Analysis

  • max time kernel
    149s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-02-2025 14:54

General

  • Target

    https://anonymfile.com/1yOZ1/ratbuilder-by-enwyry.rar

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTM0MjgyOTkzMTY3OTQ1MzIzNA.G9G3LT.--9Pc4c80bfAzsV_x7j4dUjz1am-i9VHnHWs0Q

  • server_id

    1342829779400786014

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Discordrat family
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Checks SCSI registry key(s) 3 TTPs 7 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 63 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://anonymfile.com/1yOZ1/ratbuilder-by-enwyry.rar
    1⤵
    • Checks SCSI registry key(s)
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4924
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff90d50cc40,0x7ff90d50cc4c,0x7ff90d50cc58
      2⤵
        PID:2824
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1916,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1908 /prefetch:2
        2⤵
          PID:4352
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2160 /prefetch:3
          2⤵
            PID:1212
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2448 /prefetch:8
            2⤵
              PID:1016
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3148 /prefetch:1
              2⤵
                PID:2052
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3120,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3184 /prefetch:1
                2⤵
                  PID:4836
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4548,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4456 /prefetch:1
                  2⤵
                    PID:2724
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4928,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4900 /prefetch:1
                    2⤵
                      PID:1996
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4536,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4720 /prefetch:1
                      2⤵
                        PID:1076
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=3824,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4892 /prefetch:1
                        2⤵
                          PID:3540
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4560,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4704 /prefetch:1
                          2⤵
                            PID:1360
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5100,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5088 /prefetch:1
                            2⤵
                              PID:4664
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4708,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4916 /prefetch:1
                              2⤵
                                PID:1128
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4604,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4760 /prefetch:8
                                2⤵
                                  PID:2724
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5496,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=6088 /prefetch:8
                                  2⤵
                                    PID:2392
                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                  1⤵
                                    PID:2704
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                    1⤵
                                      PID:1092
                                    • C:\Windows\system32\OpenWith.exe
                                      C:\Windows\system32\OpenWith.exe -Embedding
                                      1⤵
                                      • Modifies registry class
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2312
                                    • C:\Windows\System32\rundll32.exe
                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                      1⤵
                                        PID:4756
                                      • C:\Windows\System32\rundll32.exe
                                        C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {c82192ee-6cb5-4bc0-9ef0-fb818773790a} -Embedding
                                        1⤵
                                          PID:2656
                                        • C:\Program Files\7-Zip\7zG.exe
                                          "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\New folder\" -an -ai#7zMap1112:122:7zEvent17642
                                          1⤵
                                          • Suspicious use of FindShellTrayWindow
                                          PID:1700
                                        • C:\Users\Admin\Desktop\New folder\RATbuilder by @enwyry.exe
                                          "C:\Users\Admin\Desktop\New folder\RATbuilder by @enwyry.exe"
                                          1⤵
                                          • Executes dropped EXE
                                          PID:4556
                                        • C:\Windows\system32\taskmgr.exe
                                          "C:\Windows\system32\taskmgr.exe" /4
                                          1⤵
                                          • Checks SCSI registry key(s)
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of FindShellTrayWindow
                                          • Suspicious use of SendNotifyMessage
                                          PID:4416
                                        • C:\Windows\system32\NOTEPAD.EXE
                                          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\New Text Document.txt
                                          1⤵
                                            PID:212

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\3580f7c1-2de7-4967-b758-fb524f408e97.tmp

                                            Filesize

                                            123KB

                                            MD5

                                            7c1df77912e625e76b29435465f840af

                                            SHA1

                                            06f1f54fef841d506429a84a0f90e4593de526ab

                                            SHA256

                                            e82b797e3e86503aac5eeaf5afbc7ab1d46ee1e02cdf09c9fb61852ce74b786c

                                            SHA512

                                            6e4e92a613b74908fab413279ca4fedc661f5f4ba73a52648fc9a6650c4e7f3f398a5d518222dc11a7a6c58f6b789e9cab6c29197e5e89494621db2c0dd8e2a8

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                            Filesize

