Analysis

  • max time kernel
    293s
  • max time network
    290s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 05:07

General

  • Target

    bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exe

  • Size

    1.9MB

  • MD5

    eaa443f37443cb7221d63e0891243384

  • SHA1

    d3242326b2ac1ae6e9817a49df33c3a79e209aee

  • SHA256

    bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13

  • SHA512

    8405c44c1eea8578224eb6495f689d66e4e2f6503c0bf08d3c111e4e307603a35089649296ebf89b76d339c9517a83133b741c655097a9fe319f25aae1f6afdb

  • SSDEEP

    49152:6YyPZ96v5ohNyPiYPl5A7E2+P75+Zg6RenX1IAhTiz8wPT:kBSPiYNK7mP91/TOQ

Malware Config

Extracted

Family

amadey

Version

8254624243

Botnet

e76b71

C2

http://77.91.77.81

Attributes
  • install_dir

    8254624243

  • install_file

    axplong.exe

  • strings_key

    90049e51fabf09df0d6748e0b271922e

  • url_paths

    /Kiru9gu/index.php

rc4.plain

Extracted

Family

redline

Botnet

newlogs

C2

85.28.47.7:17210

Extracted

Family

stealc

Botnet

ZOV

C2

http://40.86.87.10

Attributes
  • url_path

    /108e010e8f91c38c.php

Extracted

Family

redline

Botnet

newbuild

C2

185.215.113.67:40960

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 9 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 18 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exe
    "C:\Users\Admin\AppData\Local\Temp\bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Users\Admin\AppData\Local\Temp\1000111001\streamer.exe
        "C:\Users\Admin\AppData\Local\Temp\1000111001\streamer.exe"
        3⤵
        • Executes dropped EXE
        PID:2308
      • C:\Users\Admin\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe
        "C:\Users\Admin\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1664
      • C:\Users\Admin\AppData\Local\Temp\1000125001\Freshbuild.exe
        "C:\Users\Admin\AppData\Local\Temp\1000125001\Freshbuild.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2700
        • C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
          "C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe"
          4⤵
          • Executes dropped EXE
          PID:1504
      • C:\Users\Admin\AppData\Local\Temp\1000128001\crypt6.exe
        "C:\Users\Admin\AppData\Local\Temp\1000128001\crypt6.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2640
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 96
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:3000
      • C:\Users\Admin\AppData\Local\Temp\1000130001\newlogs.exe
        "C:\Users\Admin\AppData\Local\Temp\1000130001\newlogs.exe"
        3⤵
        • Executes dropped EXE
        PID:2976
      • C:\Users\Admin\AppData\Local\Temp\1000131001\stealc_zov.exe
        "C:\Users\Admin\AppData\Local\Temp\1000131001\stealc_zov.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:1348
      • C:\Users\Admin\AppData\Local\Temp\1000132001\newbuild.exe
        "C:\Users\Admin\AppData\Local\Temp\1000132001\newbuild.exe"
        3⤵
        • Executes dropped EXE
        PID:1240

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

3
T1552

Credentials In Files

3
T1552.001

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

3
T1082

Collection

Data from Local System

3
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    14fa1dae2bd3ff12a9fb61d4a46709c8

    SHA1

    7d4563d96c31f7e21946b649fa4ecad96cf7b49f

    SHA256

    1b6e7f099333cf0657f242b3bb3d9ac6124672f75fb006a5e14a5135a691293c

    SHA512

    ec0afa29bba501e64ed22b93c06a80d498f8e480b69947bba433885327ee6ab7155f5be182b9e99d0b831c6c8f23f6a53146d2cb5a2569476161db23dc5ceb48

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    179f21c3f04ff4acd61047a98e751ddd

    SHA1

    603a3af574f08c92168c2e1267a694673050e7ba

    SHA256

    35f9f2134376c357bf65035334eb4c87b1957ba6a3aaf3ace6927dc0d0d7056c

    SHA512

    46db0ebcf48a3684f95270b6204e7a6d8a3c369e4b2239b82248ad991c0c78141e6982808b37542593a26a40baddcb840356cbf7f10aaa6bb4e1411bbecdfc73

  • C:\Users\Admin\AppData\Local\Temp\1000111001\streamer.exe
    Filesize

    6.2MB

    MD5

    b9265c31743db2e9698a08df7b0c5e9d

    SHA1

    aa01367b13f827a5773d0781692809ae175bc718

    SHA256

    b2a10d42ed9b902a6a4a40b47da8448c9fa61f268f3ffb37d08bd5f5e213a0af

    SHA512

    1678d62ad17ce27394599f2835f3c1f209f544fdfae4c54034e7da06936768fe487a55811d9f0919018113af50153437ea0631968814910db69df0ffda36a133

