Analysis

  • max time kernel
    146s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/05/2023, 13:12

General

  • Target

    9a276947488b6e69dee68fc3e2d1aa9c839cd6a228c448171c05760823877d8e.exe

  • Size

    764KB

  • MD5

    330f8e2af08ddf8b140b8018396d8f97

  • SHA1

    fd41591b3c62329fd1745ae19815ade998a95563

  • SHA256

    9a276947488b6e69dee68fc3e2d1aa9c839cd6a228c448171c05760823877d8e

  • SHA512

    647a2f5f0e6de2faff8daadfc5528ec65fda2f73bce2efb2fed4233da4b98d455cb6b2ad14aa8979ad85726ac78675bc959f9ba5df7ecf85ea02b51870731923

  • SSDEEP

    12288:PMrvy90vlzXwWOieZoi25yzDQkHEWbSRh3WjcVH7W6C0B2mp4dosmd8LBpEdHM:kyw1gTHeiDzHEVRYjGbWP0B2a4Csmdo5

Malware Config

Extracted

Family

redline

Botnet

disa

C2

83.97.73.122:19062

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Extracted

Family

redline

Botnet

goga

C2

83.97.73.122:19062

Attributes
  • auth_value

    6d57dff6d3c42dddb8a76dc276b8467f

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a276947488b6e69dee68fc3e2d1aa9c839cd6a228c448171c05760823877d8e.exe
    "C:\Users\Admin\AppData\Local\Temp\9a276947488b6e69dee68fc3e2d1aa9c839cd6a228c448171c05760823877d8e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:524
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0648671.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0648671.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1336
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5362400.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5362400.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1260
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0839300.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0839300.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2220
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2268
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l2900427.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l2900427.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:316
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m9940539.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m9940539.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4400
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4436
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:3088
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:408
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metado.exe" /P "Admin:N"
              6⤵
                PID:1352
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                6⤵
                  PID:1600
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:2940
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:5072
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:1788
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:1552
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:4140
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n7894428.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n7894428.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:4348
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2708
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:4660
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:2264
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:4284

              Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                      Filesize

                      226B

                      MD5

                      916851e072fbabc4796d8916c5131092

                      SHA1

                      d48a602229a690c512d5fdaf4c8d77547a88e7a2

                      SHA256

                      7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                      SHA512

                      07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n7894428.exe

                      Filesize

                      316KB

                      MD5

                      de2e04f39571091ff4477d85eb16af0c

                      SHA1

                      b953dcb66054b10236eab85a6249a66ac334214e

                      SHA256

                      ade05a25a18c528f1eda4b68295e191e493dfa9048d6bac2160c0b62d4fc4425

                      SHA512

                      518ca43038ebf876be9d0ff343ae041846d4c88bc194575b8010d43c2e075be4621f378aee226cc4eaca254df64798615094ea409718657cc91e537f52334dba

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n7894428.exe

                      Filesize

                      316KB

                      MD5

                      de2e04f39571091ff4477d85eb16af0c

                      SHA1

                      b953dcb66054b10236eab85a6249a66ac334214e

                      SHA256

                      ade05a25a18c528f1eda4b68295e191e493dfa9048d6bac2160c0b62d4fc4425

                      SHA512

                      518ca43038ebf876be9d0ff343ae041846d4c88bc194575b8010d43c2e075be4621f378aee226cc4eaca254df64798615094ea409718657cc91e537f52334dba

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0648671.exe

                      Filesize

                      447KB

                      MD5

                      853a6a8d6a8693e7f9e367d5273435ae

                      SHA1

                      82947983969799703b1aa12feb243141bd425930

                      SHA256

                      435cddc48577f2b1d72fb9f68399fb7d9af61d3f5205739d68ed8369a23f8edb

                      SHA512

                      cf3b3b07e709b86e19004de21a0bd9099418a98cc0c3bdc7c713d781eea237247528b65a68916da539b42737afd14f2ed6415939620c80bfa1f3c761b88b41a9

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0648671.exe

                      Filesize

                      447KB

                      MD5

                      853a6a8d6a8693e7f9e367d5273435ae

                      SHA1

                      82947983969799703b1aa12feb243141bd425930

                      SHA256

                      435cddc48577f2b1d72fb9f68399fb7d9af61d3f5205739d68ed8369a23f8edb

                      SHA512

                      cf3b3b07e709b86e19004de21a0bd9099418a98cc0c3bdc7c713d781eea237247528b65a68916da539b42737afd14f2ed6415939620c80bfa1f3c761b88b41a9

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m9940539.exe

                      Filesize

                      206KB

                      MD5

                      a4e37a0de49240682f592491c0bb2bd5

                      SHA1

                      599998edf9e8ba84bfdeb5601f9b093b31f1c7b7

                      SHA256

                      c5d847281fd576ade59b16a16e15755954074ffc4220698cddaba2d64ecf4513

                      SHA512

                      88b747fff7d7e8ee0b03025255ada7fe1dbbfe42e304b96e4a5c004e106eabc44761fc9ad041e511b8ae3c1311b44eb6ae6172b38468b74b510f1be7581fad1e

