Analysis

  • max time kernel
    142s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2023 16:28

General

  • Target

    03310099.exe

  • Size

    768KB

  • MD5

    2b71b95d2c53cc8d4789cdad79d152a3

  • SHA1

    92b9a99a9c267f0fcb0de4650b6af0bd4e6dd6b8

  • SHA256

    7d677683133b8c37338ca5fb234350fb7ee3afefa08e0da3ba3ee7cd73bc4a09

  • SHA512

    ff11973381abe2c54e41772fc29f4d9f78d4b7299f1e6a22e45e2ad8d5e19c45770cbfc9287016e14c2ec0a8bf3644e192fa7e2c08b5aa689ae4e6398190b44b

  • SSDEEP

    12288:xMrny900FO0WvhD2y/nwuVyn6nkOOncPVlmZyymBGV7+Q+f5avh2bWsEssEc:my1wFIuVQ6nkOOnEVley6lj+Bo2bQ

Malware Config

Extracted

Family

redline

Botnet

dina

C2

83.97.73.122:19062

Attributes
  • auth_value

    4f77073adc624269de1bff760b9bc471

Extracted

Family

redline

Botnet

fash

C2

83.97.73.122:19062

Attributes
  • auth_value

    dd7165bcd22b0ed3df426d944e12f136

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03310099.exe
    "C:\Users\Admin\AppData\Local\Temp\03310099.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:368
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6647112.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6647112.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5478998.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5478998.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4880
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5553913.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5553913.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4328
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3708
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5765158.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5765158.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2916
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m2165821.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m2165821.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4548
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3216
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:2612
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3520
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:2776
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:1700
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:3764
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:3688
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:1456
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:764
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:1044
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4325322.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4325322.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:4244
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4300
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:3800
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:3696
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:4780

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                226B

                MD5

                916851e072fbabc4796d8916c5131092

                SHA1

                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                SHA256

                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                SHA512

                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4325322.exe

                Filesize

                322KB

                MD5

                998fff5f7329aa9b02a9c6acb06ef45e

                SHA1

                fd8b63071e15e028a7fe0315c17876f337b94f1b

                SHA256

                6a9e0d56f56a353adf88a28e500d792b929e726dfdd64f643b52108a2fe24c45

                SHA512

                c68a7e8f2b278e6b9e2e4a9763406ff8e9f8f4d5e1e53cb80f9550c729813393b47e230a53a70accc4792b35e14cca79053f4cb8a1e98f0cd30372766c9cf67c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4325322.exe

                Filesize

                322KB

                MD5

                998fff5f7329aa9b02a9c6acb06ef45e

                SHA1

                fd8b63071e15e028a7fe0315c17876f337b94f1b

                SHA256

                6a9e0d56f56a353adf88a28e500d792b929e726dfdd64f643b52108a2fe24c45

                SHA512

                c68a7e8f2b278e6b9e2e4a9763406ff8e9f8f4d5e1e53cb80f9550c729813393b47e230a53a70accc4792b35e14cca79053f4cb8a1e98f0cd30372766c9cf67c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6647112.exe

                Filesize

                448KB

                MD5

                2d9fb37de0868ede13bd89c4f7216b05

                SHA1

                f23d3bc45cface09d7c370c614b2b3e36a9b9803

                SHA256

                8bafa8d76e62e914a0b05bdae2d3de9eaaae1c8d8e9b6b560dd51e421a8220be

                SHA512

                2ba1ff0fada46e023c8cc150646835d10c3867d37407dfb5549a89fc98d63d9055d3b925ccb12b4a3b1343666dcab0c1de782d77e8c12b6eadc0b3eec63b1bad

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6647112.exe

                Filesize

                448KB

                MD5

                2d9fb37de0868ede13bd89c4f7216b05

                SHA1

                f23d3bc45cface09d7c370c614b2b3e36a9b9803

                SHA256

                8bafa8d76e62e914a0b05bdae2d3de9eaaae1c8d8e9b6b560dd51e421a8220be

                SHA512

                2ba1ff0fada46e023c8cc150646835d10c3867d37407dfb5549a89fc98d63d9055d3b925ccb12b4a3b1343666dcab0c1de782d77e8c12b6eadc0b3eec63b1bad

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m2165821.exe

                Filesize

                205KB

                MD5

                79febde2fb6e01f7147ebc9412a11919

                SHA1

                014c3c69c477246ad20ef8585dbd260ac927cb4d

                SHA256

                ff975304386d17b324a97af8dc9898a5bd27459e9ffe0564f02c2b26ec43cd06

                SHA512

                9d3325d5725dff56aeacb9b5ddc14c9231fc1d06be4d44ba7d2a03fa0b168460810352fcec7afc2d649a260d0f5b226261cd4a2ee64fe946f3f55d91e9455f69

