9uSvBKcBmjUOE5OEU7W:ByobAIlEcB4UU7W

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.129:19068

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ccb5bede9e68125f1b174d03e1105962132ae7319883d1efa86e26f31c4c56f5.exe
    "C:\Users\Admin\AppData\Local\Temp\ccb5bede9e68125f1b174d03e1105962132ae7319883d1efa86e26f31c4c56f5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3704
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6514013.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6514013.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1602112.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1602112.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4656
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f0710570.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f0710570.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4408
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7925094.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7925094.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4348
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5442994.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5442994.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4188
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4752
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN lamod.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:3076
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "lamod.exe" /P "Admin:N"&&CACLS "lamod.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4872
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:4812
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "lamod.exe" /P "Admin:N"
                6⤵
                  PID:3996
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "lamod.exe" /P "Admin:R" /E
                  6⤵
                    PID:4152
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\a9e2a16078" /P "Admin:N"
                    6⤵
                      PID:3828
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      6⤵
                        PID:3824
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:4544
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:396
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5187676.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5187676.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:4768
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    3⤵
                      PID:4880
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 128
                      3⤵
                      • Program crash
                      PID:4904
                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  1⤵
                  • Executes dropped EXE
                  PID:5056
                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  1⤵
                  • Executes dropped EXE
                  PID:1240

                Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5187676.exe

                        Filesize

                        309KB

                        MD5

                        e238e0e12faab293a2bce28e26f7d9fc

                        SHA1

                        89b6d92a3dec22fd810e50758676e9450b7a1680

                        SHA256

                        642f5d9c80b80ee6d39faf15b18a1e1beeb83759bf59e1c8eb4b72fa5c7c8123

                        SHA512

                        553ce7ab7b62d37ae01666637a88651d7a2a0c12c961af1c18e51eb401b463aa2071f7c369c77dcc111bc0bb6f7819daceecbee3cb27ddbdb67c05b42503aeb5

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5187676.exe

                        Filesize

                        309KB

                        MD5

                        e238e0e12faab293a2bce28e26f7d9fc

                        SHA1

                        89b6d92a3dec22fd810e50758676e9450b7a1680

                        SHA256

                        642f5d9c80b80ee6d39faf15b18a1e1beeb83759bf59e1c8eb4b72fa5c7c8123

                        SHA512

                        553ce7ab7b62d37ae01666637a88651d7a2a0c12c961af1c18e51eb401b463aa2071f7c369c77dcc111bc0bb6f7819daceecbee3cb27ddbdb67c05b42503aeb5

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6514013.exe

                        Filesize

                        377KB

                        MD5

                        a1fd1854271d119b92b6279fc0bf42d7

                        SHA1

                        741c9adcbe48fa0497534325162edd0712bd9fea

                        SHA256

                        d12475df0b2570c17450f82659f3922ed7650fafb491aea419553eeb2d3bfc25

                        SHA512

                        15028067bd8762427e792cfbb7bfba65cd9a27af21b2237c7223ad12c9b88de2253615b6839e8472d6f0442ae7ca81a34e123a35c0e152de12372e07d7e6f5f8

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6514013.exe

                        Filesize

                        377KB

                        MD5

                        a1fd1854271d119b92b6279fc0bf42d7

                        SHA1

                        741c9adcbe48fa0497534325162edd0712bd9fea

                        SHA256

                        d12475df0b2570c17450f82659f3922ed7650fafb491aea419553eeb2d3bfc25

                        SHA512

                        15028067bd8762427e792cfbb7bfba65cd9a27af21b2237c7223ad12c9b88de2253615b6839e8472d6f0442ae7ca81a34e123a35c0e152de12372e07d7e6f5f8

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5442994.exe

                        Filesize

                        208KB

                        MD5

                        039826a81f4ecc59969b421c04430341

                        SHA1

                        c25198dcc2bf33b23beb5fb47486aa06ec33e7f5

                        SHA256

                        f60e68bebd374aa91d73b6c6b1b913472631919cc2b343c1783b2a57839e7035

                        SHA512

                        4ee63f40d3fdbbf831461b9ccbf37b85ca99abda99c4b8fce361aec44b870a4b659a824c69cf00199687aa7d0819856c161c4840d8ed8252ee8954a62689c56c

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5442994.exe

                        Filesize

                        208KB

                        MD5

                        039826a81f4ecc59969b421c04430341

                        SHA1

                        c25198dcc2bf33b23beb5fb47486aa06ec33e7f5

                        SHA256

                        f60e68bebd374aa91d73b6c6b1b913472631919cc2b343c1783b2a57839e7035

                        SHA512

                        4ee63f40d3fdbbf831461b9ccbf37b85ca99abda99c4b8fce361aec44b870a4b659a824c69cf00199687aa7d0819856c161c4840d8ed8252ee8954a62689c56c

