Analysis

  • max time kernel
    103s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31/05/2023, 20:35

General

  • Target

    ee26b79e86a06e98cd34b7ad644439513f86dfd4f181528a2281d59fc61821d2.exe

  • Size

    751KB

  • MD5

    8e4febed5cc440df88a6382ef3e815a3

  • SHA1

    b46142b4c614641cf320e71117170bbc57aed382

  • SHA256

    ee26b79e86a06e98cd34b7ad644439513f86dfd4f181528a2281d59fc61821d2

  • SHA512

    c0c10e2f05dd69fb056bb96778dd975b58001c108694b63aa19802a0dc9f7b3451da05f4fb85f87805a0056366412d9e67abf1ae2ea9a0ad68769fe8d4cbf2a1

  • SSDEEP

    12288:bMrry90ue2zpVE48eYiQc6YqUg5q4FnDbzd8FqorURxr/zFZV7bx13EHebwdOA:0yLr8e9Ng3FR8furEuA

Malware Config

Extracted

Family

redline

Botnet

dars

C2

83.97.73.127:19045

Attributes
  • auth_value

    7cd208e6b6c927262304d5d4d88647fd

Extracted

Family

redline

Botnet

nitro

C2

83.97.73.127:19045

Attributes
  • auth_value

    1b68cf84b9b046f28b71cb39e44aa0e4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee26b79e86a06e98cd34b7ad644439513f86dfd4f181528a2281d59fc61821d2.exe
    "C:\Users\Admin\AppData\Local\Temp\ee26b79e86a06e98cd34b7ad644439513f86dfd4f181528a2281d59fc61821d2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3347069.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3347069.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3640
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4030089.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4030089.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4544
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2370882.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2370882.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4652
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0180294.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0180294.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3704
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2492
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2673953.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2673953.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4724
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1324
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
            5⤵
            • Loads dropped DLL
            PID:4940
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7991287.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7991287.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:5024
  • C:\Windows\SysWOW64\cmd.exe
    "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4376
    • C:\Windows\SysWOW64\cacls.exe
      CACLS "metado.exe" /P "Admin:R" /E
      2⤵
        PID:4752
      • C:\Windows\SysWOW64\cacls.exe
        CACLS "..\a9e2a16078" /P "Admin:R" /E
        2⤵
          PID:4400
        • C:\Windows\SysWOW64\cacls.exe
          CACLS "..\a9e2a16078" /P "Admin:N"
          2⤵
            PID:3888
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            2⤵
              PID:4732
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metado.exe" /P "Admin:N"
              2⤵
                PID:2636
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                2⤵
                  PID:4432
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                1⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4348
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
                1⤵
                • Creates scheduled task(s)
                PID:5076
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:3584
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:4948

              Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                      Filesize

                      226B

                      MD5

                      957779c42144282d8cd83192b8fbc7cf

                      SHA1

                      de83d08d2cca06b9ff3d1ef239d6b60b705d25fe

                      SHA256

                      0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51

                      SHA512

                      f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7991287.exe

                      Filesize

                      323KB

                      MD5

                      f8cbfb69f9d5cc91b5189aa888e8c20e

                      SHA1

                      ed7952efa12fd34cae96b3186c1933701b132e13

                      SHA256

                      92593485a178a3d73fb7c0744939744d521e7c5777dca95673da12d87cae2b9d

                      SHA512

                      349be98a076920d7e7ed84b5b331019e98463782b09fd563c324ce418c90c29a06df9248dd8fbbdb36aeb7097834686a7b78fd3b33d8ce4209f2f1b12fdbf300

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7991287.exe

                      Filesize

                      323KB

                      MD5

                      f8cbfb69f9d5cc91b5189aa888e8c20e

                      SHA1

                      ed7952efa12fd34cae96b3186c1933701b132e13

                      SHA256

                      92593485a178a3d73fb7c0744939744d521e7c5777dca95673da12d87cae2b9d

                      SHA512

                      349be98a076920d7e7ed84b5b331019e98463782b09fd563c324ce418c90c29a06df9248dd8fbbdb36aeb7097834686a7b78fd3b33d8ce4209f2f1b12fdbf300