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m2165821.exe

                Filesize

                205KB

                MD5

                79febde2fb6e01f7147ebc9412a11919

                SHA1

                014c3c69c477246ad20ef8585dbd260ac927cb4d

                SHA256

                ff975304386d17b324a97af8dc9898a5bd27459e9ffe0564f02c2b26ec43cd06

                SHA512

                9d3325d5725dff56aeacb9b5ddc14c9231fc1d06be4d44ba7d2a03fa0b168460810352fcec7afc2d649a260d0f5b226261cd4a2ee64fe946f3f55d91e9455f69

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5478998.exe

                Filesize

                277KB

                MD5

                65548d233218d2be6200f8d6f403d5bf

                SHA1

                77e963619b51782b89f240ee53c4931d212cc95a

                SHA256

                f43522d6822b86feba3a746a1c4f7fc5f9d75247271a190812126d95d657ed42

                SHA512

                5d272a4fa486c2c38a0ea3d14d9251c21e4d4f13cfbb3dfac4a399c987730bf88dd368de96845fef9f777af83981bfa2ac3bc6489a945c178c24b5028267fbc5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5478998.exe

                Filesize

                277KB

                MD5

                65548d233218d2be6200f8d6f403d5bf

                SHA1

                77e963619b51782b89f240ee53c4931d212cc95a

                SHA256

                f43522d6822b86feba3a746a1c4f7fc5f9d75247271a190812126d95d657ed42

                SHA512

                5d272a4fa486c2c38a0ea3d14d9251c21e4d4f13cfbb3dfac4a399c987730bf88dd368de96845fef9f777af83981bfa2ac3bc6489a945c178c24b5028267fbc5

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5553913.exe

                Filesize

                188KB

                MD5

                6a1a3e023ff33dd044f0bc4b996852be

                SHA1

                449bf6f208caed9ed4858ede8936289ee33ade86

                SHA256

                e00fd20292d677e9499dc3b52e064ece9ae6ff99eb06f805942f73a3d5bf82a6

                SHA512

                1dd5eb8e4e356ab2e8f8cf9ecf03fdabd829c57514920210c5703a3b061df928c64a43bd144092445f134f9111368878f82dc3083131bd7dd981b7d3c3e21be9

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5553913.exe

                Filesize

                188KB

                MD5

                6a1a3e023ff33dd044f0bc4b996852be

                SHA1

                449bf6f208caed9ed4858ede8936289ee33ade86

                SHA256

                e00fd20292d677e9499dc3b52e064ece9ae6ff99eb06f805942f73a3d5bf82a6

                SHA512

                1dd5eb8e4e356ab2e8f8cf9ecf03fdabd829c57514920210c5703a3b061df928c64a43bd144092445f134f9111368878f82dc3083131bd7dd981b7d3c3e21be9

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5765158.exe

                Filesize

                145KB

                MD5

                cab3c09e5b019aef2a2408edb086fcc6

                SHA1

                bbd2328a974ccd61262805b5169f33bb489a2bba

                SHA256

                ca2aeedca16114c27673f477a135346412a2530bbca9ee81b6e4c7cb6cc6382b

                SHA512

                4a97a435209132a596ffd360254e9259aca2f0951478decc8e7550c9a45aae5bd562a5557dd58a4ca4a05c9b9be0994214c0b2802e8910473476aa6f8e698d06

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5765158.exe

                Filesize

                145KB

                MD5

                cab3c09e5b019aef2a2408edb086fcc6

                SHA1

                bbd2328a974ccd61262805b5169f33bb489a2bba

                SHA256

                ca2aeedca16114c27673f477a135346412a2530bbca9ee81b6e4c7cb6cc6382b

                SHA512

                4a97a435209132a596ffd360254e9259aca2f0951478decc8e7550c9a45aae5bd562a5557dd58a4ca4a05c9b9be0994214c0b2802e8910473476aa6f8e698d06

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                205KB

                MD5

                79febde2fb6e01f7147ebc9412a11919

                SHA1

                014c3c69c477246ad20ef8585dbd260ac927cb4d

                SHA256

                ff975304386d17b324a97af8dc9898a5bd27459e9ffe0564f02c2b26ec43cd06

                SHA512

                9d3325d5725dff56aeacb9b5ddc14c9231fc1d06be4d44ba7d2a03fa0b168460810352fcec7afc2d649a260d0f5b226261cd4a2ee64fe946f3f55d91e9455f69

