Analysis

  • max time kernel
    123s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/05/2023, 00:59

General

  • Target

    6b109859f44f3d86195b75523913a2233c35a2a19e6930b095b1a4a416a992de.exe

  • Size

    753KB

  • MD5

    9d34f2b79113a79e316fc0fbc9568af4

  • SHA1

    a260ab1b08fc25abee25e75d7388f28da446db80

  • SHA256

    6b109859f44f3d86195b75523913a2233c35a2a19e6930b095b1a4a416a992de

  • SHA512

    82d4f19abe21d31912d443543f8ce38ecb3c6c80b7edd79b342763955c920a5aa9756027902e4cde6e578508cda91a06e17e341e3e74ada962a4c499c4c67d2a

  • SSDEEP

    12288:pMrPy90KnnE2wBEmLVeb1/ZpvjUyQcN0rCqpoLOmi10P3p2IFrlyBacSvN8EY8zJ:ay3E2w+3ICKCq1mUEp2IAacMlYcCk

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.127:19045

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

ronin

C2

83.97.73.127:19045

Attributes
  • auth_value

    4cce855f5ba9b9b6e5b1400f102745de

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b109859f44f3d86195b75523913a2233c35a2a19e6930b095b1a4a416a992de.exe
    "C:\Users\Admin\AppData\Local\Temp\6b109859f44f3d86195b75523913a2233c35a2a19e6930b095b1a4a416a992de.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3820
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7922410.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7922410.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6151726.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6151726.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3216
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7775939.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7775939.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1972
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g2867708.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g2867708.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4696
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2220
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5487871.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5487871.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3240
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:796
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:4628
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2240
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:2696
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:2132
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:4192
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:1872
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:4292
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:4804
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:3208
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6798463.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6798463.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:1172
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:672
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:1164
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:2412

              Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                      Filesize

                      226B

                      MD5

                      916851e072fbabc4796d8916c5131092

                      SHA1

                      d48a602229a690c512d5fdaf4c8d77547a88e7a2

                      SHA256

                      7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                      SHA512

                      07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6798463.exe

                      Filesize

                      327KB

                      MD5

                      3c2bae65371f0122b1084ff9d7ea3447

                      SHA1

                      c4e32920a40f1946c45b7aa4ce54cfebf3cbf0ba

                      SHA256

                      c1f8a43c98ebc8a9fdc21d07e2ce1c718e0183b686085a9897e428a73b56ab1b

                      SHA512

                      632a3cdb4695ea516ef86cb4bec78f5c3c75c0551aa2ed8a630205e311ea2394fdb600a134262cdc42e82c86e3324ace365f3d132855ce8c44387a8628ff2014

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6798463.exe

                      Filesize

                      327KB

                      MD5

                      3c2bae65371f0122b1084ff9d7ea3447

                      SHA1

                      c4e32920a40f1946c45b7aa4ce54cfebf3cbf0ba

                      SHA256

                      c1f8a43c98ebc8a9fdc21d07e2ce1c718e0183b686085a9897e428a73b56ab1b

                      SHA512

                      632a3cdb4695ea516ef86cb4bec78f5c3c75c0551aa2ed8a630205e311ea2394fdb600a134262cdc42e82c86e3324ace365f3d132855ce8c44387a8628ff2014

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7922410.exe

                      Filesize

                      453KB

                      MD5

                      485aeab282baf4a1160ab9a5394dff77

                      SHA1

                      5b4cdc272d40f2449a501ba5f347f944cf194517

                      SHA256

                      df02fa1870867fd2f36bf70ead379290785457f2f6d90cfeefdc9cd3a3eddb12

                      SHA512

                      dd23062ab1980011e84408a9ac0c2724bd2527ad90dcac4f60459b5cfd22f5874b970bca4d2d20a52b2a22fbe52c227084c7a814b8876eb8ea20e313778c20c1

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7922410.exe

                      Filesize

                      453KB

                      MD5

                      485aeab282baf4a1160ab9a5394dff77

                      SHA1

                      5b4cdc272d40f2449a501ba5f347f944cf194517

                      SHA256

                      df02fa1870867fd2f36bf70ead379290785457f2f6d90cfeefdc9cd3a3eddb12

                      SHA512

                      dd23062ab1980011e84408a9ac0c2724bd2527ad90dcac4f60459b5cfd22f5874b970bca4d2d20a52b2a22fbe52c227084c7a814b8876eb8ea20e313778c20c1

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5487871.exe

                      Filesize

                      210KB

                      MD5

                      1cd341f23144bb6bb5b50d9e2a57680f

                      SHA1

                      8707dee20a223df213c0dff1d41e149366ede96d

                      SHA256

                      da84f17daeb73a68ca649b16b79c45e1b883a6d0971be1c46ed8790611960097

                      SHA512

                      1b966f9e9eac6e2bdabea7395978c2f51d8bc68e57563a1181482e2f474b2046e8133ee4a1deb4102330ab9f421041b64204dfad97581164ebbdc2d642017df6

