Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-10-2023 04:01

General

  • Target

    NEAS.857ee6593a4a8c9ba7dd0431f1687f10.exe

  • Size

    778KB

  • MD5

    857ee6593a4a8c9ba7dd0431f1687f10

  • SHA1

    3566f8277377af1b7fc229ea0882b176075dda17

  • SHA256

    a4388ed26dcfcb14e6028261cf15a25f797befe5bd9e2208790c2c7f35597c9b

  • SHA512

    d9ae011b609ee65969cf08e4df0c6ba9ba636e04511d7514c58bc33cbf18ea2dcd41d8666333efbed91d1f5812458aa4b1ff3c710d3b7739894dc7636f232c26

  • SSDEEP

    12288:FMrZy90Xhf42ls2loWbKnjhLFeIgFN5etNUfNRjy6o2q7+azsgeZBnwD:Yyef42dbsV8pFNAN2y6oHHzsPZBn2

Malware Config

Extracted

Family

redline

Botnet

gruha

C2

77.91.124.55:19071

Attributes
  • auth_value

    2f4cf2e668a540e64775b27535cc6892

Extracted

Family

amadey

Version

3.89

C2

http://77.91.68.52/mac/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explonde.exe

  • strings_key

    916aae73606d7a9e02a1d3b47c199688

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Mystic stealer payload 4 IoCs
  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.857ee6593a4a8c9ba7dd0431f1687f10.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.857ee6593a4a8c9ba7dd0431f1687f10.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4788
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9977147.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9977147.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5253270.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5253270.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3424
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q0959879.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q0959879.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2284
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1536
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 556
            5⤵
            • Program crash
            PID:5060
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r6488514.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r6488514.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1456
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
              PID:4328
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              5⤵
                PID:1648
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                5⤵
                  PID:4404
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 540
                    6⤵
                    • Program crash
                    PID:4200
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 600
                  5⤵
                  • Program crash
                  PID:4172
            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s5856733.exe
              C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s5856733.exe
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4796
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                4⤵
                  PID:3936
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 552
                  4⤵
                  • Program crash
                  PID:3012
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t3557832.exe
              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t3557832.exe
              2⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3972
              • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"
                3⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:3096
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F
                  4⤵
                  • Creates scheduled task(s)
                  PID:4928
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1236
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    5⤵
                      PID:3672
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "explonde.exe" /P "Admin:N"
                      5⤵
                        PID:3304
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "explonde.exe" /P "Admin:R" /E
                        5⤵
                          PID:1412
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\fefffe8cea" /P "Admin:N"
                          5⤵
                            PID:548
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                            5⤵
                              PID:3516
                            • C:\Windows\SysWOW64\cacls.exe
                              CACLS "..\fefffe8cea" /P "Admin:R" /E
                              5⤵
                                PID:4824
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2284 -ip 2284
                        1⤵
                          PID:2540
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1456 -ip 1456
                          1⤵
                            PID:1736
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4404 -ip 4404
                            1⤵
                              PID:4684
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4796 -ip 4796
                              1⤵
                                PID:2580
                              • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                                C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                                1⤵
                                • Executes dropped EXE
                                PID:4572
                              • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                                C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                                1⤵
                                • Executes dropped EXE
                                PID:4640
                              • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                                C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                                1⤵
                                • Executes dropped EXE
                                PID:3492

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t3557832.exe

                                Filesize

                                219KB

                                MD5

                                c256a814d3f9d02d73029580dfe882b3

                                SHA1

                                e11e9ea937183139753f3b0d5e71c8301d000896

                                SHA256

                                53f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c

                                SHA512

                                1f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a

                              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t3557832.exe

                                Filesize

                                219KB

                                MD5

                                c256a814d3f9d02d73029580dfe882b3

                                SHA1

                                e11e9ea937183139753f3b0d5e71c8301d000896

                                SHA256

                                53f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c

                                SHA512

                                1f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a

                              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9977147.exe

                                Filesize

                                595KB

                                MD5

                                638afe8a228c599dc8962eab569218a9

                                SHA1

                                5536ac64a7d0dc3d7db2f37334a70d1a77a68684

                                SHA256

                                6e6998c389cc1beaf3c466886a762cc58edc8f790ec3ff207f8736356377305f

                                SHA512

                                d146d5a923bdc110b563eb1c7a32c4e41b78255b14019563d140200a6c31113530782f39a325524f4f8799096eab144e7e494a797495a6627d422520a35ccb4e

