Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-05-2023 10:58

General

  • Target

    bdb8d9546cfe85369e95952c80adb04dd9b8eeb8b88dd0d423ec09fef718d337.exe

  • Size

    770KB

  • MD5

    bc6736855fd6a8e982af16614a92ab01

  • SHA1

    edc0bfc2a9942ceb709c9c58cb1c846912b612e5

  • SHA256

    bdb8d9546cfe85369e95952c80adb04dd9b8eeb8b88dd0d423ec09fef718d337

  • SHA512

    0aa00e76bb71c3cbd230133a67d7ef4078a08416128305fe31bf9b8598054c8fa73539c08cab0f408cfc06bbad9e1f4845814083dc300ceb0bc84d93a6544296

  • SSDEEP

    12288:tMrQy90hRyKYd5uIGhCFLtkXn3rE1jV7PZpq1NyCJUlFH0grLGp57jA34RfrRyKl:9ykyj6hClso1jVLmyCJULrCXA3EfNfl

Malware Config

Extracted

Family

redline

Botnet

dawa

C2

83.97.73.127:19062

Attributes
  • auth_value

    8ec2652026823ec15afbbe31ec3b0341

Extracted

Family

redline

Botnet

mirko

C2

83.97.73.127:19062

Attributes
  • auth_value

    35111a095377107ec8b7d3e035831af8

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bdb8d9546cfe85369e95952c80adb04dd9b8eeb8b88dd0d423ec09fef718d337.exe
    "C:\Users\Admin\AppData\Local\Temp\bdb8d9546cfe85369e95952c80adb04dd9b8eeb8b88dd0d423ec09fef718d337.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3198650.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3198650.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9444151.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9444151.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4808
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5797290.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5797290.exe
          4⤵
          • Executes dropped EXE
          PID:2112
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 928
            5⤵
            • Program crash
            PID:2028
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8205577.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8205577.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4820
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4656
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4920383.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4920383.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1204
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3704
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:2696
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4168
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:5024
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:400
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:4376
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:4468
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:4016
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:2496
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:2212
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8808333.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8808333.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:1768
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1100
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2112 -ip 2112
                1⤵
                  PID:4232
                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                  C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                  1⤵
                  • Executes dropped EXE
                  PID:640
                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                  C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                  1⤵
                  • Executes dropped EXE
                  PID:2128
                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                  C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                  1⤵
                  • Executes dropped EXE
                  PID:4772

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                  Filesize

                  226B

                  MD5

                  916851e072fbabc4796d8916c5131092

                  SHA1

                  d48a602229a690c512d5fdaf4c8d77547a88e7a2

                  SHA256

                  7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                  SHA512

                  07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8808333.exe

                  Filesize

                  326KB

                  MD5

                  4ebc683ec655c6756a7f18c9e8157837

                  SHA1

                  6f518b5d48084f2ef37c9f1759c632cdb8813585

                  SHA256

                  d027872e49912cd46b9eb98300ec5f61d8ba134e2e89bc8601fff5b8110d1ee7

                  SHA512

                  c1e0c177a19415142b86ab0ba591361e2ca62ed19584e6dd563f6040dd8602d7b1b38facf0504f4055bc50a23551a78d84160b548b99f09a860782abd4ff2ec9

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8808333.exe

                  Filesize

                  326KB

                  MD5

                  4ebc683ec655c6756a7f18c9e8157837

                  SHA1

                  6f518b5d48084f2ef37c9f1759c632cdb8813585

                  SHA256

                  d027872e49912cd46b9eb98300ec5f61d8ba134e2e89bc8601fff5b8110d1ee7

                  SHA512

                  c1e0c177a19415142b86ab0ba591361e2ca62ed19584e6dd563f6040dd8602d7b1b38facf0504f4055bc50a23551a78d84160b548b99f09a860782abd4ff2ec9

