Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2023, 13:48

General

  • Target

    76668462759315c9354b9422e0550cd3befd34b35f79b87578084dbf44e89dd7.exe

  • Size

    1.0MB

  • MD5

    8cf9c9c7b67e807e54402cd9b72156d6

  • SHA1

    8d7a2f1a648297df4662b97384748a1cc12ce471

  • SHA256

    76668462759315c9354b9422e0550cd3befd34b35f79b87578084dbf44e89dd7

  • SHA512

    26ba97145587d9da7394552bf19a2c094b7c82d1277abe6bcde31c18203a5443dd97d784ad7133ea53ae4289fc55970f42b55de6ca704e59541385fe55c52c3b

  • SSDEEP

    24576:eymwbcojF9LOy+RdRLAn8MFQTi5wfrxIxso:tm3ovLTEdRLE85TjO

Malware Config

Extracted

Family

redline

Botnet

deren

C2

77.91.68.253:19065

Attributes
  • auth_value

    04a169f1fb198bfbeca74d0e06ea2d54

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\76668462759315c9354b9422e0550cd3befd34b35f79b87578084dbf44e89dd7.exe
    "C:\Users\Admin\AppData\Local\Temp\76668462759315c9354b9422e0550cd3befd34b35f79b87578084dbf44e89dd7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9008559.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9008559.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1544
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5771437.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5771437.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4824
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1034378.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1034378.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3996
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0993252.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0993252.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3532
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3012082.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3012082.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5100
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3012082.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3012082.exe
          4⤵
          • Executes dropped EXE
          PID:4812
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3012082.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3012082.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1640
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2340
            • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of UnmapMainImage
              PID:856
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 856 -s 12
                7⤵
                • Program crash
                PID:1276
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8443779.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8443779.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1928
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 856 -ip 856
    1⤵
      PID:2264

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8443779.exe

      Filesize

      284KB

      MD5

      d06a577f392fc6087b57f00fd4397bd8

      SHA1

      0e8bf2f0a29b1bd8bb594c01cddd47f1fd709396

      SHA256

      ed356635fc92429b23328b138de0440d1c914448cdb6b3615298f6a0cd06d980

      SHA512

      40c9e23390cfb1d6997bb09ab8e1f20c7823b660f96da3a2d2eb0955d18f3a5a32c7aa4e6fec91099016633006e61b45e91626a24fd937c010f63d2b0de478ee

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8443779.exe

      Filesize

      284KB

      MD5

      d06a577f392fc6087b57f00fd4397bd8

      SHA1

      0e8bf2f0a29b1bd8bb594c01cddd47f1fd709396

      SHA256

      ed356635fc92429b23328b138de0440d1c914448cdb6b3615298f6a0cd06d980

      SHA512

      40c9e23390cfb1d6997bb09ab8e1f20c7823b660f96da3a2d2eb0955d18f3a5a32c7aa4e6fec91099016633006e61b45e91626a24fd937c010f63d2b0de478ee

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9008559.exe

      Filesize

      751KB

      MD5

      03b55bf3a52416e8395b690e2c5b8054

      SHA1

      1e6a8f820c7775614f8deb35e7e3e3c7b331c690

      SHA256

      cf6be8498426d4b8b619d54da84b6fa960713c48557b9e7aba85b704df00f07b

      SHA512

      6c409b2eaea253b40f533bae822d3df3939587fa546cb3b79d7c5fbe515eb1516d96ed27599ab87a7860165112424d5b337e0bfcf236ccfd7b49ac45eb165419

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9008559.exe

      Filesize

      751KB

      MD5

      03b55bf3a52416e8395b690e2c5b8054

      SHA1

      1e6a8f820c7775614f8deb35e7e3e3c7b331c690

      SHA256

      cf6be8498426d4b8b619d54da84b6fa960713c48557b9e7aba85b704df00f07b

      SHA512

      6c409b2eaea253b40f533bae822d3df3939587fa546cb3b79d7c5fbe515eb1516d96ed27599ab87a7860165112424d5b337e0bfcf236ccfd7b49ac45eb165419

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3012082.exe

      Filesize

      964KB

      MD5

      8749e52680f8ff49934a300059d27e39

      SHA1

      925412dc1ffbef8c40743fe8511b2306b9ccd279

      SHA256

      e290419dcba5b79475d885c07e7c173fc7cb080a9dc879ce47369318948e4502

      SHA512

      7bd529e7f94766189d709fe057f828d1cc1fabf6b8bb227239e97668541ca4cc84fc8d28550d1869bdf30bc41fe01e8af733e4ece4fb55bd6c0f217d976274c5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3012082.exe