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1602112.exe

                        Filesize

                        206KB

                        MD5

                        789a47ac33f994ab269b6ecc13cbc1c2

                        SHA1

                        c9970ec5f5b99c619718bd3410e0fc921ca82a9a

                        SHA256

                        2fb6aff17761294894732d9dbd00491f562cbf2937d4a793eb727d621571d081

                        SHA512

                        b979ad6f216c1f0610f727fbb29e81f25522add786be3c1f11e0d86773b06ef1abf75a2b30df6b4e68570a07d2b982da397039804ca8463f6959c169a7c8de59

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1602112.exe

                        Filesize

                        206KB

                        MD5

                        789a47ac33f994ab269b6ecc13cbc1c2

                        SHA1

                        c9970ec5f5b99c619718bd3410e0fc921ca82a9a

                        SHA256

                        2fb6aff17761294894732d9dbd00491f562cbf2937d4a793eb727d621571d081

                        SHA512

                        b979ad6f216c1f0610f727fbb29e81f25522add786be3c1f11e0d86773b06ef1abf75a2b30df6b4e68570a07d2b982da397039804ca8463f6959c169a7c8de59

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f0710570.exe

                        Filesize

                        173KB

                        MD5

                        2f5c42eeb4e503e74dc3949caa52ce3b

                        SHA1

                        3b187c0e1c3c17dce318f26610e13f19fc1749f1

                        SHA256

                        3cb9efe79c5218a90215d01ba095084db3b92c56a38a031500ad57c1f0d7a20d

                        SHA512

                        4abe34b383092eda3a475ceba9a26f2e880054db0b947083881d2deccba3d758a9287bc885315c82500884686c1114e581ec8df44fc637a09d686a9d6a74c6e4

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f0710570.exe

                        Filesize

                        173KB

                        MD5

                        2f5c42eeb4e503e74dc3949caa52ce3b

                        SHA1

                        3b187c0e1c3c17dce318f26610e13f19fc1749f1

                        SHA256

                        3cb9efe79c5218a90215d01ba095084db3b92c56a38a031500ad57c1f0d7a20d

                        SHA512

                        4abe34b383092eda3a475ceba9a26f2e880054db0b947083881d2deccba3d758a9287bc885315c82500884686c1114e581ec8df44fc637a09d686a9d6a74c6e4

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7925094.exe

                        Filesize

                        14KB

                        MD5

                        665b7d5fe556c70f89671cf10183cf81

                        SHA1

                        b7d5bed292a861af8f4ccf36d4f8f469262c94fd

                        SHA256

                        c02aad5d7b917eef310db5d8218e8f208a94183ab1af1064ecf826d7e1c5e597

                        SHA512

                        83b7de1e638badf120f442c57e118a1123b0d75ff3a1b23f1fd12e2694a0cffc74a3e36b22f1ee691bc7cfdab06bbe24e8f8e7a7832dc765af0b6a7a25ceae4d

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7925094.exe

                        Filesize

                        14KB

                        MD5

                        665b7d5fe556c70f89671cf10183cf81

                        SHA1

                        b7d5bed292a861af8f4ccf36d4f8f469262c94fd

                        SHA256

                        c02aad5d7b917eef310db5d8218e8f208a94183ab1af1064ecf826d7e1c5e597

                        SHA512

                        83b7de1e638badf120f442c57e118a1123b0d75ff3a1b23f1fd12e2694a0cffc74a3e36b22f1ee691bc7cfdab06bbe24e8f8e7a7832dc765af0b6a7a25ceae4d

                      • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                        Filesize

                        208KB

                        MD5

                        039826a81f4ecc59969b421c04430341

                        SHA1

                        c25198dcc2bf33b23beb5fb47486aa06ec33e7f5

                        SHA256

                        f60e68bebd374aa91d73b6c6b1b913472631919cc2b343c1783b2a57839e7035

                        SHA512

                        4ee63f40d3fdbbf831461b9ccbf37b85ca99abda99c4b8fce361aec44b870a4b659a824c69cf00199687aa7d0819856c161c4840d8ed8252ee8954a62689c56c

                      • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                        Filesize

                        208KB

                        MD5

                        039826a81f4ecc59969b421c04430341

                        SHA1

                        c25198dcc2bf33b23beb5fb47486aa06ec33e7f5

                        SHA256

                        f60e68bebd374aa91d73b6c6b1b913472631919cc2b343c1783b2a57839e7035

                        SHA512

                        4ee63f40d3fdbbf831461b9ccbf37b85ca99abda99c4b8fce361aec44b870a4b659a824c69cf00199687aa7d0819856c161c4840d8ed8252ee8954a62689c56c

                      • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                        Filesize

                        208KB

                        MD5

                        039826a81f4ecc59969b421c04430341

                        SHA1

                        c25198dcc2bf33b23beb5fb47486aa06ec33e7f5

                        SHA256

                        f60e68bebd374aa91d73b6c6b1b913472631919cc2b343c1783b2a57839e7035

                        SHA512

                        4ee63f40d3fdbbf831461b9ccbf37b85ca99abda99c4b8fce361aec44b870a4b659a824c69cf00199687aa7d0819856c161c4840d8ed8252ee8954a62689c56c

