Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-06-2024 22:28

General

  • Target

    my-app-1.0.0.exe

  • Size

    169.1MB

  • MD5

    b43efe56dd3c84590056c8c87ad3e6f4

  • SHA1

    9e490bbec3f132b7eb8ac39dd4d001da8b275b58

  • SHA256

    d851af974512dc132e8931f8a5d9f443af614e7eb45c140fc8c8971dbb960d78

  • SHA512

    0800a75016ba6b81de945aed51cac599b21fc24fd416ed360599f585d95a20781b7fa11cd9d7225a30b544ae768f0a38da1f427a42d406e21024b1a742fcaf74

  • SSDEEP

    1572864:kKrstWwz6PqazPK3qyBcr35JBNLDD/FaCA7pmLMzCOtoAJnn/N0wIbyraIjR:8W0qr26byra

Score
10/10

Malware Config

Signatures

  • Epsilon Stealer

    Information stealer.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Detects videocard installed 1 TTPs 2 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe
    "C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3268
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic bios get smbiosbiosversion
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2792
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
      2⤵
        PID:4212
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic path win32_VideoController get name
          3⤵
          • Detects videocard installed
          PID:4508
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"
        2⤵
          PID:4712
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2268
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "wmic CsProduct Get UUID"
          2⤵
            PID:4640
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic CsProduct Get UUID
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:4656
          • C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe
            "C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\my-app-1.0.0" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1920,i,4545435557772486150,14597101709272767164,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=1912 /prefetch:2
            2⤵
              PID:4292
            • C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe
              "C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\my-app-1.0.0" --field-trial-handle=2344,i,4545435557772486150,14597101709272767164,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2340 /prefetch:3
              2⤵
                PID:1780
              • C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe
                "C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\my-app-1.0.0" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --field-trial-handle=2572,i,4545435557772486150,14597101709272767164,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2568 /prefetch:1
                2⤵
                • Checks computer location settings
                PID:5036
              • C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe
                "C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --user-data-dir="C:\Users\Admin\AppData\Roaming\my-app-1.0.0" --field-trial-handle=3532,i,4545435557772486150,14597101709272767164,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=3548 /prefetch:8
                2⤵
                  PID:2108
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\screenshot.png" "
                  2⤵
                    PID:4276
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /nologo /r:"Microsoft.VisualBasic.dll" /win32manifest:"app.manifest" /out:"screenCapture_1.3.2.exe" "C:\Users\Admin\AppData\Local\Temp\SCREEN~1\SCREEN~1.BAT"
                      3⤵
                        PID:2192
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA7AA.tmp" "c:\Users\Admin\AppData\Local\Temp\screenCapture\CSCABBF24FC297C4168BA4860EFE17DBF25.TMP"
                          4⤵
                            PID:2428
                        • C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe
                          screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\screenshot.png"
                          3⤵
                          • Executes dropped EXE
                          PID:1924
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions""
                        2⤵
                          PID:5068
                          • C:\Windows\system32\reg.exe
                            C:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions"
                            3⤵
                              PID:3928
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKCU\Software\Valve\Steam" /v SteamPath"
                            2⤵
                              PID:1192
                              • C:\Windows\system32\reg.exe
                                C:\Windows\system32\reg.exe QUERY "HKCU\Software\Valve\Steam" /v SteamPath
                                3⤵
                                  PID:4964
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /d /s /c "wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List"
                                2⤵
                                  PID:1800
                                  • C:\Windows\System32\Wbem\WMIC.exe
                                    wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List
                                    3⤵
                                      PID:1968
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                                    2⤵
                                      PID:1136
                                      • C:\Windows\System32\Wbem\WMIC.exe
                                        wmic path win32_VideoController get name
                                        3⤵
                                        • Detects videocard installed
                                        PID:672
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /d /s /c "cmd /c chcp 65001>nul && netsh wlan show profiles"
                                      2⤵
                                        PID:2964
                                        • C:\Windows\system32\cmd.exe
                                          cmd /c chcp 65001
                                          3⤵
                                            PID:1476
                                            • C:\Windows\system32\chcp.com
                                              chcp 65001
                                              4⤵
                                                PID:2260
                                            • C:\Windows\system32\netsh.exe
                                              netsh wlan show profiles
                                              3⤵
                                                PID:2704
                                            • C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe
                                              "C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\my-app-1.0.0" --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3732,i,4545435557772486150,14597101709272767164,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=3396 /prefetch:8
                                              2⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:1388
                                          • C:\Windows\system32\AUDIODG.EXE
                                            C:\Windows\system32\AUDIODG.EXE 0x4f8 0x510
                                            1⤵
                                              PID:2312

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Temp\501e705b-e6dc-4f75-bfaa-804a8026a66b.tmp.node