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5487871.exe

                      Filesize

                      210KB

                      MD5

                      1cd341f23144bb6bb5b50d9e2a57680f

                      SHA1

                      8707dee20a223df213c0dff1d41e149366ede96d

                      SHA256

                      da84f17daeb73a68ca649b16b79c45e1b883a6d0971be1c46ed8790611960097

                      SHA512

                      1b966f9e9eac6e2bdabea7395978c2f51d8bc68e57563a1181482e2f474b2046e8133ee4a1deb4102330ab9f421041b64204dfad97581164ebbdc2d642017df6

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6151726.exe

                      Filesize

                      281KB

                      MD5

                      660b85ad6a805c6b092ca5f2141a3986

                      SHA1

                      0f56e0ca29be442211574a9de632aadb104df6ce

                      SHA256

                      0bab502bb38f8ff66767d4606e087bbc9518a3a5df89c8d745b860becc665fcc

                      SHA512

                      8ab52b18187dcb473b653f9b498372874ad0cd7ea36cde4360ec9fe406cd434f88b4dac4441adbf6dd3c77ae166a27a0d347188d64a80e197e773c10d313c717

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6151726.exe

                      Filesize

                      281KB

                      MD5

                      660b85ad6a805c6b092ca5f2141a3986

                      SHA1

                      0f56e0ca29be442211574a9de632aadb104df6ce

                      SHA256

                      0bab502bb38f8ff66767d4606e087bbc9518a3a5df89c8d745b860becc665fcc

                      SHA512

                      8ab52b18187dcb473b653f9b498372874ad0cd7ea36cde4360ec9fe406cd434f88b4dac4441adbf6dd3c77ae166a27a0d347188d64a80e197e773c10d313c717

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7775939.exe

                      Filesize

                      168KB

                      MD5

                      45ca8adb0d48c18e1758025aa5607431

                      SHA1

                      14aa76d3ff7ad57fc3cbbd0ccc66c039851e0d6d

                      SHA256

                      080527b3aa92da31e5b2650e01095b85a5a8483e1f188cc9ff8a27f178c07264

                      SHA512

                      343b747ff325ab2e05cfbc9032fc6072907ec9996a774f61ad9db8339c917d84ece209bf0f18e6e6191005c8e6531b4c27b5b2fbe26d5090dde3f77148f8d9dd

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7775939.exe

                      Filesize

                      168KB

                      MD5

                      45ca8adb0d48c18e1758025aa5607431

                      SHA1

                      14aa76d3ff7ad57fc3cbbd0ccc66c039851e0d6d

                      SHA256

                      080527b3aa92da31e5b2650e01095b85a5a8483e1f188cc9ff8a27f178c07264

                      SHA512

                      343b747ff325ab2e05cfbc9032fc6072907ec9996a774f61ad9db8339c917d84ece209bf0f18e6e6191005c8e6531b4c27b5b2fbe26d5090dde3f77148f8d9dd

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g2867708.exe

                      Filesize

                      169KB

                      MD5

                      b29c0b23a9c25960780ea73718243a9d

                      SHA1

                      0266e9cb2c49722006cc4f8c06c8f2efda27af94

                      SHA256

                      b5d0397fa2809c9a197339e8734f5a1229a5295c5d15f7390e258d4ed88e4484

                      SHA512

                      a08d48e3ed5d950f43c2cd8ba651cff0f15be4d084284c3ad35242a571d621437bf18d9627cf7084a44d203e3bb4ecd53627965df9edaf9b19eb867419f8ead8

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g2867708.exe

                      Filesize

                      169KB

                      MD5

                      b29c0b23a9c25960780ea73718243a9d

                      SHA1

                      0266e9cb2c49722006cc4f8c06c8f2efda27af94

                      SHA256

                      b5d0397fa2809c9a197339e8734f5a1229a5295c5d15f7390e258d4ed88e4484

                      SHA512

                      a08d48e3ed5d950f43c2cd8ba651cff0f15be4d084284c3ad35242a571d621437bf18d9627cf7084a44d203e3bb4ecd53627965df9edaf9b19eb867419f8ead8

                    • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                      Filesize

                      210KB

                      MD5

                      1cd341f23144bb6bb5b50d9e2a57680f

                      SHA1

                      8707dee20a223df213c0dff1d41e149366ede96d

                      SHA256

                      da84f17daeb73a68ca649b16b79c45e1b883a6d0971be1c46ed8790611960097

                      SHA512

                      1b966f9e9eac6e2bdabea7395978c2f51d8bc68e57563a1181482e2f474b2046e8133ee4a1deb4102330ab9f421041b64204dfad97581164ebbdc2d642017df6

                    • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                      Filesize