      Filesize

      964KB

      MD5

      8749e52680f8ff49934a300059d27e39

      SHA1

      925412dc1ffbef8c40743fe8511b2306b9ccd279

      SHA256

      e290419dcba5b79475d885c07e7c173fc7cb080a9dc879ce47369318948e4502

      SHA512

      7bd529e7f94766189d709fe057f828d1cc1fabf6b8bb227239e97668541ca4cc84fc8d28550d1869bdf30bc41fe01e8af733e4ece4fb55bd6c0f217d976274c5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3012082.exe

      Filesize

      964KB

      MD5

      8749e52680f8ff49934a300059d27e39

      SHA1

      925412dc1ffbef8c40743fe8511b2306b9ccd279

      SHA256

      e290419dcba5b79475d885c07e7c173fc7cb080a9dc879ce47369318948e4502

      SHA512

      7bd529e7f94766189d709fe057f828d1cc1fabf6b8bb227239e97668541ca4cc84fc8d28550d1869bdf30bc41fe01e8af733e4ece4fb55bd6c0f217d976274c5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3012082.exe

      Filesize

      964KB

      MD5

      8749e52680f8ff49934a300059d27e39

      SHA1

      925412dc1ffbef8c40743fe8511b2306b9ccd279

      SHA256

      e290419dcba5b79475d885c07e7c173fc7cb080a9dc879ce47369318948e4502

      SHA512

      7bd529e7f94766189d709fe057f828d1cc1fabf6b8bb227239e97668541ca4cc84fc8d28550d1869bdf30bc41fe01e8af733e4ece4fb55bd6c0f217d976274c5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5771437.exe

      Filesize

      306KB

      MD5

      d75307d64cf693ab06d330a192e60f3e

      SHA1

      1b324f25fc27e956f6d2269d7a7f2350aeffb97c

      SHA256

      230a5a64c316e9171bedb65cafb547707cb917f0905cb3431761b6907c606b8f

      SHA512

      e158f3621b05457e12ddffee968afc1a2cea56b0264cb5a56787d66c3ec72ecb536ff82c39512302088536d1cba0ed9fc3bfa8fa0642a6c243ac77c72588486b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5771437.exe

      Filesize

      306KB

      MD5

      d75307d64cf693ab06d330a192e60f3e

      SHA1

      1b324f25fc27e956f6d2269d7a7f2350aeffb97c

      SHA256

      230a5a64c316e9171bedb65cafb547707cb917f0905cb3431761b6907c606b8f

      SHA512

      e158f3621b05457e12ddffee968afc1a2cea56b0264cb5a56787d66c3ec72ecb536ff82c39512302088536d1cba0ed9fc3bfa8fa0642a6c243ac77c72588486b

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1034378.exe

      Filesize

      145KB

      MD5

      39e4d530dff92680cd70bdb4bb2e0481

      SHA1

      30a11446d7082fc387c6ab440a489adc8328edb8

      SHA256

      9d79cfbdfa0832eedcf1784406848dea4dc78937a8153e27744735dcdb652d85

      SHA512

      8e8662460a4f7065c11bdd427c253d23315db0a9c2e727a6219803b224ee57553256c2adaf5ca79ece423a33689c2c6deaa5f0b3b7c1a7545ece39d16cf4f2f7

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1034378.exe

      Filesize

      145KB

      MD5

      39e4d530dff92680cd70bdb4bb2e0481

      SHA1

      30a11446d7082fc387c6ab440a489adc8328edb8

      SHA256

      9d79cfbdfa0832eedcf1784406848dea4dc78937a8153e27744735dcdb652d85

      SHA512

      8e8662460a4f7065c11bdd427c253d23315db0a9c2e727a6219803b224ee57553256c2adaf5ca79ece423a33689c2c6deaa5f0b3b7c1a7545ece39d16cf4f2f7

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0993252.exe

      Filesize

      184KB

      MD5

      7735b0e09e84c53b90f6f4a9ef7ff854

      SHA1

      e5dfb40458042ee32921b2a22f85777ce09ce4d4

      SHA256

      f2dabe1f23b866885484a4b23be43df7e1fb23e1f0c2c812f8366993a9a64757

      SHA512

      20d117ed5a5c4900671053d6297317ef712f17efc514c3127e26de9df5c8f2ce808466891fb388067c07ee698e319532a764017c16274f66c9a4e1ef339b146a