                              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9977147.exe

                                Filesize

                                595KB

                                MD5

                                638afe8a228c599dc8962eab569218a9

                                SHA1

                                5536ac64a7d0dc3d7db2f37334a70d1a77a68684

                                SHA256

                                6e6998c389cc1beaf3c466886a762cc58edc8f790ec3ff207f8736356377305f

                                SHA512

                                d146d5a923bdc110b563eb1c7a32c4e41b78255b14019563d140200a6c31113530782f39a325524f4f8799096eab144e7e494a797495a6627d422520a35ccb4e

                              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s5856733.exe

                                Filesize

                                384KB

                                MD5

                                cf4c53766a890f2f03e90dc88a6942bd

                                SHA1

                                0cadb1d53ecbe3558cbc530d5d0d8341d2351477

                                SHA256

                                1f6821be974641c24b51996283183804a7a267e140e2297187b0104c615998dc

                                SHA512

                                3d9579f81c1ca58d57e838f3358ca087c5450249cfbe22f17950b7a047f7182d432a3d8b6cb1abfddacd6de9ea55f400c247d93d127ab8c48201e1785909bced

                              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s5856733.exe

                                Filesize

                                384KB

                                MD5

                                cf4c53766a890f2f03e90dc88a6942bd

                                SHA1

                                0cadb1d53ecbe3558cbc530d5d0d8341d2351477

                                SHA256

                                1f6821be974641c24b51996283183804a7a267e140e2297187b0104c615998dc

                                SHA512

                                3d9579f81c1ca58d57e838f3358ca087c5450249cfbe22f17950b7a047f7182d432a3d8b6cb1abfddacd6de9ea55f400c247d93d127ab8c48201e1785909bced

                              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5253270.exe

                                Filesize

                                334KB

                                MD5

                                7a290e7f4c9dbd9dc4d69db89129c193

                                SHA1

                                5f44352d6a4fc21cdcbf9e72ab1e8903a566b7e7

                                SHA256

                                d0f11c9a6341eb9a396566e0e62f69ccfeaafeaececcb5b453fff186cd153a19

                                SHA512

                                bb38fa44f5393179027fc56f86e10f2cb07f6161801444134e6b20efa1a66692014ac3756a203b4caf41b60c7cac3db78327d0e013977cd7c0a01cbf1f3f438b

                              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5253270.exe

                                Filesize

                                334KB

                                MD5

                                7a290e7f4c9dbd9dc4d69db89129c193

                                SHA1

                                5f44352d6a4fc21cdcbf9e72ab1e8903a566b7e7

                                SHA256

                                d0f11c9a6341eb9a396566e0e62f69ccfeaafeaececcb5b453fff186cd153a19

                                SHA512

                                bb38fa44f5393179027fc56f86e10f2cb07f6161801444134e6b20efa1a66692014ac3756a203b4caf41b60c7cac3db78327d0e013977cd7c0a01cbf1f3f438b

                              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q0959879.exe

                                Filesize

                                221KB

                                MD5

                                a70ad996a7fcdcd6873616bad13b509b

                                SHA1

                                8ab0dc80465766fc844efa751d11d3b720be9eb3

                                SHA256

                                f10eabb85cd0a3f37f3d3f7eb327ded8cb852d6af2a90115b157ec0c0580061a

                                SHA512

                                a59ed552d36b03a519371ad123a8570e68e193ca9471bd7b4d49de05a8e28d702d533fdc25cca197213e702cb837a1c8054f19b502b0cab16e51137d655df963

                              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q0959879.exe

                                Filesize

                                221KB

                                MD5

                                a70ad996a7fcdcd6873616bad13b509b

                                SHA1

                                8ab0dc80465766fc844efa751d11d3b720be9eb3

                                SHA256

                                f10eabb85cd0a3f37f3d3f7eb327ded8cb852d6af2a90115b157ec0c0580061a

                                SHA512

                                a59ed552d36b03a519371ad123a8570e68e193ca9471bd7b4d49de05a8e28d702d533fdc25cca197213e702cb837a1c8054f19b502b0cab16e51137d655df963

                              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r6488514.exe

                                Filesize

                                350KB

                                MD5

                                dbe3a9c5adc2fa6e3d740f3af55229d4

                                SHA1

                                d2261b09ebe7ec6b55b08cb5e8ef3d338f916d06

                                SHA256

                                929ac805bfdfeff7b7fd9bed61037469ee01cb081af95894cc0fa78ca1507b9b

                                SHA512

                                536a0328acc51d2b16b398598058864f7bc90fe117e96ec9dbcf47329b4e6f3c148a953c3fe310b9fc04981ac1f9e54e744d2feac881db0c6f43adf0dc80c48f

