Analysis

  • max time kernel
    140s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-06-2023 10:00

General

  • Target

    5cfda34a3c160d5aa74f28ff24a7327aa4777c20200d048887ac175bffa902e9.exe

  • Size

    779KB

  • MD5

    11585a9cc93902a33fe449b389a10e32

  • SHA1

    38ded9d1fe49abf6ae49a8fadb4d850a5c977b49

  • SHA256

    5cfda34a3c160d5aa74f28ff24a7327aa4777c20200d048887ac175bffa902e9

  • SHA512

    98ba1247355157ac159520dc543b28904a03dca747b5dddf3db2e8e69ec21184b831380d39414f0a4ea83e4f60cac7baab0642c3cd0f1bdfbf10aaf03a096747

  • SSDEEP

    12288:eMrly90xXAhkDms+YskooWsLSR/cqHpe/hexKmji6l2VwaOLR+0VlPopWqV:ryWAhQXDSlc8peRmji6lAwJLBVljqV

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19046

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5cfda34a3c160d5aa74f28ff24a7327aa4777c20200d048887ac175bffa902e9.exe
    "C:\Users\Admin\AppData\Local\Temp\5cfda34a3c160d5aa74f28ff24a7327aa4777c20200d048887ac175bffa902e9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4416
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6345013.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6345013.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4832
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4016632.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4016632.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4208
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a9862367.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a9862367.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:664
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3056
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1198190.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1198190.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3288
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2745705.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2745705.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3540
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4892
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:2420
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2892
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:1532
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:1560
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:1284
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:1036
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:4876
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:4784
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:3596
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8761617.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8761617.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:1404
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:872
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:4448
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:460
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:3788

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                226B

                MD5

                916851e072fbabc4796d8916c5131092

                SHA1

                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                SHA256

                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                SHA512

                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8761617.exe

                Filesize

                304KB

                MD5

                ec84656889dc7fdd1d7333cf99a6b2ed

                SHA1

                2ce966283d0119043acf383b05e702c25995b89a

                SHA256

                9796fb5032eb7706b059d3a93757d36c0bedd9827c1cf221ecfefa7b1c3e1fa8

                SHA512

                219385fc4602f9380597df4ad08a62cd765939623b15f354a5b7d4dabe1d6374eb18fdf0a5142ddaef55fc18c918647cd72486333263d2cbf1a864690c9265f6

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8761617.exe

                Filesize

                304KB

                MD5

                ec84656889dc7fdd1d7333cf99a6b2ed

                SHA1

                2ce966283d0119043acf383b05e702c25995b89a

                SHA256

                9796fb5032eb7706b059d3a93757d36c0bedd9827c1cf221ecfefa7b1c3e1fa8

                SHA512

                219385fc4602f9380597df4ad08a62cd765939623b15f354a5b7d4dabe1d6374eb18fdf0a5142ddaef55fc18c918647cd72486333263d2cbf1a864690c9265f6

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6345013.exe

                Filesize

                448KB

                MD5

                af0823a4f9f3c8f00ab68a4ac6031548

                SHA1

                e91334ec39874b1a759be8112061025d20cc28f3

                SHA256

                f30bdbe7fe4914b318759f1d2c762242713355c010cc7402cb06a98c4fb4add8

                SHA512

                bb181c0cb2587817ef8cadadbe2841edff7e736c623c2cc066b1dd3a8d0b8e64a064fdc91606dee5e039241b34c473b9d110c3ecf241bab7caab6954f27c40d0

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6345013.exe

                Filesize

                448KB

                MD5

                af0823a4f9f3c8f00ab68a4ac6031548

                SHA1

                e91334ec39874b1a759be8112061025d20cc28f3

                SHA256

                f30bdbe7fe4914b318759f1d2c762242713355c010cc7402cb06a98c4fb4add8

                SHA512

                bb181c0cb2587817ef8cadadbe2841edff7e736c623c2cc066b1dd3a8d0b8e64a064fdc91606dee5e039241b34c473b9d110c3ecf241bab7caab6954f27c40d0

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2745705.exe

                Filesize

                216KB

                MD5

                87c40ba25df7538954240a2b424aa5ed

                SHA1

                310333d9675aa61c15622bcec78b93ce4279c1fb

                SHA256

                ccc27c705714abd0c7bae1df8910f3e8f585f69c1b97a87548857a0c70346eaa

                SHA512

                348c9789f8a3489d7ad17cfb3a3e5d40ab96af89d125d97d1823be2246835a981d76ec1ba37ac70e6b4aab5deee306d21d379108655e22e5db6c523b0446ce74