  • C:\Users\Admin\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe
    Filesize

    1.2MB

    MD5

    242214131486132e33ceda794d66ca1f

    SHA1

    4ce34fd91f5c9e35b8694007b286635663ef9bf2

    SHA256

    bac402b5749b2da2211db6d2404c1c621ccd0c2e5d492eb6f973b3e2d38dd361

    SHA512

    031e0904d949cec515f2d6f2b5e4b9c0df03637787ff14f20c58e711c54eec77d1f22aa0cf0f6efd65362c1fc0066645d5d005c6a77fe5b169427cdd42555d29

  • C:\Users\Admin\AppData\Local\Temp\1000115001\build.exe
    Filesize

    26KB

    MD5

    d4772d72345f5954d7b861cf083f8a98

    SHA1

    d8c7fe851babf5d1c581fbb8acc086f136bcc621

    SHA256

    f2605302b0acafeaf7fe2a1729e952ae5bf6de60f03b5be4cc35e7e127081543

    SHA512

    03cc77e1839019018c5be3c53adcd16a7709d0b8124e5646453f073cc701c67c5e82ccd53132e45651bd19cff324284bc90ef68d81e4f5c68e3511c61a2d621b

  • C:\Users\Admin\AppData\Local\Temp\1000116001\FILE1.exe
    Filesize

    26KB

    MD5

    dc9594dc1a1a39edfc0ab32584e78089

    SHA1

    8c8437cfdfd4275f4a43e7c9f9efee310a373491

    SHA256

    47fad70877dc21b147e9fcf0582c40e31cb7696db7d91981b518682d11965187

    SHA512

    98ff90c4ea8348a48cc6d41badde653f77ef875092fb54c0ae2aa540abc3e378ca60f1798faa395dba16de2bf89cd2b49c263d0bcf077093928f741768951068

  • C:\Users\Admin\AppData\Local\Temp\1000125001\Freshbuild.exe
    Filesize

    415KB

    MD5

    07101cac5b9477ba636cd8ca7b9932cb

    SHA1

    59ea7fd9ae6ded8c1b7240a4bf9399b4eb3849f1

    SHA256

    488385cd54d14790b03fa7c7dc997ebea3f7b2a8499e5927eb437a3791102a77

    SHA512

    02240ff51a74966bc31cfcc901105096eb871f588efaa9be1a829b4ee6f245bd9dca37be7e2946ba6315feea75c3dce5f490847250e62081445cd25b0f406887

  • C:\Users\Admin\AppData\Local\Temp\1000128001\crypt6.exe
    Filesize

    512KB

    MD5

    a957dc16d684fbd7e12fc87e8ee12fea

    SHA1

    20c73ccfdba13fd9b79c9e02432be39e48e4b37d

    SHA256

    071b6c448d2546dea8caed872fca0d002f59a6b9849f0de2a565fc74b487fa37

    SHA512

    fd6982587fba779d6febb84dfa65ec3e048e17733c2f01b61996bedb170bb4bb1cbb822c0dd2cf44a7e601373abaf499885b13b7957dd2a307bbd8f2120e9b3b

  • C:\Users\Admin\AppData\Local\Temp\1000130001\newlogs.exe
    Filesize

    297KB

    MD5

    0970456d2e2bcb36f49d23f5f2eec4ce

    SHA1

    1e427bbeb209b636371d17801b14fabff87921be

    SHA256

    264db4d677606c95912a93a457675d5ebaa24dc886da8bbcb800fe831c540a54

    SHA512

    43c233e6c6fb20ee5830672f68eec2a1930aff6c3da185b7af56ede90970041157755b8893a86336711c8ba8cbe3f22818de8ddc1789ed65a7aacd596771909e

  • C:\Users\Admin\AppData\Local\Temp\1000131001\stealc_zov.exe
    Filesize

    158KB

    MD5

    253ccac8a47b80287f651987c0c779ea

    SHA1

    11db405849dbaa9b3759de921835df20fab35bc3

    SHA256

    262a400b339deea5089433709ce559d23253e23d23c07595b515755114147e2f

    SHA512

    af40e01bc3d36baf47eba1d5d6406220dfbcc52c6123dd8450e709fed3e72bed82aac6257fa7bdf7dd774f182919a5051e9712b2e7f1329defd0b159cb08385d

  • C:\Users\Admin\AppData\Local\Temp\1000132001\newbuild.exe
    Filesize

    297KB

    MD5

    9ab4de8b2f2b99f009d32aa790cd091b

    SHA1

    a86b16ee4676850bac14c50ee698a39454d0231e

    SHA256

    8a254344702dc6560312a8028e08f844b16804b1fbf4c438c3ca5058d7b65ea1

    SHA512

    a79341ec3407529daa0384de4cac25b665d3b0cb81e52ecada0ebfe37d7616b16da96b47b04f50ce0a6e46d5fced3298a459f78a087c6b6eac4ed444434c5fbe