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3198650.exe

                  Filesize

                  451KB

                  MD5

                  5f83eedaaffab62d457a0a5bd5a80a1a

                  SHA1

                  f6c8587ea64a2620d5964ddd3ab2b0b1ebab7ff7

                  SHA256

                  7caa64fee34c4bababd38fdc6f17cdb1e484d9a49555f98cf7550ea32484dad6

                  SHA512

                  440c99448c6795054ac7d0041de009d458a44c7e17e832db493c60e46f43acfde883cbdd174545c5b53e3eca04686a518ddacbd80d393715f4ada30821f9ce5e

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3198650.exe

                  Filesize

                  451KB

                  MD5

                  5f83eedaaffab62d457a0a5bd5a80a1a

                  SHA1

                  f6c8587ea64a2620d5964ddd3ab2b0b1ebab7ff7

                  SHA256

                  7caa64fee34c4bababd38fdc6f17cdb1e484d9a49555f98cf7550ea32484dad6

                  SHA512

                  440c99448c6795054ac7d0041de009d458a44c7e17e832db493c60e46f43acfde883cbdd174545c5b53e3eca04686a518ddacbd80d393715f4ada30821f9ce5e

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4920383.exe

                  Filesize

                  208KB

                  MD5

                  71e4e3aa6c68f204edeb264fc0a82e02

                  SHA1

                  a1b04a59521c60db61043cc188e4f5dfa1e469a0

                  SHA256

                  5b7befecd1e48ca795f4c475770dc9e82eab67d10e3b806c15a860287b2fc362

                  SHA512

                  4ebcdf935596f78225b511d2453293b7276dce09d16b26fcf8c6ef9e24d0de66fde8c96c539bde27d898ce5eb06582be94483d7661a9c737c11cc83830d42c61

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4920383.exe

                  Filesize

                  208KB

                  MD5

                  71e4e3aa6c68f204edeb264fc0a82e02

                  SHA1

                  a1b04a59521c60db61043cc188e4f5dfa1e469a0

                  SHA256

                  5b7befecd1e48ca795f4c475770dc9e82eab67d10e3b806c15a860287b2fc362

                  SHA512

                  4ebcdf935596f78225b511d2453293b7276dce09d16b26fcf8c6ef9e24d0de66fde8c96c539bde27d898ce5eb06582be94483d7661a9c737c11cc83830d42c61

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9444151.exe

                  Filesize

                  280KB

                  MD5

                  fe38fc21d62baa9ff979233cdca29f91

                  SHA1

                  954d68c049242def571c7e5537be03d0c4fcc8de

                  SHA256

                  247ffe8ddcf1ac9ee373631d74aeba8511791af0d22762ad073a670dacd0c951

                  SHA512

                  94ce6978554dd8c5aaef27663122d87c5c985395d817a569f7bac6a63ada08f60ec605fdc85fb337c6c5fdc44c90b8a9ad3e0d8cfeabf7e68f805004aa872214

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9444151.exe

                  Filesize

                  280KB

                  MD5

                  fe38fc21d62baa9ff979233cdca29f91

                  SHA1

                  954d68c049242def571c7e5537be03d0c4fcc8de

                  SHA256

                  247ffe8ddcf1ac9ee373631d74aeba8511791af0d22762ad073a670dacd0c951

                  SHA512

                  94ce6978554dd8c5aaef27663122d87c5c985395d817a569f7bac6a63ada08f60ec605fdc85fb337c6c5fdc44c90b8a9ad3e0d8cfeabf7e68f805004aa872214

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5797290.exe

                  Filesize

                  145KB

                  MD5

                  5a7c85fb961ec3d6014228567adc8a30

                  SHA1

                  a2d326119c97c3655cc63c8517a368169caceaef

                  SHA256

                  0c2a164f5acc162622851dbcf6ca89b298153aa8396a2ee9ccfb718f5f727f5f

                  SHA512

                  f08e32c1553d9314c743813d6bf5341c2f245957fbe309e709996986408dbbd9373de6d66484898a467d5933a16b6a84a8c964b25c758cbd421edf3c9a27ce5c

