Analysis

  • max time kernel
    157s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 23:02

General

  • Target

    4ca25082d2172b7dee0dd62afcd9793db79ac0fdcd920a6b0bfd5f9668bb16a5.exe

  • Size

    1.2MB

  • MD5

    fbd3f69fbd58a94f821e1c16c593f91e

  • SHA1

    94588c4d1fd9ca3689593b616ea402ff7fae12b8

  • SHA256

    4ca25082d2172b7dee0dd62afcd9793db79ac0fdcd920a6b0bfd5f9668bb16a5

  • SHA512

    0dd68acf5c22dbaf01115c366e977422a66a67589d92a0b2571d4de693267fdecc248b00e90eb334d6f8303f9ea4f052997cacfa711e00fa8a2f635778b3f013

  • SSDEEP

    24576:Ty5RETi/Rr6DD2PIUSf+aL8wybyXvA+hs+5EYzTuEzeZkKEFkuHdFY8dBnbu:m8TiJr6DqgDf+aL3y2Y+hsqEYmOeavFl

Malware Config

Extracted

Family

redline

Botnet

nanya

C2

77.91.124.82:19071

Attributes
  • auth_value

    640aa5afe54f566d8795f0dc723f8b52

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • Executes dropped EXE 10 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ca25082d2172b7dee0dd62afcd9793db79ac0fdcd920a6b0bfd5f9668bb16a5.exe
    "C:\Users\Admin\AppData\Local\Temp\4ca25082d2172b7dee0dd62afcd9793db79ac0fdcd920a6b0bfd5f9668bb16a5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3540
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2815499.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2815499.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2568
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9472908.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9472908.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4676
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4384472.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4384472.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2324
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9293228.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9293228.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1132
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v8718732.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v8718732.exe
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:5024
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0467991.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0467991.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2100
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4912
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 552
                  8⤵
                  • Program crash
                  PID:3416
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b6907139.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b6907139.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2072
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                    PID:4008
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    8⤵
                      PID:3904
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 3904 -s 540
                        9⤵
                        • Program crash
                        PID:4376
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 588
                      8⤵
                      • Program crash
                      PID:2340
                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c8183692.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c8183692.exe
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:4024
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    7⤵
                      PID:3420
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                      7⤵
                        PID:2208
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 4024 -s 572
                        7⤵
                        • Program crash
                        PID:4936
                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d7447668.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d7447668.exe
                    5⤵
                    • Executes dropped EXE
                    PID:4560
                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e7579692.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e7579692.exe
                  4⤵
                  • Executes dropped EXE
                  PID:1616
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2100 -ip 2100
            1⤵
              PID:3480
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2072 -ip 2072
              1⤵
                PID:1940
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3904 -ip 3904
                1⤵
                  PID:4852
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4024 -ip 4024
                  1⤵
                    PID:1312

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2815499.exe

                    Filesize

                    1.1MB

                    MD5

                    9a25fba577b3e125095654786341339a

                    SHA1

                    16edf75247c633601e0b6e761c8455f873cbc1c4

                    SHA256

                    573ca549bdfe5e15f7522033ddf88ec2e9d1c3f5cba44fdf841d47c6f0a8552e

                    SHA512

                    2ca65f9cc47cc8beda821c48282524c23ea1dba3ce5d133d39e7b927ddaed441295a6f6c06871bfa2fce1b335770954202b18729f8fba0c70bd214f2e53f3591

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2815499.exe

                    Filesize

                    1.1MB

                    MD5

                    9a25fba577b3e125095654786341339a

                    SHA1

                    16edf75247c633601e0b6e761c8455f873cbc1c4

                    SHA256

                    573ca549bdfe5e15f7522033ddf88ec2e9d1c3f5cba44fdf841d47c6f0a8552e

                    SHA512

                    2ca65f9cc47cc8beda821c48282524c23ea1dba3ce5d133d39e7b927ddaed441295a6f6c06871bfa2fce1b335770954202b18729f8fba0c70bd214f2e53f3591