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2745705.exe

                Filesize

                216KB

                MD5

                87c40ba25df7538954240a2b424aa5ed

                SHA1

                310333d9675aa61c15622bcec78b93ce4279c1fb

                SHA256

                ccc27c705714abd0c7bae1df8910f3e8f585f69c1b97a87548857a0c70346eaa

                SHA512

                348c9789f8a3489d7ad17cfb3a3e5d40ab96af89d125d97d1823be2246835a981d76ec1ba37ac70e6b4aab5deee306d21d379108655e22e5db6c523b0446ce74

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4016632.exe

                Filesize

                277KB

                MD5

                2b02c0577306a5ab38510cf250cb72fd

                SHA1

                68775ab6b5749f696fa9e5e9bee1aaabaee986fb

                SHA256

                220c2336220309afc59c0605791d3d5d2b8a0e73ca0d417749a841d793e3a63a

                SHA512

                33e4fd736cf6d55f4708c5b306f0b8eb1c210266c8a706b7350ce244ed05af1cc408ea4d1d1f9fc316c1e14051fc9a6e9be61cff34e6aae03971c44bf1653dc6

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4016632.exe

                Filesize

                277KB

                MD5

                2b02c0577306a5ab38510cf250cb72fd

                SHA1

                68775ab6b5749f696fa9e5e9bee1aaabaee986fb

                SHA256

                220c2336220309afc59c0605791d3d5d2b8a0e73ca0d417749a841d793e3a63a

                SHA512

                33e4fd736cf6d55f4708c5b306f0b8eb1c210266c8a706b7350ce244ed05af1cc408ea4d1d1f9fc316c1e14051fc9a6e9be61cff34e6aae03971c44bf1653dc6

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a9862367.exe

                Filesize

                147KB

                MD5

                c05448ab6f363dd717e01a5fad7d27c1

                SHA1

                b7ec8d8d7b431450a740ac389801f26e6fc61482

                SHA256

                0c6ae08c2bfe5501d750ecc32ff6de21abf2153bddfb45210e0704af94ba590b

                SHA512

                8dd151b3718767cb19d335807250a698f093b3d3cde1670f1be0c79f2b3985d2ce0d4aef3be286237cbcb0c310f663cd7d1409a25512069acc8b36861ce899f1

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a9862367.exe

                Filesize

                147KB

                MD5

                c05448ab6f363dd717e01a5fad7d27c1

                SHA1

                b7ec8d8d7b431450a740ac389801f26e6fc61482

                SHA256

                0c6ae08c2bfe5501d750ecc32ff6de21abf2153bddfb45210e0704af94ba590b

                SHA512

                8dd151b3718767cb19d335807250a698f093b3d3cde1670f1be0c79f2b3985d2ce0d4aef3be286237cbcb0c310f663cd7d1409a25512069acc8b36861ce899f1

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1198190.exe

                Filesize

                168KB

                MD5

                cf8972d3898cf079e76d4b8ccc8b0004

                SHA1

                f54f9e9233cb482961c2f691d972b1dd414865f7

                SHA256

                97949384043cf3e9f9806121590d92b74554df3a356cb4d5224fcb6c831d4b05

                SHA512

                01129b1aa08af04227ca5564507ca2e8df21d03708643cb45b6137e60ba3bf415c0ee3ee13ac84aa2cb9f8610cf3dfa543416f88a4cb05a6ecdbb5640ffacc59

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1198190.exe

                Filesize

                168KB

                MD5

                cf8972d3898cf079e76d4b8ccc8b0004

                SHA1

                f54f9e9233cb482961c2f691d972b1dd414865f7

                SHA256

                97949384043cf3e9f9806121590d92b74554df3a356cb4d5224fcb6c831d4b05

                SHA512

                01129b1aa08af04227ca5564507ca2e8df21d03708643cb45b6137e60ba3bf415c0ee3ee13ac84aa2cb9f8610cf3dfa543416f88a4cb05a6ecdbb5640ffacc59

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                87c40ba25df7538954240a2b424aa5ed

                SHA1

                310333d9675aa61c15622bcec78b93ce4279c1fb

                SHA256

                ccc27c705714abd0c7bae1df8910f3e8f585f69c1b97a87548857a0c70346eaa

                SHA512

                348c9789f8a3489d7ad17cfb3a3e5d40ab96af89d125d97d1823be2246835a981d76ec1ba37ac70e6b4aab5deee306d21d379108655e22e5db6c523b0446ce74