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3347069.exe

                      Filesize

                      451KB

                      MD5

                      e3848d2e5ad030e94e685774c28f566c

                      SHA1

                      66d7784d65ccdb7f08fffb7fc288604e99474c70

                      SHA256

                      632e2f113e6460fd2bbf2c551f47093c73fa9e87bf9c566236d336cf23388ece

                      SHA512

                      a4d04cee95f98721b4dd26e7ad1d0537093bb9426b55d293187fcd0e89edde4ef19657d2ce1e9a6d0e2edbdd225c723c8ddb53907bfad2a2895a649e519cfbce

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3347069.exe

                      Filesize

                      451KB

                      MD5

                      e3848d2e5ad030e94e685774c28f566c

                      SHA1

                      66d7784d65ccdb7f08fffb7fc288604e99474c70

                      SHA256

                      632e2f113e6460fd2bbf2c551f47093c73fa9e87bf9c566236d336cf23388ece

                      SHA512

                      a4d04cee95f98721b4dd26e7ad1d0537093bb9426b55d293187fcd0e89edde4ef19657d2ce1e9a6d0e2edbdd225c723c8ddb53907bfad2a2895a649e519cfbce

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2673953.exe

                      Filesize

                      212KB

                      MD5

                      5bcdf1a42fbcbb00fa2db534984f7eba

                      SHA1

                      0962c38f1dbc3eeb1bfcd17385db53a16740b285

                      SHA256

                      e3b64781480e6c64c0aa26d819689adeff695967664f8353d428fb7ba8cc32dc

                      SHA512

                      ce94c8e184c8cee8e1f152e1e7ad4be40acf79d70c6c2bfd3d7abb06134d9474e7c1c6a1015971b6e6ffdadb79a9aa221fc0b6e233036e1b88679208e72e8c2d

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2673953.exe

                      Filesize

                      212KB

                      MD5

                      5bcdf1a42fbcbb00fa2db534984f7eba

                      SHA1

                      0962c38f1dbc3eeb1bfcd17385db53a16740b285

                      SHA256

                      e3b64781480e6c64c0aa26d819689adeff695967664f8353d428fb7ba8cc32dc

                      SHA512

                      ce94c8e184c8cee8e1f152e1e7ad4be40acf79d70c6c2bfd3d7abb06134d9474e7c1c6a1015971b6e6ffdadb79a9aa221fc0b6e233036e1b88679208e72e8c2d

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4030089.exe

                      Filesize

                      279KB

                      MD5

                      5321651cfb3ce9bd7eaff1a6c7d185cc

                      SHA1

                      c35a4fd68c5b3e14dedb4a1d070a86129ca114a4

                      SHA256

                      e0bd5a27023abca0072ad64380643035400ec99f57f40ad23a7f8c8388dee794

                      SHA512

                      9a2174b90f3f4973f22aa280e3b25f623e64c6ce12b272da424077cfdd218b34ef61d6f8043f6b1270acf31f6c4c23268c9657ddd9a06f52d25c555e389e9b1d

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4030089.exe

                      Filesize

                      279KB

                      MD5

                      5321651cfb3ce9bd7eaff1a6c7d185cc

                      SHA1

                      c35a4fd68c5b3e14dedb4a1d070a86129ca114a4

                      SHA256

                      e0bd5a27023abca0072ad64380643035400ec99f57f40ad23a7f8c8388dee794

                      SHA512

                      9a2174b90f3f4973f22aa280e3b25f623e64c6ce12b272da424077cfdd218b34ef61d6f8043f6b1270acf31f6c4c23268c9657ddd9a06f52d25c555e389e9b1d

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2370882.exe

                      Filesize

                      168KB

                      MD5

                      1ae30aeac55fcab5ffab27b5159693f6

                      SHA1

                      1994ca7a5cb55a5fad2b59ba49d2a74c3e63b346

                      SHA256

                      c3a620d69cc7613301722c7b4677a269f794aa046480b09097dadf0abe7b0906

                      SHA512

                      fadd731fad44506b4a8cc1446dddaa802f58c98ac56b5b44d264ab690730d8d0d415603832fbea5866774049f9b1f08ac5ffaf31c90a9ba4cd5fa5594cbc8e54