                                            624B

                                            MD5

                                            70b3a702037a397233be26d3a26e6028

                                            SHA1

                                            6544630603351b7e8864a9b862885ef6f9441f3a

                                            SHA256

                                            00ac9115734084584a563f2e3c6d3e6040f551f0ab7ae41a7ac254dc745688e8

                                            SHA512

                                            0547922ad01afded29d774af7191a6320e5895268661c6af57da8ca1b4d783c240917a3433c37069b7f2648cc0f1cdebf87de80892625996e6821231384270ee

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                            Filesize

                                            6KB

                                            MD5

                                            8a669248fc3beb57ec3cecd86ad9d098

                                            SHA1

                                            cefd0326db29f7ebf7858dea25e1e24d9001d3c7

                                            SHA256

                                            4cf6202aa23bd4726b5e78e8eb79b79fab3c756ed373f407e487c79a20521dff

                                            SHA512

                                            b2d0ff26ddbdb4d6b2ac812760ed84a7c2e3b52d0827214e8b444e2e44235318c6cda3f5f539fbdb892b02cfd7c52588b075305f764cfd8f44e909581767024a

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                            Filesize

                                            2B

                                            MD5

                                            d751713988987e9331980363e24189ce

                                            SHA1

                                            97d170e1550eee4afc0af065b78cda302a97674c

                                            SHA256

                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                            SHA512

                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                            Filesize

                                            1KB

                                            MD5

                                            e3fc9ff74ce2b8e00bf564d4f0d82797

                                            SHA1

                                            51227acb0dcd95eabc76ad98086b59d17f52cbe1

                                            SHA256

                                            3882958a6d1453af3212e092b3e37e74b9e30a86757a385d57fad063c88762c5

                                            SHA512

                                            7ef531882e848812fbdd0ce6ecfb45b07ea1608c0a0d2f0ccabcbaeb7fa849bf795cff69cd43c0202d0b5d0abdad9e2839843cd941feebfd789c478d139b5eef

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                            Filesize

                                            1KB

                                            MD5

                                            8b1c59606da17f8606d771989892cb33

                                            SHA1

                                            cdeb5fdf146b7f123ade741cbc8d2d47ba0cc884

                                            SHA256

                                            ce5af8825a34eeeb2871c060e0a91ab8c56fd267bc5daffc94b45a45986254c7

                                            SHA512

                                            d9cf1bce7e73c479fe9c1a35609b82d9db6814dfe566b4e84b24200be409cc4e433a073125e6c5b5d5c27c5f12950a90421ee1cc2bb4d78bd86061332866c774

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            11KB

                                            MD5

                                            a206ae0dd9a17b94f61e3792c6b4835d

                                            SHA1

                                            1b41ce7fb5ed7f04e297d76b0c6632d56a8b5181

                                            SHA256

                                            d0023a5b6976f7cd7805606d455f880c65babbb1a8adc9c05e509a89470f0fb3

                                            SHA512

                                            e396cb5ca85d408337f3a400e45d723fd362caf5538eb3e4dedade389ae9b64e30b1e6ce334c8987ef790fc7f43256ac00081f9f23ff4b625130ae49e3eff8c7

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            10KB

                                            MD5

                                            8b8b5b7812ef89ba3f01cfde473232f3

                                            SHA1

                                            ee207f5e312ce5b74af55c6a3f68c65b3a3c2622

                                            SHA256

                                            3989855f18dfa4ac06f0be4169130e67e5f3f94ee5cc3cf6d55e6878463c5a97

                                            SHA512

                                            d36cd6068bba7c2713418fa9fe3692d7763148ff5d7381cd84e005ff323ccd83d10e889ec17ad44c13d6f41e26150f52eec04526b72d6af4d8f2ff0b2a5bd82e

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            12KB

                                            MD5

                                            4547d250071e3b68fd44677ce94d07c6

                                            SHA1

                                            c1d66c4bbafdd6980ba5e498057218d6a27fb1b9

                                            SHA256

                                            147d5df4f2de108249f56251cd92ce04d88f08e85726a6590f75259a1ee4991c

                                            SHA512

                                            9dffe9cd4d2ff60e34a88c1130734efeb8c2183b4c966682a0b4d5c1eb050311eb844a9c437c5fde6d78f435826d71fd82c0932fbd8f6e47daa89c8585db8ef8

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                            Filesize