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9472908.exe

                    Filesize

                    935KB

                    MD5

                    16728955790d4af50578c0900fa6d8bc

                    SHA1

                    5f41f969d3adc4d5828d43de09643a2b5fccdb64

                    SHA256

                    4515e15079d8c50320452a925277e2b5caee703e21cb988b28aeb3127f8fe724

                    SHA512

                    11dfeb884895efec7eee77c214c4778c7b7ff0423fcee96ac21970dbd1c279e908f2734b1e62452787c74dac014ca0e3e954965092b3b6c2dbd6a6de29ab7efc

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9472908.exe

                    Filesize

                    935KB

                    MD5

                    16728955790d4af50578c0900fa6d8bc

                    SHA1

                    5f41f969d3adc4d5828d43de09643a2b5fccdb64

                    SHA256

                    4515e15079d8c50320452a925277e2b5caee703e21cb988b28aeb3127f8fe724

                    SHA512

                    11dfeb884895efec7eee77c214c4778c7b7ff0423fcee96ac21970dbd1c279e908f2734b1e62452787c74dac014ca0e3e954965092b3b6c2dbd6a6de29ab7efc

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e7579692.exe

                    Filesize

                    174KB

                    MD5

                    a261e354dd178611494414dca6cf01cf

                    SHA1

                    178cba25fbb9a7771b5aa1cdccee4f96443cbc7f

                    SHA256

                    fbd306d188af1562d43ede6a189fb29780ef6a8701828421f74da50334b6a7ca

                    SHA512

                    975057844616cbb96f14128a099f6de1d6a673e3f73e399b0f985bcea739fc94de10f9fbeb05273ed3994d218b6df6376c57d59b636be866fb808b6aeb600751

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e7579692.exe

                    Filesize

                    174KB

                    MD5

                    a261e354dd178611494414dca6cf01cf

                    SHA1

                    178cba25fbb9a7771b5aa1cdccee4f96443cbc7f

                    SHA256

                    fbd306d188af1562d43ede6a189fb29780ef6a8701828421f74da50334b6a7ca

                    SHA512

                    975057844616cbb96f14128a099f6de1d6a673e3f73e399b0f985bcea739fc94de10f9fbeb05273ed3994d218b6df6376c57d59b636be866fb808b6aeb600751

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4384472.exe

                    Filesize

                    780KB

                    MD5

                    eeff5fc98dcc24585b9d000041f47706

                    SHA1

                    467537206bb963b105896e1a42b682d083c7d1af

                    SHA256

                    66589b7e61580ff42a26b4527856aabf0f9c19818ecc8019641d6a95e8f28207

                    SHA512

                    46971216b9cbb87432d28b9a29ca752680a84726421385631431c7a2ffc4ef43c319c39fc979360a4c8709806719b1808e3cfc664468a8718b0e1e3c59986f55

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4384472.exe

                    Filesize

                    780KB

                    MD5

                    eeff5fc98dcc24585b9d000041f47706

                    SHA1

                    467537206bb963b105896e1a42b682d083c7d1af

                    SHA256

                    66589b7e61580ff42a26b4527856aabf0f9c19818ecc8019641d6a95e8f28207

                    SHA512

                    46971216b9cbb87432d28b9a29ca752680a84726421385631431c7a2ffc4ef43c319c39fc979360a4c8709806719b1808e3cfc664468a8718b0e1e3c59986f55

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d7447668.exe

                    Filesize

                    155KB

                    MD5

                    9652504f0e46e27f0e1937e80c969f22

                    SHA1

                    2c28ddfef89ab3c503cb6da3ad893dc62f39e7f7

                    SHA256

                    677529715fb32cde137816d01d4ed5a80f9d2dcabb281ea2e5289332afd22e86

                    SHA512

                    6deeeac92f9049073939928a050c61f79379a2e64861406c471f1dbffc202b628b8c2b7d5ad628a27db2833164a6813f3eb8c21ca9645283588ef5da5afb1205

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d7447668.exe

                    Filesize

                    155KB

                    MD5

                    9652504f0e46e27f0e1937e80c969f22

                    SHA1

                    2c28ddfef89ab3c503cb6da3ad893dc62f39e7f7

                    SHA256

                    677529715fb32cde137816d01d4ed5a80f9d2dcabb281ea2e5289332afd22e86

                    SHA512

                    6deeeac92f9049073939928a050c61f79379a2e64861406c471f1dbffc202b628b8c2b7d5ad628a27db2833164a6813f3eb8c21ca9645283588ef5da5afb1205