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m9940539.exe

                      Filesize

                      206KB

                      MD5

                      a4e37a0de49240682f592491c0bb2bd5

                      SHA1

                      599998edf9e8ba84bfdeb5601f9b093b31f1c7b7

                      SHA256

                      c5d847281fd576ade59b16a16e15755954074ffc4220698cddaba2d64ecf4513

                      SHA512

                      88b747fff7d7e8ee0b03025255ada7fe1dbbfe42e304b96e4a5c004e106eabc44761fc9ad041e511b8ae3c1311b44eb6ae6172b38468b74b510f1be7581fad1e

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5362400.exe

                      Filesize

                      275KB

                      MD5

                      c8513e527698f3bdca2791112d565a9e

                      SHA1

                      e323816313656a6838c38afbdfc59d340de3a7d5

                      SHA256

                      8c3cde9927352f88b895fe0a31ecac9db983572732117cabdedca94c98509662

                      SHA512

                      06ef2ad4099409867a75f9896e4a82186822f31e53ef0bf834bb8d8b8d2208ce35bf3aa4b96e36e37998dc771ac5c0b6052b9abd4e594b40e67405ca9a7c2eec

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5362400.exe

                      Filesize

                      275KB

                      MD5

                      c8513e527698f3bdca2791112d565a9e

                      SHA1

                      e323816313656a6838c38afbdfc59d340de3a7d5

                      SHA256

                      8c3cde9927352f88b895fe0a31ecac9db983572732117cabdedca94c98509662

                      SHA512

                      06ef2ad4099409867a75f9896e4a82186822f31e53ef0bf834bb8d8b8d2208ce35bf3aa4b96e36e37998dc771ac5c0b6052b9abd4e594b40e67405ca9a7c2eec

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0839300.exe

                      Filesize

                      182KB

                      MD5

                      0e50969b9e5a9b2e9555699b5877c8c8

                      SHA1

                      42dbb8550ed6cd2a328a2a689f17dc3875e781d5

                      SHA256

                      16b6f1f65ff619661c314b3404d2d8aacb7b1075fe15653328f680026f521517

                      SHA512

                      31bd3d52fa13060fe4fae5f1c10eea4aad9953c2def71dadf2e516f0bd8c901e235e914679c87eba1254011ccd789e98dfaaf4d1b88a5c24411d106d8c77d3fc

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0839300.exe

                      Filesize

                      182KB

                      MD5

                      0e50969b9e5a9b2e9555699b5877c8c8

                      SHA1

                      42dbb8550ed6cd2a328a2a689f17dc3875e781d5

                      SHA256

                      16b6f1f65ff619661c314b3404d2d8aacb7b1075fe15653328f680026f521517

                      SHA512

                      31bd3d52fa13060fe4fae5f1c10eea4aad9953c2def71dadf2e516f0bd8c901e235e914679c87eba1254011ccd789e98dfaaf4d1b88a5c24411d106d8c77d3fc

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l2900427.exe

                      Filesize

                      145KB

                      MD5

                      451937eae38b5fe1edd3bcabf899c1e4

                      SHA1

                      03398003c3b8d6f9014f58190ae9adf525d5c546

                      SHA256

                      fcca593bec912a33fcb1c228c88a76e15b2a7e00f151e268a96c2628fc3842af

                      SHA512

                      c5771ac798e11f200e5f1c4dba20c1edab36b220cdefea43691581d4ffc93d766f7626410f5232fccc1c652ad379b7623ca6b048f985c5e955d6355847ad4166

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l2900427.exe

                      Filesize

                      145KB

                      MD5

                      451937eae38b5fe1edd3bcabf899c1e4

                      SHA1

                      03398003c3b8d6f9014f58190ae9adf525d5c546

                      SHA256

                      fcca593bec912a33fcb1c228c88a76e15b2a7e00f151e268a96c2628fc3842af

                      SHA512

                      c5771ac798e11f200e5f1c4dba20c1edab36b220cdefea43691581d4ffc93d766f7626410f5232fccc1c652ad379b7623ca6b048f985c5e955d6355847ad4166

                    • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                      Filesize

                      206KB

                      MD5

                      a4e37a0de49240682f592491c0bb2bd5

                      SHA1

                      599998edf9e8ba84bfdeb5601f9b093b31f1c7b7

                      SHA256

                      c5d847281fd576ade59b16a16e15755954074ffc4220698cddaba2d64ecf4513

                      SHA512

                      88b747fff7d7e8ee0b03025255ada7fe1dbbfe42e304b96e4a5c004e106eabc44761fc9ad041e511b8ae3c1311b44eb6ae6172b38468b74b510f1be7581fad1e

                    • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                      Filesize

                      206KB

                      MD5

                      a4e37a0de49240682f592491c0bb2bd5

                      SHA1

                      599998edf9e8ba84bfdeb5601f9b093b31f1c7b7

                      SHA256

                      c5d847281fd576ade59b16a16e15755954074ffc4220698cddaba2d64ecf4513

                      SHA512

                      88b747fff7d7e8ee0b03025255ada7fe1dbbfe42e304b96e4a5c004e106eabc44761fc9ad041e511b8ae3c1311b44eb6ae6172b38468b74b510f1be7581fad1e