                                            123KB

                                            MD5

                                            f03b7becf3c6dfbd707ca351fcd155e1

                                            SHA1

                                            69bb39a0936f576999f80244f0dd7b3772adb645

                                            SHA256

                                            4e07b277244e3bd3e625b422a4369552226859282ce42f24f05091a81a31f554

                                            SHA512

                                            9bf2fae497c20c2648061e3ee05c346c6db1265b888976e8d144dfb936f63dd26a37afb228cc4de6c28bd1c01821e93aecd8e2fc7734f909ac80fc5a3a72a323

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                            Filesize

                                            123KB

                                            MD5

                                            fe4d3cda7e7820f527afee98cba3b35e

                                            SHA1

                                            e2bc5d682770cbf37334470a9cb7f847980f2f9c

                                            SHA256

                                            e0cf1db802d32d99f5e8f594a343715946e94fad938193b47b3e2b23653d8328

                                            SHA512

                                            b3d9b30b9fb6975a3c92c9f748bbcafcf0e7ef0760344d10d2e3712232dcc2a6a9d2ae71b1c8401afe4e0f36e66f5bf466a1cf14652fc31ea2927c7e78454616

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                            Filesize

                                            264KB

                                            MD5

                                            3df4ea47c476d8a74747c578f771ccc1

                                            SHA1

                                            5f2e014371295f274d2568bf8a10eb55cc45dfb4

                                            SHA256

                                            825a47691cab3c9970fa3e9dfa66e82be1ac5ae057dacff07a26371ee27a2a1b

                                            SHA512

                                            336fa194626c1a8c93ea856eb2d0812afe7a67b40a4d1b85d24d4aa7354602ad06a9790bb0ad9216cb44dcbfa88bfa291e4f5d05daaadd1c53e8ec9c5c3680b0

                                          • C:\Users\Admin\Desktop\New folder\RATbuilder by @enwyry.exe

                                            Filesize

                                            78KB

                                            MD5

                                            fbe87411872d49ad5de921851a0b4c81

                                            SHA1

                                            4ee0b0b9e3ea307af38aaf3489c659bfbb962119

                                            SHA256

                                            47c9a59f46ecfdf52e6f2754c23d564ad2c1365d524f71e78fdaee9ac6292cf8

                                            SHA512

                                            bd0ddef80ecc11042999efba592109f0b6b4d39a150aba8c07875ca3bf865c40b015168b750d736339f088a760c048c89af1060d37b5f84ec424843c14194c2d

                                          • C:\Users\Admin\Downloads\RATbuilder by @enwyry.rar

                                            Filesize

                                            26KB

                                            MD5

                                            27b24058b1643e96a7dd576b4c6529ee

                                            SHA1

                                            138562b2a1f1caa43bbe43561f395ebe5b65f767

                                            SHA256

                                            d6a9f1c1365ac323c37a58ec41e301c927ab5e49c2f0dbe40863bd379d50e555

                                            SHA512

                                            de2d2433d928db99468453318bf7f0c4a10842d32f44d17cdc33a06510a29e084345bb12f30a72e9e7d88d404beb00e8a28ef17e92317be497126d77deb6d5a7

                                          • memory/4416-305-0x000001B9AB920000-0x000001B9AB921000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4416-294-0x000001B9AB920000-0x000001B9AB921000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4416-296-0x000001B9AB920000-0x000001B9AB921000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4416-295-0x000001B9AB920000-0x000001B9AB921000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4416-306-0x000001B9AB920000-0x000001B9AB921000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4416-304-0x000001B9AB920000-0x000001B9AB921000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4416-303-0x000001B9AB920000-0x000001B9AB921000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4416-302-0x000001B9AB920000-0x000001B9AB921000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4416-301-0x000001B9AB920000-0x000001B9AB921000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4416-300-0x000001B9AB920000-0x000001B9AB921000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4556-292-0x000001F428D60000-0x000001F428F22000-memory.dmp

                                            Filesize

                                            1.8MB

                                          • memory/4556-293-0x000001F42A1E0000-0x000001F42A708000-memory.dmp

                                            Filesize

                                            5.2MB

                                          • memory/4556-291-0x000001F40E6E0000-0x000001F40E6F8000-memory.dmp

                                            Filesize

                                            96KB