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2370882.exe

                      Filesize

                      168KB

                      MD5

                      1ae30aeac55fcab5ffab27b5159693f6

                      SHA1

                      1994ca7a5cb55a5fad2b59ba49d2a74c3e63b346

                      SHA256

                      c3a620d69cc7613301722c7b4677a269f794aa046480b09097dadf0abe7b0906

                      SHA512

                      fadd731fad44506b4a8cc1446dddaa802f58c98ac56b5b44d264ab690730d8d0d415603832fbea5866774049f9b1f08ac5ffaf31c90a9ba4cd5fa5594cbc8e54

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0180294.exe

                      Filesize

                      166KB

                      MD5

                      6f9316a4b0747621a815e568e3041fd6

                      SHA1

                      fd56eb853bc451c748ecbb49e9337fd83e3c0e35

                      SHA256

                      ae834d42eb460dc70a6725a80eccc570ce63964b906439cab23ab8bc9c29a7e8

                      SHA512

                      5efcf3dfcef764101da78d97e33fef804ea8b1ab33af91109f65f868d3d88350d75e6fd8a58659c6d19c1b5fc01bc45d6540525f12106991a7ed2035ffbfca0d

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0180294.exe

                      Filesize

                      166KB

                      MD5

                      6f9316a4b0747621a815e568e3041fd6

                      SHA1

                      fd56eb853bc451c748ecbb49e9337fd83e3c0e35

                      SHA256

                      ae834d42eb460dc70a6725a80eccc570ce63964b906439cab23ab8bc9c29a7e8

                      SHA512

                      5efcf3dfcef764101da78d97e33fef804ea8b1ab33af91109f65f868d3d88350d75e6fd8a58659c6d19c1b5fc01bc45d6540525f12106991a7ed2035ffbfca0d

                    • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                      Filesize

                      212KB

                      MD5

                      5bcdf1a42fbcbb00fa2db534984f7eba

                      SHA1

                      0962c38f1dbc3eeb1bfcd17385db53a16740b285

                      SHA256

                      e3b64781480e6c64c0aa26d819689adeff695967664f8353d428fb7ba8cc32dc

                      SHA512

                      ce94c8e184c8cee8e1f152e1e7ad4be40acf79d70c6c2bfd3d7abb06134d9474e7c1c6a1015971b6e6ffdadb79a9aa221fc0b6e233036e1b88679208e72e8c2d

                    • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                      Filesize

                      212KB

                      MD5

                      5bcdf1a42fbcbb00fa2db534984f7eba

                      SHA1

                      0962c38f1dbc3eeb1bfcd17385db53a16740b285

                      SHA256

                      e3b64781480e6c64c0aa26d819689adeff695967664f8353d428fb7ba8cc32dc

                      SHA512

                      ce94c8e184c8cee8e1f152e1e7ad4be40acf79d70c6c2bfd3d7abb06134d9474e7c1c6a1015971b6e6ffdadb79a9aa221fc0b6e233036e1b88679208e72e8c2d

                    • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                      Filesize

                      212KB

                      MD5

                      5bcdf1a42fbcbb00fa2db534984f7eba

                      SHA1

                      0962c38f1dbc3eeb1bfcd17385db53a16740b285

                      SHA256

                      e3b64781480e6c64c0aa26d819689adeff695967664f8353d428fb7ba8cc32dc

                      SHA512

                      ce94c8e184c8cee8e1f152e1e7ad4be40acf79d70c6c2bfd3d7abb06134d9474e7c1c6a1015971b6e6ffdadb79a9aa221fc0b6e233036e1b88679208e72e8c2d

                    • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                      Filesize