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9293228.exe

                    Filesize

                    603KB

                    MD5

                    845eaab187a218aab91d33726a806f20

                    SHA1

                    24198f33a5b05ef5fab39376c65eb63b22b651d3

                    SHA256

                    eab68cebc8d61353e1bb475928f229f37230a406ab23390103c869a8168ba166

                    SHA512

                    64ba2fa898e0a27e9a73e8b29dcf6a3492677dbaeaec27600fd302aae4e80ee584e02530347a08a762a9ca38c661b255af33758acb09f2d46db8d441dec76688

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9293228.exe

                    Filesize

                    603KB

                    MD5

                    845eaab187a218aab91d33726a806f20

                    SHA1

                    24198f33a5b05ef5fab39376c65eb63b22b651d3

                    SHA256

                    eab68cebc8d61353e1bb475928f229f37230a406ab23390103c869a8168ba166

                    SHA512

                    64ba2fa898e0a27e9a73e8b29dcf6a3492677dbaeaec27600fd302aae4e80ee584e02530347a08a762a9ca38c661b255af33758acb09f2d46db8d441dec76688

                  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c8183692.exe

                    Filesize

                    383KB

                    MD5

                    0f3ab11af0d91b099c5765c09cfe0417

                    SHA1

                    8f5b65118985077029d313747f8cf87794eb48e8

                    SHA256

                    50e4d3d98dcafec6e43edbc989ccc80806c26d268a5c5a2e488e471e7262edfe

                    SHA512

                    3b1e748a550bb89f2f1d8e75acc3e34e9c319c553a49ee01e7fdce30e8acab846f9658c2f0c8753a40351240c74404cd0578a15e3af6b2601c44e90ef4413fcc

                  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c8183692.exe

                    Filesize

                    383KB

                    MD5

                    0f3ab11af0d91b099c5765c09cfe0417

                    SHA1

                    8f5b65118985077029d313747f8cf87794eb48e8

                    SHA256

                    50e4d3d98dcafec6e43edbc989ccc80806c26d268a5c5a2e488e471e7262edfe

                    SHA512

                    3b1e748a550bb89f2f1d8e75acc3e34e9c319c553a49ee01e7fdce30e8acab846f9658c2f0c8753a40351240c74404cd0578a15e3af6b2601c44e90ef4413fcc

                  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v8718732.exe

                    Filesize

                    344KB

                    MD5

                    3e66e75329c1ce1ea535015a4a8f2b3d

                    SHA1

                    83f4b5b50387bcee316751a52ef1e9e42258ca99

                    SHA256

                    8a6c1d0e9333b89fa9b2c2a47a321e1cc3dac15db731f0057518befa3c5601e1

                    SHA512

                    c054e65128b0f9568c21642ca4fcd6419d4d57ad1ea8ee260ef3a2e2307f32369bb7c7e0434113b218727574efcca1579b48807e7b4ab75ba85918306df40eba

                  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v8718732.exe

                    Filesize

                    344KB

                    MD5

                    3e66e75329c1ce1ea535015a4a8f2b3d

                    SHA1

                    83f4b5b50387bcee316751a52ef1e9e42258ca99

                    SHA256

                    8a6c1d0e9333b89fa9b2c2a47a321e1cc3dac15db731f0057518befa3c5601e1

                    SHA512

                    c054e65128b0f9568c21642ca4fcd6419d4d57ad1ea8ee260ef3a2e2307f32369bb7c7e0434113b218727574efcca1579b48807e7b4ab75ba85918306df40eba

                  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0467991.exe

                    Filesize

                    220KB

                    MD5

                    a29461d4d849bf5b277e66b42a8a1a0e

                    SHA1

                    ddd48318528f4864fb25b205c3639160bb40f752

                    SHA256

                    a49ea7c1ece6ef20195b2bcfe085032a6b8ceb84aeab0800438b04f41b1a4ffa

                    SHA512

                    2e3a644fc98b409a74bc1dcc0959f38bcf8d4d3c9d4ea3f7dc9c36c798cc539787a1bc9af0ca19a4b8b7b1b54c6a80e805bd29e8251587833570e326dd8ad864