                                              Filesize

                                              1.6MB

                                              MD5

                                              1e5b6635e09e662d01e9a97c69f1cc27

                                              SHA1

                                              08e3a9e35940ee1ecd37ad762909529c64bc04b5

                                              SHA256

                                              b440ea84c0814e48b20433a8046087b997ab988eef9aacef896a4fd490150c6b

                                              SHA512

                                              1a7f835a51b62d5b512a2008830861bfb3892aa349379e3334c9c8aa5808ac5dd9dfcc5fb2c05736474ca5728347003a60e234e4044dc79d688ab35168b4bbc8

                                            • C:\Users\Admin\AppData\Local\Temp\RESA7AA.tmp

                                              Filesize

                                              1KB

                                              MD5

                                              852e3eada43fcee1d9abb02ae54df6ec

                                              SHA1

                                              3f439e2cc6a8a585ad35bf48455c0933c75df4f3

                                              SHA256

                                              b66411bb02a83f2d863defc324b624d9030e772ea02a4c0e8c0a65d6b1d4d230

                                              SHA512

                                              d5d7487a4b55d8b0c62989abccf3761891bca2e19886df289ef4e1b299e0b5a72eba9d86c7a171ef64bc197d1aad5b9081e0a3b4719c26d031a9a4ea8058765e

                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ci4d5ek1.z20.ps1

                                              Filesize

                                              60B

                                              MD5

                                              d17fe0a3f47be24a6453e9ef58c94641

                                              SHA1

                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                              SHA256

                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                              SHA512

                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                            • C:\Users\Admin\AppData\Local\Temp\bfaa04fb-11e8-45d0-84d0-233dd4bd4f56.tmp.node

                                              Filesize

                                              2.2MB

                                              MD5

                                              8b0ee0b40dc18dd5638c45dd2299ae65

                                              SHA1

                                              83a8b245a64332225d8762d18f661c88df0c4968

                                              SHA256

                                              808ab5e0ca0fb3818e65ed7e689b4b92fbeda82656c9cd714eeede27445c0b4c

                                              SHA512

                                              738d9f92b01df49713122cd5ba6b037b80f4364711c321c348f82bb6efbfa0787575c7594e573e2d26f7aba7dc46b938e8525c113d9dc59d2a5c17ba3d4358ef

                                            • C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\AutoFill Data\All Autofill Data.txt

                                              Filesize

                                              1KB

                                              MD5

                                              698a35da81736fce6e1521788d24f28c

                                              SHA1

                                              9e5ea5f4de84582507b8081e3e8d51b2972333b3

                                              SHA256

                                              b2d8ddde8a147f931cf5ba65a4afd3ca582107aca8c163b5427b17af9b3a0886

                                              SHA512

                                              09d2bed13c87d3ffcb55a3417de69830d141900289059d601a7a32cbdedd740ad9d239b29e747485efbf70741c03bd9d72b9324b9f0b18c53d5ddb669569b91d

                                            • C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\Credit Cards\All Credit Cards.txt

                                              Filesize

                                              1KB

                                              MD5

                                              9ef0cbfa739a8cd4daa50041e13da0b6

                                              SHA1

                                              f8f96c8ddae556e86c65b14ec96976eb2b11db55

                                              SHA256

                                              168781455be4ffbca7bd2ae3c0b765a5953f52fdf0d8e56f7d817630ae27be21

                                              SHA512

                                              afc76f3026b64041e5d964d6445f627c69b9ad6c2db479f02d157d764e57176ec469ca85226ef3bb22871e00d6ee771f2a4fd2f674aed933f83b03d146bb6e73

                                            • C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\screenshot.png

                                              Filesize

                                              422KB

                                              MD5

                                              86dfad3def649c26cdcbfbe15c148fb5

                                              SHA1

                                              5080a7a55b20aebb0ffb38f4d847de3b607b2c44

                                              SHA256

                                              d02e6a44a0140f5a20880431213aa4dd901d395ed45996d96ac595db62539efb

                                              SHA512

                                              23b4be99dbd00d851741b8f2ab9defad1458be86a8d4213ba3fbf054555f2ccc0de7ca190f250753a0a8bff4c3a1cac16a37334906b1bccaef485900ef82a42b

                                            • C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat

                                              Filesize

                                              13KB

                                              MD5

                                              da0f40d84d72ae3e9324ad9a040a2e58

                                              SHA1

                                              4ca7f6f90fb67dce8470b67010aa19aa0fd6253f

                                              SHA256

                                              818350a4fb4146072a25f0467c5c99571c854d58bec30330e7db343bceca008b

                                              SHA512

                                              30b7d4921f39c2601d94a3e3bb0e3be79b4b7b505e52523d2562f2e2f32154d555a593df87a71cddb61b98403265f42e0d6705950b37a155dc1d64113c719fd9