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0993252.exe

      Filesize

      184KB

      MD5

      7735b0e09e84c53b90f6f4a9ef7ff854

      SHA1

      e5dfb40458042ee32921b2a22f85777ce09ce4d4

      SHA256

      f2dabe1f23b866885484a4b23be43df7e1fb23e1f0c2c812f8366993a9a64757

      SHA512

      20d117ed5a5c4900671053d6297317ef712f17efc514c3127e26de9df5c8f2ce808466891fb388067c07ee698e319532a764017c16274f66c9a4e1ef339b146a

    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

      Filesize

      964KB

      MD5

      8749e52680f8ff49934a300059d27e39

      SHA1

      925412dc1ffbef8c40743fe8511b2306b9ccd279

      SHA256

      e290419dcba5b79475d885c07e7c173fc7cb080a9dc879ce47369318948e4502

      SHA512

      7bd529e7f94766189d709fe057f828d1cc1fabf6b8bb227239e97668541ca4cc84fc8d28550d1869bdf30bc41fe01e8af733e4ece4fb55bd6c0f217d976274c5

    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

      Filesize

      964KB

      MD5

      8749e52680f8ff49934a300059d27e39

      SHA1

      925412dc1ffbef8c40743fe8511b2306b9ccd279

      SHA256

      e290419dcba5b79475d885c07e7c173fc7cb080a9dc879ce47369318948e4502

      SHA512

      7bd529e7f94766189d709fe057f828d1cc1fabf6b8bb227239e97668541ca4cc84fc8d28550d1869bdf30bc41fe01e8af733e4ece4fb55bd6c0f217d976274c5

    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

      Filesize

      964KB

      MD5

      8749e52680f8ff49934a300059d27e39

      SHA1

      925412dc1ffbef8c40743fe8511b2306b9ccd279

      SHA256

      e290419dcba5b79475d885c07e7c173fc7cb080a9dc879ce47369318948e4502

      SHA512

      7bd529e7f94766189d709fe057f828d1cc1fabf6b8bb227239e97668541ca4cc84fc8d28550d1869bdf30bc41fe01e8af733e4ece4fb55bd6c0f217d976274c5

    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

      Filesize

      964KB

      MD5

      8749e52680f8ff49934a300059d27e39

      SHA1

      925412dc1ffbef8c40743fe8511b2306b9ccd279

      SHA256

      e290419dcba5b79475d885c07e7c173fc7cb080a9dc879ce47369318948e4502

      SHA512

      7bd529e7f94766189d709fe057f828d1cc1fabf6b8bb227239e97668541ca4cc84fc8d28550d1869bdf30bc41fe01e8af733e4ece4fb55bd6c0f217d976274c5

    • memory/1640-210-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/1640-304-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/1640-256-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/1640-214-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/1640-213-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/1928-240-0x0000000004990000-0x00000000049CC000-memory.dmp

      Filesize

      240KB

    • memory/1928-248-0x0000000004990000-0x00000000049CC000-memory.dmp

      Filesize

      240KB

    • memory/1928-1151-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/1928-1150-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/1928-1149-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/1928-1148-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/1928-259-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/1928-257-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/1928-250-0x0000000004990000-0x00000000049CC000-memory.dmp