                      210KB

                      MD5

                      1cd341f23144bb6bb5b50d9e2a57680f

                      SHA1

                      8707dee20a223df213c0dff1d41e149366ede96d

                      SHA256

                      da84f17daeb73a68ca649b16b79c45e1b883a6d0971be1c46ed8790611960097

                      SHA512

                      1b966f9e9eac6e2bdabea7395978c2f51d8bc68e57563a1181482e2f474b2046e8133ee4a1deb4102330ab9f421041b64204dfad97581164ebbdc2d642017df6

                    • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                      Filesize

                      210KB

                      MD5

                      1cd341f23144bb6bb5b50d9e2a57680f

                      SHA1

                      8707dee20a223df213c0dff1d41e149366ede96d

                      SHA256

                      da84f17daeb73a68ca649b16b79c45e1b883a6d0971be1c46ed8790611960097

                      SHA512

                      1b966f9e9eac6e2bdabea7395978c2f51d8bc68e57563a1181482e2f474b2046e8133ee4a1deb4102330ab9f421041b64204dfad97581164ebbdc2d642017df6

                    • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                      Filesize

                      210KB

                      MD5

                      1cd341f23144bb6bb5b50d9e2a57680f

                      SHA1

                      8707dee20a223df213c0dff1d41e149366ede96d

                      SHA256

                      da84f17daeb73a68ca649b16b79c45e1b883a6d0971be1c46ed8790611960097

                      SHA512

                      1b966f9e9eac6e2bdabea7395978c2f51d8bc68e57563a1181482e2f474b2046e8133ee4a1deb4102330ab9f421041b64204dfad97581164ebbdc2d642017df6

                    • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                      Filesize

                      210KB

                      MD5

                      1cd341f23144bb6bb5b50d9e2a57680f

                      SHA1

                      8707dee20a223df213c0dff1d41e149366ede96d

                      SHA256

                      da84f17daeb73a68ca649b16b79c45e1b883a6d0971be1c46ed8790611960097

                      SHA512

                      1b966f9e9eac6e2bdabea7395978c2f51d8bc68e57563a1181482e2f474b2046e8133ee4a1deb4102330ab9f421041b64204dfad97581164ebbdc2d642017df6

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      547bae937be965d63f61d89e8eafb4a1

                      SHA1

                      85466c95625bcbb7f68aa89a367149d35f80e1fa

                      SHA256

                      015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                      SHA512

                      1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      547bae937be965d63f61d89e8eafb4a1

                      SHA1

                      85466c95625bcbb7f68aa89a367149d35f80e1fa

                      SHA256

                      015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                      SHA512

                      1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      547bae937be965d63f61d89e8eafb4a1

                      SHA1

                      85466c95625bcbb7f68aa89a367149d35f80e1fa

                      SHA256

                      015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                      SHA512

                      1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                      Filesize

                      162B

                      MD5

                      1b7c22a214949975556626d7217e9a39

                      SHA1

                      d01c97e2944166ed23e47e4a62ff471ab8fa031f

                      SHA256

                      340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                      SHA512

                      ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                    • memory/672-195-0x0000000000730000-0x000000000075E000-memory.dmp

                      Filesize

                      184KB

                    • memory/672-200-0x0000000004B70000-0x0000000004B80000-memory.dmp

                      Filesize

                      64KB

                    • memory/1972-157-0x000000000A6A0000-0x000000000A6B2000-memory.dmp

                      Filesize

                      72KB

                    • memory/1972-162-0x000000000B820000-0x000000000BDC4000-memory.dmp

                      Filesize

                      5.6MB

                    • memory/1972-167-0x000000000BF00000-0x000000000BF50000-memory.dmp

                      Filesize

                      320KB

                    • memory/1972-166-0x000000000C6B0000-0x000000000CBDC000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/1972-165-0x00000000050A0000-0x00000000050B0000-memory.dmp

                      Filesize

                      64KB

                    • memory/1972-164-0x000000000BFB0000-0x000000000C172000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/1972-163-0x000000000ABD0000-0x000000000AC36000-memory.dmp

                      Filesize

                      408KB

                    • memory/1972-154-0x00000000007F0000-0x000000000081E000-memory.dmp

                      Filesize

                      184KB

                    • memory/1972-161-0x000000000AB30000-0x000000000ABC2000-memory.dmp

                      Filesize

                      584KB

                    • memory/1972-160-0x000000000AA10000-0x000000000AA86000-memory.dmp

                      Filesize

                      472KB

                    • memory/1972-159-0x000000000A700000-0x000000000A73C000-memory.dmp

                      Filesize

                      240KB

                    • memory/1972-158-0x00000000050A0000-0x00000000050B0000-memory.dmp

                      Filesize

                      64KB

                    • memory/1972-156-0x000000000A770000-0x000000000A87A000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/1972-155-0x000000000AC50000-0x000000000B268000-memory.dmp

                      Filesize

                      6.1MB

                    • memory/2220-173-0x0000000000400000-0x000000000040A000-memory.dmp

                      Filesize

                      40KB