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                205KB

                MD5

                79febde2fb6e01f7147ebc9412a11919

                SHA1

                014c3c69c477246ad20ef8585dbd260ac927cb4d

                SHA256

                ff975304386d17b324a97af8dc9898a5bd27459e9ffe0564f02c2b26ec43cd06

                SHA512

                9d3325d5725dff56aeacb9b5ddc14c9231fc1d06be4d44ba7d2a03fa0b168460810352fcec7afc2d649a260d0f5b226261cd4a2ee64fe946f3f55d91e9455f69

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                205KB

                MD5

                79febde2fb6e01f7147ebc9412a11919

                SHA1

                014c3c69c477246ad20ef8585dbd260ac927cb4d

                SHA256

                ff975304386d17b324a97af8dc9898a5bd27459e9ffe0564f02c2b26ec43cd06

                SHA512

                9d3325d5725dff56aeacb9b5ddc14c9231fc1d06be4d44ba7d2a03fa0b168460810352fcec7afc2d649a260d0f5b226261cd4a2ee64fe946f3f55d91e9455f69

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                205KB

                MD5

                79febde2fb6e01f7147ebc9412a11919

                SHA1

                014c3c69c477246ad20ef8585dbd260ac927cb4d

                SHA256

                ff975304386d17b324a97af8dc9898a5bd27459e9ffe0564f02c2b26ec43cd06

                SHA512

                9d3325d5725dff56aeacb9b5ddc14c9231fc1d06be4d44ba7d2a03fa0b168460810352fcec7afc2d649a260d0f5b226261cd4a2ee64fe946f3f55d91e9455f69

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                205KB

                MD5

                79febde2fb6e01f7147ebc9412a11919

                SHA1

                014c3c69c477246ad20ef8585dbd260ac927cb4d

                SHA256

                ff975304386d17b324a97af8dc9898a5bd27459e9ffe0564f02c2b26ec43cd06

                SHA512

                9d3325d5725dff56aeacb9b5ddc14c9231fc1d06be4d44ba7d2a03fa0b168460810352fcec7afc2d649a260d0f5b226261cd4a2ee64fe946f3f55d91e9455f69

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                205KB

                MD5

                79febde2fb6e01f7147ebc9412a11919

                SHA1

                014c3c69c477246ad20ef8585dbd260ac927cb4d

                SHA256

                ff975304386d17b324a97af8dc9898a5bd27459e9ffe0564f02c2b26ec43cd06

                SHA512

                9d3325d5725dff56aeacb9b5ddc14c9231fc1d06be4d44ba7d2a03fa0b168460810352fcec7afc2d649a260d0f5b226261cd4a2ee64fe946f3f55d91e9455f69

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/2916-175-0x0000000005AF0000-0x0000000005B00000-memory.dmp

                Filesize

                64KB

              • memory/2916-165-0x0000000005800000-0x000000000590A000-memory.dmp

                Filesize

                1.0MB

              • memory/2916-176-0x00000000071B0000-0x0000000007226000-memory.dmp

                Filesize

                472KB

              • memory/2916-173-0x00000000076E0000-0x0000000007C0C000-memory.dmp

                Filesize

                5.2MB

              • memory/2916-172-0x0000000006FE0000-0x00000000071A2000-memory.dmp

                Filesize

                1.8MB

              • memory/2916-171-0x0000000006350000-0x00000000063B6000-memory.dmp

                Filesize

                408KB

              • memory/2916-170-0x00000000062B0000-0x0000000006342000-memory.dmp

                Filesize

                584KB

              • memory/2916-163-0x0000000000D60000-0x0000000000D8A000-memory.dmp

                Filesize

                168KB

              • memory/2916-169-0x0000000006860000-0x0000000006E04000-memory.dmp

                Filesize

                5.6MB

              • memory/2916-164-0x0000000005C90000-0x00000000062A8000-memory.dmp

                Filesize

                6.1MB

              • memory/2916-168-0x0000000005AF0000-0x0000000005B00000-memory.dmp

                Filesize

                64KB

              • memory/2916-167-0x0000000005790000-0x00000000057CC000-memory.dmp

                Filesize

                240KB

              • memory/2916-166-0x0000000005730000-0x0000000005742000-memory.dmp

                Filesize

                72KB

              • memory/2916-177-0x0000000006F70000-0x0000000006FC0000-memory.dmp

                Filesize

                320KB

              • memory/3708-155-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/4300-202-0x0000000004B40000-0x0000000004B50000-memory.dmp

                Filesize

                64KB

              • memory/4300-196-0x00000000003D0000-0x00000000003FA000-memory.dmp

                Filesize

                168KB