                    • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                      Filesize

                      206KB

                      MD5

                      a4e37a0de49240682f592491c0bb2bd5

                      SHA1

                      599998edf9e8ba84bfdeb5601f9b093b31f1c7b7

                      SHA256

                      c5d847281fd576ade59b16a16e15755954074ffc4220698cddaba2d64ecf4513

                      SHA512

                      88b747fff7d7e8ee0b03025255ada7fe1dbbfe42e304b96e4a5c004e106eabc44761fc9ad041e511b8ae3c1311b44eb6ae6172b38468b74b510f1be7581fad1e

                    • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                      Filesize

                      206KB

                      MD5

                      a4e37a0de49240682f592491c0bb2bd5

                      SHA1

                      599998edf9e8ba84bfdeb5601f9b093b31f1c7b7

                      SHA256

                      c5d847281fd576ade59b16a16e15755954074ffc4220698cddaba2d64ecf4513

                      SHA512

                      88b747fff7d7e8ee0b03025255ada7fe1dbbfe42e304b96e4a5c004e106eabc44761fc9ad041e511b8ae3c1311b44eb6ae6172b38468b74b510f1be7581fad1e

                    • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                      Filesize

                      206KB

                      MD5

                      a4e37a0de49240682f592491c0bb2bd5

                      SHA1

                      599998edf9e8ba84bfdeb5601f9b093b31f1c7b7

                      SHA256

                      c5d847281fd576ade59b16a16e15755954074ffc4220698cddaba2d64ecf4513

                      SHA512

                      88b747fff7d7e8ee0b03025255ada7fe1dbbfe42e304b96e4a5c004e106eabc44761fc9ad041e511b8ae3c1311b44eb6ae6172b38468b74b510f1be7581fad1e

                    • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                      Filesize

                      206KB

                      MD5

                      a4e37a0de49240682f592491c0bb2bd5

                      SHA1

                      599998edf9e8ba84bfdeb5601f9b093b31f1c7b7

                      SHA256

                      c5d847281fd576ade59b16a16e15755954074ffc4220698cddaba2d64ecf4513

                      SHA512

                      88b747fff7d7e8ee0b03025255ada7fe1dbbfe42e304b96e4a5c004e106eabc44761fc9ad041e511b8ae3c1311b44eb6ae6172b38468b74b510f1be7581fad1e

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      547bae937be965d63f61d89e8eafb4a1

                      SHA1

                      85466c95625bcbb7f68aa89a367149d35f80e1fa

                      SHA256

                      015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                      SHA512

                      1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      547bae937be965d63f61d89e8eafb4a1

                      SHA1

                      85466c95625bcbb7f68aa89a367149d35f80e1fa

                      SHA256

                      015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                      SHA512

                      1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      547bae937be965d63f61d89e8eafb4a1

                      SHA1

                      85466c95625bcbb7f68aa89a367149d35f80e1fa

                      SHA256

                      015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                      SHA512

                      1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                      Filesize

                      162B

                      MD5

                      1b7c22a214949975556626d7217e9a39

                      SHA1

                      d01c97e2944166ed23e47e4a62ff471ab8fa031f

                      SHA256

                      340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                      SHA512

                      ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                    • memory/316-175-0x00000000066B0000-0x0000000006872000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/316-165-0x0000000004E70000-0x0000000004F7A000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/316-176-0x0000000006DB0000-0x00000000072DC000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/316-173-0x0000000005E40000-0x0000000005E90000-memory.dmp

                      Filesize

                      320KB

                    • memory/316-172-0x0000000005DC0000-0x0000000005E36000-memory.dmp

                      Filesize

                      472KB

                    • memory/316-171-0x00000000052E0000-0x0000000005346000-memory.dmp

                      Filesize

                      408KB

                    • memory/316-170-0x0000000005F30000-0x00000000064D4000-memory.dmp

                      Filesize

                      5.6MB

                    • memory/316-163-0x0000000000510000-0x000000000053A000-memory.dmp

                      Filesize

                      168KB

                    • memory/316-169-0x0000000005140000-0x00000000051D2000-memory.dmp

                      Filesize

                      584KB

                    • memory/316-164-0x0000000005360000-0x0000000005978000-memory.dmp

                      Filesize

                      6.1MB

                    • memory/316-168-0x0000000004E30000-0x0000000004E40000-memory.dmp

                      Filesize

                      64KB

                    • memory/316-167-0x0000000004F80000-0x0000000004FBC000-memory.dmp

                      Filesize

                      240KB

                    • memory/316-166-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

                      Filesize

                      72KB

                    • memory/316-177-0x0000000004E30000-0x0000000004E40000-memory.dmp

                      Filesize

                      64KB

                    • memory/2268-155-0x0000000000400000-0x000000000040A000-memory.dmp

                      Filesize

                      40KB

                    • memory/2708-202-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2708-196-0x0000000000500000-0x000000000052A000-memory.dmp

                      Filesize

                      168KB