  • C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
    Filesize

    1.9MB

    MD5

    eaa443f37443cb7221d63e0891243384

    SHA1

    d3242326b2ac1ae6e9817a49df33c3a79e209aee

    SHA256

    bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13

    SHA512

    8405c44c1eea8578224eb6495f689d66e4e2f6503c0bf08d3c111e4e307603a35089649296ebf89b76d339c9517a83133b741c655097a9fe319f25aae1f6afdb

  • C:\Users\Admin\AppData\Local\Temp\Tar398E.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \ProgramData\mozglue.dll
    Filesize

    593KB

    MD5

    c8fd9be83bc728cc04beffafc2907fe9

    SHA1

    95ab9f701e0024cedfbd312bcfe4e726744c4f2e

    SHA256

    ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

    SHA512

    fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

  • \ProgramData\nss3.dll
    Filesize

    2.0MB

    MD5

    1cc453cdf74f31e4d913ff9c10acdde2

    SHA1

    6e85eae544d6e965f15fa5c39700fa7202f3aafe

    SHA256

    ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

    SHA512

    dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

  • \Users\Admin\AppData\Roaming\d3d9.dll
    Filesize

    279KB

    MD5

    8fa26f1e37d3ff7f736fc93d520bc8ab

    SHA1

    ad532e1cb4a1b3cd82c7a85647f8f6dd99833bb1

    SHA256

    6c47da8fbd12f22d7272fbf223e054bf5093c0922d0e8fb7d6289a5913c2e45d

    SHA512

    8a0b53cbc3a20e2f0fd41c486b1af1fbbcf7f2fed9f7368b672a07f25faaa2568bbdbcf0841233ac8c473a4d1dee099e90bf6098a6fa15e44b8526efdafc1287

  • memory/1240-356-0x00000000001A0000-0x00000000001F0000-memory.dmp
    Filesize

    320KB

  • memory/1348-603-0x0000000000960000-0x0000000000B9C000-memory.dmp
    Filesize

    2.2MB

  • memory/1348-340-0x0000000000960000-0x0000000000B9C000-memory.dmp
    Filesize

    2.2MB

  • memory/1348-428-0x0000000061E00000-0x0000000061EF3000-memory.dmp
    Filesize

    972KB

  • memory/1664-242-0x0000000000B50000-0x0000000000C82000-memory.dmp
    Filesize

    1.2MB

  • memory/2212-16-0x0000000007060000-0x0000000007531000-memory.dmp
    Filesize

    4.8MB

  • memory/2212-0-0x00000000010D0000-0x00000000015A1000-memory.dmp
    Filesize

    4.8MB

  • memory/2212-15-0x00000000010D0000-0x00000000015A1000-memory.dmp
    Filesize

    4.8MB

  • memory/2212-9-0x00000000010D0000-0x00000000015A1000-memory.dmp
    Filesize

    4.8MB

  • memory/2212-5-0x00000000010D0000-0x00000000015A1000-memory.dmp
    Filesize

    4.8MB

  • memory/2212-3-0x00000000010D0000-0x00000000015A1000-memory.dmp
    Filesize

    4.8MB

  • memory/2212-2-0x00000000010D1000-0x00000000010FF000-memory.dmp
    Filesize

    184KB

  • memory/2212-1-0x00000000774A0000-0x00000000774A2000-memory.dmp
    Filesize

    8KB

  • memory/2308-225-0x000000013F090000-0x000000013F726000-memory.dmp
    Filesize

    6.6MB

  • memory/2896-613-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-627-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-337-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-339-0x0000000008280000-0x00000000084BC000-memory.dmp
    Filesize

    2.2MB

  • memory/2896-632-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-227-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-611-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-22-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-20-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-19-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-602-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-18-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-605-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-606-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-607-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-608-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-609-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-338-0x0000000008280000-0x00000000084BC000-memory.dmp
    Filesize

    2.2MB

  • memory/2896-426-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-341-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-610-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-614-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-615-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-616-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-617-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-618-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-619-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-620-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-621-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-622-0x0000000008280000-0x00000000084BC000-memory.dmp
    Filesize

    2.2MB

  • memory/2896-623-0x0000000008280000-0x00000000084BC000-memory.dmp
    Filesize

    2.2MB

  • memory/2896-624-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-625-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-626-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-612-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-628-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-629-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-630-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2896-631-0x0000000000D30000-0x0000000001201000-memory.dmp
    Filesize

    4.8MB

  • memory/2976-320-0x00000000002C0000-0x0000000000310000-memory.dmp
    Filesize

    320KB