      Filesize

      240KB

    • memory/1928-246-0x0000000004990000-0x00000000049CC000-memory.dmp

      Filesize

      240KB

    • memory/1928-244-0x0000000004990000-0x00000000049CC000-memory.dmp

      Filesize

      240KB

    • memory/1928-242-0x0000000004990000-0x00000000049CC000-memory.dmp

      Filesize

      240KB

    • memory/1928-238-0x0000000004990000-0x00000000049CC000-memory.dmp

      Filesize

      240KB

    • memory/1928-236-0x0000000004990000-0x00000000049CC000-memory.dmp

      Filesize

      240KB

    • memory/1928-234-0x0000000004990000-0x00000000049CC000-memory.dmp

      Filesize

      240KB

    • memory/1928-232-0x0000000004990000-0x00000000049CC000-memory.dmp

      Filesize

      240KB

    • memory/1928-230-0x0000000004990000-0x00000000049CC000-memory.dmp

      Filesize

      240KB

    • memory/1928-228-0x0000000004990000-0x00000000049CC000-memory.dmp

      Filesize

      240KB

    • memory/1928-226-0x0000000004990000-0x00000000049CC000-memory.dmp

      Filesize

      240KB

    • memory/1928-224-0x0000000004990000-0x00000000049CC000-memory.dmp

      Filesize

      240KB

    • memory/1928-222-0x0000000004990000-0x00000000049CC000-memory.dmp

      Filesize

      240KB

    • memory/1928-220-0x0000000004990000-0x00000000049CC000-memory.dmp

      Filesize

      240KB

    • memory/1928-219-0x0000000004990000-0x00000000049CC000-memory.dmp

      Filesize

      240KB

    • memory/2340-339-0x0000000007560000-0x0000000007570000-memory.dmp

      Filesize

      64KB

    • memory/3532-185-0x0000000004970000-0x0000000004986000-memory.dmp

      Filesize

      88KB

    • memory/3532-202-0x0000000004A80000-0x0000000004A90000-memory.dmp

      Filesize

      64KB

    • memory/3532-179-0x0000000004970000-0x0000000004986000-memory.dmp

      Filesize

      88KB

    • memory/3532-181-0x0000000004970000-0x0000000004986000-memory.dmp

      Filesize

      88KB

    • memory/3532-172-0x0000000004970000-0x0000000004986000-memory.dmp

      Filesize

      88KB

    • memory/3532-183-0x0000000004970000-0x0000000004986000-memory.dmp

      Filesize

      88KB

    • memory/3532-173-0x0000000004970000-0x0000000004986000-memory.dmp

      Filesize

      88KB

    • memory/3532-191-0x0000000004970000-0x0000000004986000-memory.dmp

      Filesize

      88KB

    • memory/3532-177-0x0000000004970000-0x0000000004986000-memory.dmp

      Filesize

      88KB

    • memory/3532-187-0x0000000004970000-0x0000000004986000-memory.dmp

      Filesize

      88KB

    • memory/3532-189-0x0000000004970000-0x0000000004986000-memory.dmp

      Filesize

      88KB

    • memory/3532-201-0x0000000004A80000-0x0000000004A90000-memory.dmp

      Filesize

      64KB

    • memory/3532-200-0x0000000004A80000-0x0000000004A90000-memory.dmp

      Filesize

      64KB

    • memory/3532-199-0x0000000004970000-0x0000000004986000-memory.dmp

      Filesize

      88KB

    • memory/3532-197-0x0000000004970000-0x0000000004986000-memory.dmp

      Filesize

      88KB

    • memory/3532-175-0x0000000004970000-0x0000000004986000-memory.dmp

      Filesize

      88KB

    • memory/3532-195-0x0000000004970000-0x0000000004986000-memory.dmp

      Filesize

      88KB

    • memory/3532-193-0x0000000004970000-0x0000000004986000-memory.dmp

      Filesize

      88KB

    • memory/3996-162-0x0000000006990000-0x0000000006F34000-memory.dmp

      Filesize

      5.6MB

    • memory/3996-166-0x0000000007640000-0x0000000007B6C000-memory.dmp

      Filesize

      5.2MB

    • memory/3996-158-0x0000000005750000-0x0000000005760000-memory.dmp

      Filesize

      64KB

    • memory/3996-161-0x0000000006340000-0x00000000063D2000-memory.dmp

      Filesize

      584KB

    • memory/3996-159-0x0000000005480000-0x00000000054BC000-memory.dmp

      Filesize

      240KB

    • memory/3996-160-0x00000000057D0000-0x0000000005836000-memory.dmp

      Filesize

      408KB

    • memory/3996-167-0x0000000005750000-0x0000000005760000-memory.dmp

      Filesize

      64KB

    • memory/3996-156-0x00000000054F0000-0x00000000055FA000-memory.dmp

      Filesize

      1.0MB

    • memory/3996-165-0x0000000006F40000-0x0000000007102000-memory.dmp

      Filesize

      1.8MB

    • memory/3996-164-0x00000000065E0000-0x0000000006630000-memory.dmp

      Filesize

      320KB

    • memory/3996-155-0x0000000005970000-0x0000000005F88000-memory.dmp

      Filesize

      6.1MB

    • memory/3996-163-0x0000000006560000-0x00000000065D6000-memory.dmp

      Filesize

      472KB

    • memory/3996-157-0x0000000005420000-0x0000000005432000-memory.dmp

      Filesize

      72KB

    • memory/3996-154-0x0000000000A50000-0x0000000000A7A000-memory.dmp

      Filesize

      168KB

    • memory/5100-208-0x0000000007350000-0x0000000007360000-memory.dmp

      Filesize

      64KB

    • memory/5100-207-0x0000000000490000-0x0000000000588000-memory.dmp

      Filesize

      992KB