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5797290.exe

                  Filesize

                  145KB

                  MD5

                  5a7c85fb961ec3d6014228567adc8a30

                  SHA1

                  a2d326119c97c3655cc63c8517a368169caceaef

                  SHA256

                  0c2a164f5acc162622851dbcf6ca89b298153aa8396a2ee9ccfb718f5f727f5f

                  SHA512

                  f08e32c1553d9314c743813d6bf5341c2f245957fbe309e709996986408dbbd9373de6d66484898a467d5933a16b6a84a8c964b25c758cbd421edf3c9a27ce5c

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8205577.exe

                  Filesize

                  193KB

                  MD5

                  92baf18e1cf0cd4baae3b2a394618ed7

                  SHA1

                  106c4b8bc4d0a03582be0a2e9d464625cf7afce7

                  SHA256

                  5bbc8701102f5aa6e2b4a42eb6d28c3fc53966783962b0e1a8acff397d311efe

                  SHA512

                  0322788ac89f5813d088ba9eba55e699dc500b88e61b2ab531fb4739878f02bf42e2bee53930fcfca97b5415f67f546cd524dd5b70bde7c7e6b5f8e62a6b31a1

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8205577.exe

                  Filesize

                  193KB

                  MD5

                  92baf18e1cf0cd4baae3b2a394618ed7

                  SHA1

                  106c4b8bc4d0a03582be0a2e9d464625cf7afce7

                  SHA256

                  5bbc8701102f5aa6e2b4a42eb6d28c3fc53966783962b0e1a8acff397d311efe

                  SHA512

                  0322788ac89f5813d088ba9eba55e699dc500b88e61b2ab531fb4739878f02bf42e2bee53930fcfca97b5415f67f546cd524dd5b70bde7c7e6b5f8e62a6b31a1

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                  Filesize

                  208KB

                  MD5

                  71e4e3aa6c68f204edeb264fc0a82e02

                  SHA1

                  a1b04a59521c60db61043cc188e4f5dfa1e469a0

                  SHA256

                  5b7befecd1e48ca795f4c475770dc9e82eab67d10e3b806c15a860287b2fc362

                  SHA512

                  4ebcdf935596f78225b511d2453293b7276dce09d16b26fcf8c6ef9e24d0de66fde8c96c539bde27d898ce5eb06582be94483d7661a9c737c11cc83830d42c61

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                  Filesize

                  208KB

                  MD5

                  71e4e3aa6c68f204edeb264fc0a82e02

                  SHA1

                  a1b04a59521c60db61043cc188e4f5dfa1e469a0

                  SHA256

                  5b7befecd1e48ca795f4c475770dc9e82eab67d10e3b806c15a860287b2fc362

                  SHA512

                  4ebcdf935596f78225b511d2453293b7276dce09d16b26fcf8c6ef9e24d0de66fde8c96c539bde27d898ce5eb06582be94483d7661a9c737c11cc83830d42c61

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                  Filesize

                  208KB

                  MD5

                  71e4e3aa6c68f204edeb264fc0a82e02

                  SHA1

                  a1b04a59521c60db61043cc188e4f5dfa1e469a0

                  SHA256

                  5b7befecd1e48ca795f4c475770dc9e82eab67d10e3b806c15a860287b2fc362

                  SHA512

                  4ebcdf935596f78225b511d2453293b7276dce09d16b26fcf8c6ef9e24d0de66fde8c96c539bde27d898ce5eb06582be94483d7661a9c737c11cc83830d42c61

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                  Filesize

                  208KB

                  MD5

                  71e4e3aa6c68f204edeb264fc0a82e02

                  SHA1

                  a1b04a59521c60db61043cc188e4f5dfa1e469a0

                  SHA256

                  5b7befecd1e48ca795f4c475770dc9e82eab67d10e3b806c15a860287b2fc362

                  SHA512

                  4ebcdf935596f78225b511d2453293b7276dce09d16b26fcf8c6ef9e24d0de66fde8c96c539bde27d898ce5eb06582be94483d7661a9c737c11cc83830d42c61