                                            • C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

                                              Filesize

                                              12KB

                                              MD5

                                              23be370018e15a12219ffe800a991f20

                                              SHA1

                                              f73fd53faee6b2679e516cebf1307f0ae6bd7034

                                              SHA256

                                              e5c520d1804f5061c2ccc7e2aa09bf31ecc427d40240028cc8c4bbf24f125c3f

                                              SHA512

                                              c1e95a12e32031ce1bbeabe97985f08f52adc09e3d992190ae26f5aef21c6cb1115def93200f95e197bbba4eecacee53b3b76c0a5d52186f856b6bfd7713e4ce

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

                                              Filesize

                                              2B

                                              MD5

                                              f3b25701fe362ec84616a93a45ce9998

                                              SHA1

                                              d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                              SHA256

                                              b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                              SHA512

                                              98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                            • C:\Users\Admin\AppData\Roaming\my-app-1.0.0\Network\Network Persistent State

                                              Filesize

                                              300B

                                              MD5

                                              fef5bc6e982e344d11228b41f6b0bfc8

                                              SHA1

                                              3ff16e5180bbcb7f34e188c626236cbb4668de8c

                                              SHA256

                                              2c211297a0d6dce1379f3645a4ff29214ec314967def4b159a2c3fb094cea588

                                              SHA512

                                              ba2c3ebb6bfe5646bb7f63df4409991ad2e7e77bdf8fcbda96f76db5afa2128448ae7f301f580ebbb492344ba2dd9f9f306d83df766fc2365e28dd8fb08b481a

                                            • C:\Users\Admin\AppData\Roaming\my-app-1.0.0\Network\Network Persistent State~RFe58c89a.TMP

                                              Filesize

                                              59B

                                              MD5

                                              2800881c775077e1c4b6e06bf4676de4

                                              SHA1

                                              2873631068c8b3b9495638c865915be822442c8b

                                              SHA256

                                              226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                              SHA512

                                              e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                                            • \??\c:\Users\Admin\AppData\Local\Temp\screenCapture\CSCABBF24FC297C4168BA4860EFE17DBF25.TMP

                                              Filesize

                                              1KB

                                              MD5

                                              a6f2d21624678f54a2abed46e9f3ab17

                                              SHA1

                                              a2a6f07684c79719007d434cbd1cd2164565734a

                                              SHA256

                                              ab96911d094b6070cbfb48e07407371ddb41b86e36628b6a10cdb11478192344

                                              SHA512

                                              0b286df41c3887eecff5c38cbd6818078313b555ef001151b41ac11b80466b2f4f39da518ab9c51eeff35295cb39d52824de13e026c35270917d7274f764c676

                                            • \??\c:\Users\Admin\AppData\Local\Temp\screenCapture\app.manifest

                                              Filesize

                                              350B

                                              MD5

                                              8951565428aa6644f1505edb592ab38f

                                              SHA1

                                              9c4bee78e7338f4f8b2c8b6c0e187f43cfe88bf2

                                              SHA256

                                              8814db9e125d0c2b7489f8c7c3e95adf41f992d4397ed718bda8573cb8fb0e83

                                              SHA512

                                              7577bad37b67bf13a0d7f9b8b7d6c077ecdfb81a5bee94e06dc99e84cb20db2d568f74d1bb2cef906470b4f6859e00214beacca7d82e2b99126d27820bf3b8f5

                                            • memory/1388-211-0x0000014CC71C0000-0x0000014CC71C1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/1388-212-0x0000014CC71C0000-0x0000014CC71C1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/1388-213-0x0000014CC71C0000-0x0000014CC71C1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/1388-214-0x0000014CC71C0000-0x0000014CC71C1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/1388-215-0x0000014CC71C0000-0x0000014CC71C1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/1388-216-0x0000014CC71C0000-0x0000014CC71C1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/1388-205-0x0000014CC71C0000-0x0000014CC71C1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/1388-207-0x0000014CC71C0000-0x0000014CC71C1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/1388-206-0x0000014CC71C0000-0x0000014CC71C1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/1388-217-0x0000014CC71C0000-0x0000014CC71C1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/1924-133-0x0000000000240000-0x000000000024A000-memory.dmp

                                              Filesize

                                              40KB

                                            • memory/2268-76-0x000001CE55F00000-0x000001CE55F22000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/5036-20-0x00007FFE673E0000-0x00007FFE673E1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/5036-19-0x00007FFE68140000-0x00007FFE68141000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/5036-172-0x000001C7E94A0000-0x000001C7E954D000-memory.dmp

                                              Filesize

                                              692KB

                                            • memory/5036-173-0x000001C7E9AF0000-0x000001C7E9B9C000-memory.dmp

                                              Filesize

                                              688KB