                      • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                        Filesize

                        208KB

                        MD5

                        039826a81f4ecc59969b421c04430341

                        SHA1

                        c25198dcc2bf33b23beb5fb47486aa06ec33e7f5

                        SHA256

                        f60e68bebd374aa91d73b6c6b1b913472631919cc2b343c1783b2a57839e7035

                        SHA512

                        4ee63f40d3fdbbf831461b9ccbf37b85ca99abda99c4b8fce361aec44b870a4b659a824c69cf00199687aa7d0819856c161c4840d8ed8252ee8954a62689c56c

                      • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                        Filesize

                        208KB

                        MD5

                        039826a81f4ecc59969b421c04430341

                        SHA1

                        c25198dcc2bf33b23beb5fb47486aa06ec33e7f5

                        SHA256

                        f60e68bebd374aa91d73b6c6b1b913472631919cc2b343c1783b2a57839e7035

                        SHA512

                        4ee63f40d3fdbbf831461b9ccbf37b85ca99abda99c4b8fce361aec44b870a4b659a824c69cf00199687aa7d0819856c161c4840d8ed8252ee8954a62689c56c

                      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                        Filesize

                        89KB

                        MD5

                        a5ed103ec4719a27ab3d3c01dac66f01

                        SHA1

                        c830d6980d7edea60568a518eccd36c0bc2a4924

                        SHA256

                        dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                        SHA512

                        b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                        Filesize

                        89KB

                        MD5

                        a5ed103ec4719a27ab3d3c01dac66f01

                        SHA1

                        c830d6980d7edea60568a518eccd36c0bc2a4924

                        SHA256

                        dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                        SHA512

                        b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                        Filesize

                        162B

                        MD5

                        1b7c22a214949975556626d7217e9a39

                        SHA1

                        d01c97e2944166ed23e47e4a62ff471ab8fa031f

                        SHA256

                        340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                        SHA512

                        ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                      • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                        Filesize

                        89KB

                        MD5

                        a5ed103ec4719a27ab3d3c01dac66f01

                        SHA1

                        c830d6980d7edea60568a518eccd36c0bc2a4924

                        SHA256

                        dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                        SHA512

                        b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                      • memory/4348-157-0x0000000000C10000-0x0000000000C1A000-memory.dmp

                        Filesize

                        40KB

                      • memory/4408-141-0x000000000A840000-0x000000000A852000-memory.dmp

                        Filesize

                        72KB

                      • memory/4408-142-0x000000000A8A0000-0x000000000A8DE000-memory.dmp

                        Filesize

                        248KB

                      • memory/4408-151-0x0000000002EA0000-0x0000000002EB0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4408-150-0x000000000C730000-0x000000000CC5C000-memory.dmp

                        Filesize

                        5.2MB

                      • memory/4408-149-0x000000000BAB0000-0x000000000BC72000-memory.dmp

                        Filesize

                        1.8MB

                      • memory/4408-148-0x000000000BD00000-0x000000000C1FE000-memory.dmp

                        Filesize

                        5.0MB

                      • memory/4408-147-0x000000000AC40000-0x000000000ACA6000-memory.dmp

                        Filesize

                        408KB

                      • memory/4408-146-0x000000000ACE0000-0x000000000AD72000-memory.dmp

                        Filesize

                        584KB

                      • memory/4408-145-0x000000000ABC0000-0x000000000AC36000-memory.dmp

                        Filesize

                        472KB

                      • memory/4408-144-0x000000000AA20000-0x000000000AA6B000-memory.dmp

                        Filesize

                        300KB

                      • memory/4408-137-0x0000000000B10000-0x0000000000B40000-memory.dmp

                        Filesize

                        192KB

                      • memory/4408-138-0x0000000002D40000-0x0000000002D46000-memory.dmp

                        Filesize

                        24KB

                      • memory/4408-139-0x000000000ADF0000-0x000000000B3F6000-memory.dmp

                        Filesize

                        6.0MB

                      • memory/4408-140-0x000000000A910000-0x000000000AA1A000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/4408-152-0x000000000BC80000-0x000000000BCD0000-memory.dmp

                        Filesize

                        320KB

                      • memory/4408-143-0x0000000002EA0000-0x0000000002EB0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4880-187-0x00000000095C0000-0x00000000095D0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4880-186-0x00000000095C0000-0x00000000095D0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4880-181-0x000000000ECB0000-0x000000000ECFB000-memory.dmp

                        Filesize

                        300KB

                      • memory/4880-180-0x0000000006F20000-0x0000000006F26000-memory.dmp

                        Filesize

                        24KB

                      • memory/4880-172-0x0000000000400000-0x0000000000430000-memory.dmp

                        Filesize

                        192KB