                  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0467991.exe

                    Filesize

                    220KB

                    MD5

                    a29461d4d849bf5b277e66b42a8a1a0e

                    SHA1

                    ddd48318528f4864fb25b205c3639160bb40f752

                    SHA256

                    a49ea7c1ece6ef20195b2bcfe085032a6b8ceb84aeab0800438b04f41b1a4ffa

                    SHA512

                    2e3a644fc98b409a74bc1dcc0959f38bcf8d4d3c9d4ea3f7dc9c36c798cc539787a1bc9af0ca19a4b8b7b1b54c6a80e805bd29e8251587833570e326dd8ad864

                  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b6907139.exe

                    Filesize

                    364KB

                    MD5

                    0fa4e3ea2bd866cbe4373aaf364f4e80

                    SHA1

                    b3aa0d84611fa6cf469f9740531dbba07900ed62

                    SHA256

                    4cd9ea75593dd888b7d5bda9cdfb7968cf92595eb01c6fb6dda3e6a961af437e

                    SHA512

                    babb7039753c6cdbe48481527c8e202ac1e66a983d379194dc9d085eaa1dd22704d06dc2a41764610462b52a994e3b284e5e95cdd2c447880294c37fab7c21c1

                  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b6907139.exe

                    Filesize

                    364KB

                    MD5

                    0fa4e3ea2bd866cbe4373aaf364f4e80

                    SHA1

                    b3aa0d84611fa6cf469f9740531dbba07900ed62

                    SHA256

                    4cd9ea75593dd888b7d5bda9cdfb7968cf92595eb01c6fb6dda3e6a961af437e

                    SHA512

                    babb7039753c6cdbe48481527c8e202ac1e66a983d379194dc9d085eaa1dd22704d06dc2a41764610462b52a994e3b284e5e95cdd2c447880294c37fab7c21c1

                  • memory/1616-80-0x0000000005880000-0x0000000005890000-memory.dmp

                    Filesize

                    64KB

                  • memory/1616-79-0x0000000073DC0000-0x0000000074570000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/1616-76-0x0000000005920000-0x000000000595C000-memory.dmp

                    Filesize

                    240KB

                  • memory/1616-75-0x0000000005880000-0x0000000005890000-memory.dmp

                    Filesize

                    64KB

                  • memory/1616-73-0x0000000005810000-0x0000000005816000-memory.dmp

                    Filesize

                    24KB

                  • memory/1616-74-0x0000000073DC0000-0x0000000074570000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/1616-71-0x0000000000F30000-0x0000000000F60000-memory.dmp

                    Filesize

                    192KB

                  • memory/2208-65-0x00000000058F0000-0x00000000059FA000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/2208-72-0x0000000073DC0000-0x0000000074570000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/2208-64-0x0000000005E00000-0x0000000006418000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/2208-78-0x00000000056D0000-0x00000000056E0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2208-67-0x0000000005800000-0x0000000005812000-memory.dmp

                    Filesize

                    72KB

                  • memory/2208-66-0x00000000056D0000-0x00000000056E0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2208-77-0x00000000058A0000-0x00000000058EC000-memory.dmp

                    Filesize

                    304KB

                  • memory/2208-55-0x0000000000400000-0x0000000000430000-memory.dmp

                    Filesize

                    192KB

                  • memory/2208-57-0x0000000073DC0000-0x0000000074570000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/2208-56-0x0000000001570000-0x0000000001576000-memory.dmp

                    Filesize

                    24KB

                  • memory/3904-47-0x0000000000400000-0x000000000042C000-memory.dmp

                    Filesize

                    176KB

                  • memory/3904-49-0x0000000000400000-0x000000000042C000-memory.dmp

                    Filesize

                    176KB

                  • memory/3904-48-0x0000000000400000-0x000000000042C000-memory.dmp

                    Filesize

                    176KB

                  • memory/3904-51-0x0000000000400000-0x000000000042C000-memory.dmp

                    Filesize

                    176KB

                  • memory/4912-60-0x0000000073DC0000-0x0000000074570000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/4912-58-0x0000000073DC0000-0x0000000074570000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/4912-42-0x0000000000400000-0x000000000040A000-memory.dmp

                    Filesize

                    40KB

                  • memory/4912-43-0x0000000073DC0000-0x0000000074570000-memory.dmp

                    Filesize

                    7.7MB