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                87c40ba25df7538954240a2b424aa5ed

                SHA1

                310333d9675aa61c15622bcec78b93ce4279c1fb

                SHA256

                ccc27c705714abd0c7bae1df8910f3e8f585f69c1b97a87548857a0c70346eaa

                SHA512

                348c9789f8a3489d7ad17cfb3a3e5d40ab96af89d125d97d1823be2246835a981d76ec1ba37ac70e6b4aab5deee306d21d379108655e22e5db6c523b0446ce74

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                87c40ba25df7538954240a2b424aa5ed

                SHA1

                310333d9675aa61c15622bcec78b93ce4279c1fb

                SHA256

                ccc27c705714abd0c7bae1df8910f3e8f585f69c1b97a87548857a0c70346eaa

                SHA512

                348c9789f8a3489d7ad17cfb3a3e5d40ab96af89d125d97d1823be2246835a981d76ec1ba37ac70e6b4aab5deee306d21d379108655e22e5db6c523b0446ce74

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                87c40ba25df7538954240a2b424aa5ed

                SHA1

                310333d9675aa61c15622bcec78b93ce4279c1fb

                SHA256

                ccc27c705714abd0c7bae1df8910f3e8f585f69c1b97a87548857a0c70346eaa

                SHA512

                348c9789f8a3489d7ad17cfb3a3e5d40ab96af89d125d97d1823be2246835a981d76ec1ba37ac70e6b4aab5deee306d21d379108655e22e5db6c523b0446ce74

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                87c40ba25df7538954240a2b424aa5ed

                SHA1

                310333d9675aa61c15622bcec78b93ce4279c1fb

                SHA256

                ccc27c705714abd0c7bae1df8910f3e8f585f69c1b97a87548857a0c70346eaa

                SHA512

                348c9789f8a3489d7ad17cfb3a3e5d40ab96af89d125d97d1823be2246835a981d76ec1ba37ac70e6b4aab5deee306d21d379108655e22e5db6c523b0446ce74

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                87c40ba25df7538954240a2b424aa5ed

                SHA1

                310333d9675aa61c15622bcec78b93ce4279c1fb

                SHA256

                ccc27c705714abd0c7bae1df8910f3e8f585f69c1b97a87548857a0c70346eaa

                SHA512

                348c9789f8a3489d7ad17cfb3a3e5d40ab96af89d125d97d1823be2246835a981d76ec1ba37ac70e6b4aab5deee306d21d379108655e22e5db6c523b0446ce74

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/872-194-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/872-200-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

                Filesize

                64KB

              • memory/3056-154-0x00000000001A0000-0x00000000001AA000-memory.dmp

                Filesize

                40KB

              • memory/3288-163-0x000000000A800000-0x000000000AE18000-memory.dmp

                Filesize

                6.1MB

              • memory/3288-176-0x000000000C350000-0x000000000C87C000-memory.dmp

                Filesize

                5.2MB

              • memory/3288-175-0x000000000BC50000-0x000000000BE12000-memory.dmp

                Filesize

                1.8MB

              • memory/3288-174-0x0000000004D50000-0x0000000004D60000-memory.dmp

                Filesize

                64KB

              • memory/3288-172-0x000000000B330000-0x000000000B380000-memory.dmp

                Filesize

                320KB

              • memory/3288-171-0x000000000AF20000-0x000000000AF86000-memory.dmp

                Filesize

                408KB

              • memory/3288-170-0x000000000B3D0000-0x000000000B974000-memory.dmp

                Filesize

                5.6MB

              • memory/3288-169-0x000000000A700000-0x000000000A792000-memory.dmp

                Filesize

                584KB

              • memory/3288-168-0x000000000A5E0000-0x000000000A656000-memory.dmp

                Filesize

                472KB

              • memory/3288-167-0x0000000004D50000-0x0000000004D60000-memory.dmp

                Filesize

                64KB

              • memory/3288-166-0x000000000A2D0000-0x000000000A30C000-memory.dmp

                Filesize

                240KB

              • memory/3288-165-0x000000000A270000-0x000000000A282000-memory.dmp

                Filesize

                72KB

              • memory/3288-164-0x000000000A340000-0x000000000A44A000-memory.dmp

                Filesize

                1.0MB

              • memory/3288-162-0x00000000003C0000-0x00000000003EE000-memory.dmp

                Filesize

                184KB