                      212KB

                      MD5

                      5bcdf1a42fbcbb00fa2db534984f7eba

                      SHA1

                      0962c38f1dbc3eeb1bfcd17385db53a16740b285

                      SHA256

                      e3b64781480e6c64c0aa26d819689adeff695967664f8353d428fb7ba8cc32dc

                      SHA512

                      ce94c8e184c8cee8e1f152e1e7ad4be40acf79d70c6c2bfd3d7abb06134d9474e7c1c6a1015971b6e6ffdadb79a9aa221fc0b6e233036e1b88679208e72e8c2d

                    • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                      Filesize

                      212KB

                      MD5

                      5bcdf1a42fbcbb00fa2db534984f7eba

                      SHA1

                      0962c38f1dbc3eeb1bfcd17385db53a16740b285

                      SHA256

                      e3b64781480e6c64c0aa26d819689adeff695967664f8353d428fb7ba8cc32dc

                      SHA512

                      ce94c8e184c8cee8e1f152e1e7ad4be40acf79d70c6c2bfd3d7abb06134d9474e7c1c6a1015971b6e6ffdadb79a9aa221fc0b6e233036e1b88679208e72e8c2d

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      547bae937be965d63f61d89e8eafb4a1

                      SHA1

                      85466c95625bcbb7f68aa89a367149d35f80e1fa

                      SHA256

                      015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                      SHA512

                      1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      547bae937be965d63f61d89e8eafb4a1

                      SHA1

                      85466c95625bcbb7f68aa89a367149d35f80e1fa

                      SHA256

                      015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                      SHA512

                      1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                      Filesize

                      162B

                      MD5

                      1b7c22a214949975556626d7217e9a39

                      SHA1

                      d01c97e2944166ed23e47e4a62ff471ab8fa031f

                      SHA256

                      340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                      SHA512

                      ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                    • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      547bae937be965d63f61d89e8eafb4a1

                      SHA1

                      85466c95625bcbb7f68aa89a367149d35f80e1fa

                      SHA256

                      015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                      SHA512

                      1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

                    • memory/2492-161-0x0000000000400000-0x000000000040A000-memory.dmp

                      Filesize

                      40KB

                    • memory/4348-192-0x0000000009480000-0x0000000009490000-memory.dmp

                      Filesize

                      64KB

                    • memory/4348-190-0x0000000006D80000-0x0000000006D86000-memory.dmp

                      Filesize

                      24KB

                    • memory/4348-588-0x0000000009480000-0x0000000009490000-memory.dmp

                      Filesize

                      64KB

                    • memory/4348-182-0x0000000000400000-0x000000000042E000-memory.dmp

                      Filesize

                      184KB

                    • memory/4348-191-0x000000000EA50000-0x000000000EA9B000-memory.dmp

                      Filesize

                      300KB

                    • memory/4652-150-0x000000000A430000-0x000000000A4C2000-memory.dmp

                      Filesize

                      584KB

                    • memory/4652-148-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4652-152-0x000000000B490000-0x000000000B98E000-memory.dmp

                      Filesize

                      5.0MB

                    • memory/4652-153-0x000000000B000000-0x000000000B050000-memory.dmp

                      Filesize

                      320KB

                    • memory/4652-154-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4652-151-0x000000000A390000-0x000000000A3F6000-memory.dmp

                      Filesize

                      408KB

                    • memory/4652-156-0x000000000C090000-0x000000000C5BC000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/4652-149-0x000000000A310000-0x000000000A386000-memory.dmp

                      Filesize

                      472KB

                    • memory/4652-155-0x000000000B990000-0x000000000BB52000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/4652-147-0x000000000A190000-0x000000000A1DB000-memory.dmp

                      Filesize

                      300KB

                    • memory/4652-146-0x0000000009FF0000-0x000000000A02E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4652-145-0x0000000009F90000-0x0000000009FA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4652-144-0x000000000A080000-0x000000000A18A000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/4652-143-0x000000000A580000-0x000000000AB86000-memory.dmp

                      Filesize

                      6.0MB

                    • memory/4652-142-0x00000000008D0000-0x00000000008D6000-memory.dmp

                      Filesize

                      24KB

                    • memory/4652-141-0x0000000000260000-0x000000000028E000-memory.dmp

                      Filesize

                      184KB