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                  Filesize

                  208KB

                  MD5

                  71e4e3aa6c68f204edeb264fc0a82e02

                  SHA1

                  a1b04a59521c60db61043cc188e4f5dfa1e469a0

                  SHA256

                  5b7befecd1e48ca795f4c475770dc9e82eab67d10e3b806c15a860287b2fc362

                  SHA512

                  4ebcdf935596f78225b511d2453293b7276dce09d16b26fcf8c6ef9e24d0de66fde8c96c539bde27d898ce5eb06582be94483d7661a9c737c11cc83830d42c61

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                  Filesize

                  208KB

                  MD5

                  71e4e3aa6c68f204edeb264fc0a82e02

                  SHA1

                  a1b04a59521c60db61043cc188e4f5dfa1e469a0

                  SHA256

                  5b7befecd1e48ca795f4c475770dc9e82eab67d10e3b806c15a860287b2fc362

                  SHA512

                  4ebcdf935596f78225b511d2453293b7276dce09d16b26fcf8c6ef9e24d0de66fde8c96c539bde27d898ce5eb06582be94483d7661a9c737c11cc83830d42c61

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  547bae937be965d63f61d89e8eafb4a1

                  SHA1

                  85466c95625bcbb7f68aa89a367149d35f80e1fa

                  SHA256

                  015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                  SHA512

                  1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  547bae937be965d63f61d89e8eafb4a1

                  SHA1

                  85466c95625bcbb7f68aa89a367149d35f80e1fa

                  SHA256

                  015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                  SHA512

                  1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  547bae937be965d63f61d89e8eafb4a1

                  SHA1

                  85466c95625bcbb7f68aa89a367149d35f80e1fa

                  SHA256

                  015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                  SHA512

                  1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                  Filesize

                  162B

                  MD5

                  1b7c22a214949975556626d7217e9a39

                  SHA1

                  d01c97e2944166ed23e47e4a62ff471ab8fa031f

                  SHA256

                  340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                  SHA512

                  ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                • memory/1100-196-0x0000000007590000-0x0000000007ABC000-memory.dmp

                  Filesize

                  5.2MB

                • memory/1100-199-0x0000000005960000-0x0000000005970000-memory.dmp

                  Filesize

                  64KB

                • memory/1100-193-0x0000000006200000-0x0000000006266000-memory.dmp

                  Filesize

                  408KB

                • memory/1100-195-0x0000000006E90000-0x0000000007052000-memory.dmp

                  Filesize

                  1.8MB

                • memory/1100-191-0x0000000006710000-0x0000000006CB4000-memory.dmp

                  Filesize

                  5.6MB

                • memory/1100-197-0x0000000007060000-0x00000000070D6000-memory.dmp

                  Filesize

                  472KB

                • memory/1100-198-0x0000000006E10000-0x0000000006E60000-memory.dmp

                  Filesize

                  320KB

                • memory/1100-192-0x0000000006160000-0x00000000061F2000-memory.dmp

                  Filesize

                  584KB

                • memory/1100-190-0x0000000005630000-0x000000000566C000-memory.dmp

                  Filesize

                  240KB

                • memory/1100-188-0x00000000055D0000-0x00000000055E2000-memory.dmp

                  Filesize

                  72KB

                • memory/1100-189-0x0000000005960000-0x0000000005970000-memory.dmp

                  Filesize

                  64KB

                • memory/1100-187-0x00000000056A0000-0x00000000057AA000-memory.dmp

                  Filesize

                  1.0MB

                • memory/1100-186-0x0000000005B40000-0x0000000006158000-memory.dmp

                  Filesize

                  6.1MB

                • memory/1100-181-0x0000000000400000-0x000000000042A000-memory.dmp

                  Filesize

                  168KB

                • memory/2112-154-0x00000000003A0000-0x00000000003CA000-memory.dmp

                  Filesize

                  168KB

                • memory/4656-159-0x0000000000400000-0x000000000040A000-memory.dmp

                  Filesize

                  40KB