                              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r6488514.exe

                                Filesize

                                350KB

                                MD5

                                dbe3a9c5adc2fa6e3d740f3af55229d4

                                SHA1

                                d2261b09ebe7ec6b55b08cb5e8ef3d338f916d06

                                SHA256

                                929ac805bfdfeff7b7fd9bed61037469ee01cb081af95894cc0fa78ca1507b9b

                                SHA512

                                536a0328acc51d2b16b398598058864f7bc90fe117e96ec9dbcf47329b4e6f3c148a953c3fe310b9fc04981ac1f9e54e744d2feac881db0c6f43adf0dc80c48f

                              • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe

                                Filesize

                                219KB

                                MD5

                                c256a814d3f9d02d73029580dfe882b3

                                SHA1

                                e11e9ea937183139753f3b0d5e71c8301d000896

                                SHA256

                                53f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c

                                SHA512

                                1f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a

                              • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe

                                Filesize

                                219KB

                                MD5

                                c256a814d3f9d02d73029580dfe882b3

                                SHA1

                                e11e9ea937183139753f3b0d5e71c8301d000896

                                SHA256

                                53f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c

                                SHA512

                                1f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a

                              • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe

                                Filesize

                                219KB

                                MD5

                                c256a814d3f9d02d73029580dfe882b3

                                SHA1

                                e11e9ea937183139753f3b0d5e71c8301d000896

                                SHA256

                                53f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c

                                SHA512

                                1f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a

                              • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe

                                Filesize

                                219KB

                                MD5

                                c256a814d3f9d02d73029580dfe882b3

                                SHA1

                                e11e9ea937183139753f3b0d5e71c8301d000896

                                SHA256

                                53f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c

                                SHA512

                                1f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a

                              • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe

                                Filesize

                                219KB

                                MD5

                                c256a814d3f9d02d73029580dfe882b3

                                SHA1

                                e11e9ea937183139753f3b0d5e71c8301d000896

                                SHA256

                                53f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c

                                SHA512

                                1f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a

                              • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe

                                Filesize

                                219KB

                                MD5

                                c256a814d3f9d02d73029580dfe882b3

                                SHA1

                                e11e9ea937183139753f3b0d5e71c8301d000896

                                SHA256

                                53f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c

                                SHA512

                                1f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a

                              • memory/1536-22-0x0000000074200000-0x00000000749B0000-memory.dmp

                                Filesize

                                7.7MB

                              • memory/1536-57-0x0000000074200000-0x00000000749B0000-memory.dmp

                                Filesize

                                7.7MB

                              • memory/1536-55-0x0000000074200000-0x00000000749B0000-memory.dmp

                                Filesize

                                7.7MB

                              • memory/1536-21-0x0000000000400000-0x000000000040A000-memory.dmp

                                Filesize

                                40KB

                              • memory/3936-49-0x0000000004D60000-0x0000000004D70000-memory.dmp

                                Filesize

                                64KB

                              • memory/3936-54-0x000000000A4C0000-0x000000000A50C000-memory.dmp

                                Filesize

                                304KB

                              • memory/3936-48-0x000000000A2E0000-0x000000000A2F2000-memory.dmp

                                Filesize

                                72KB

                              • memory/3936-34-0x0000000000400000-0x0000000000430000-memory.dmp

                                Filesize

                                192KB

                              • memory/3936-42-0x000000000A830000-0x000000000AE48000-memory.dmp

                                Filesize

                                6.1MB

                              • memory/3936-35-0x0000000074200000-0x00000000749B0000-memory.dmp

                                Filesize

                                7.7MB

                              • memory/3936-53-0x000000000A340000-0x000000000A37C000-memory.dmp

                                Filesize

                                240KB

                              • memory/3936-44-0x000000000A3B0000-0x000000000A4BA000-memory.dmp

                                Filesize

                                1.0MB

                              • memory/3936-36-0x00000000071F0000-0x00000000071F6000-memory.dmp

                                Filesize

                                24KB

                              • memory/3936-59-0x0000000004D60000-0x0000000004D70000-memory.dmp

                                Filesize

                                64KB

                              • memory/3936-58-0x0000000074200000-0x00000000749B0000-memory.dmp

                                Filesize

                                7.7MB

                              • memory/4404-28-0x0000000000400000-0x0000000000428000-memory.dmp

                                Filesize

                                160KB

                              • memory/4404-27-0x0000000000400000-0x0000000000428000-memory.dmp

                                Filesize

                                160KB

                              • memory/4404-26-0x0000000000400000-0x0000000000428000-memory.dmp

                                Filesize

                                160KB

                              • memory/4404-30-0x0000000000400000-0x0000000000428000-memory.dmp

                                Filesize

                                160KB