Analysis

  • max time kernel
    147s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-06-2023 09:52

General

  • Target

    19e57872ac048c54a88c7b3e432ddd2c097e8a2d1ab488e8ae986e39d1cdb6a1.exe

  • Size

    778KB

  • MD5

    aed7fc4607c16922fccf439f2a6fb326

  • SHA1

    d9d4775051369deeb8a1b1fd9c225100bb71dace

  • SHA256

    19e57872ac048c54a88c7b3e432ddd2c097e8a2d1ab488e8ae986e39d1cdb6a1

  • SHA512

    b2b0c3c0ec94474d6ff720e6150fac1541fd89ae1026910851a5474f99d8296a335e7c9b4813af9f50760d44a6191ad6cee5eae3352105e0c4b0e1d6d4ca0340

  • SSDEEP

    12288:xMrTy90u0yEPdQ2VNtEBsW2q2hYroPsSby95PXW13ovRs01MP0Jolw:Ky+FPdQ2Vc6SroPsSN1Yvb1MEolw

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19046

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19e57872ac048c54a88c7b3e432ddd2c097e8a2d1ab488e8ae986e39d1cdb6a1.exe
    "C:\Users\Admin\AppData\Local\Temp\19e57872ac048c54a88c7b3e432ddd2c097e8a2d1ab488e8ae986e39d1cdb6a1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3891625.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3891625.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4368
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3151507.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3151507.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2272
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2268732.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2268732.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3720
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4708
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9391394.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9391394.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4272
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1320536.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1320536.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2072
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1204
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:5108
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3152
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:3156
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:3196
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:3516
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:4956
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:4268
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:2776
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:1980
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2690552.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2690552.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:4224
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3760
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:540
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:2696
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:4116

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                226B

                MD5

                916851e072fbabc4796d8916c5131092

                SHA1

                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                SHA256

                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                SHA512

                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2690552.exe

                Filesize

                304KB

                MD5

                6490abcfd87ab1d1fb4aa19481a69498

                SHA1

                213082e1a9fbd07b19d0626cdbb89b0f29fa5e71

                SHA256

                b291baa56142778604a514eff76c3ef1d434769ac165adc8251fb129937ff3e3

                SHA512

                e43ba119e5b2ba1960b98c126309634cd8fc16a82c4b6cb34bf6d1f046e2fea63010e6bf47b6c89da58bbb2ac070f639d534781fd30362ef19bd871f49b590d6

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2690552.exe

                Filesize

                304KB

                MD5

                6490abcfd87ab1d1fb4aa19481a69498

                SHA1

                213082e1a9fbd07b19d0626cdbb89b0f29fa5e71

                SHA256

                b291baa56142778604a514eff76c3ef1d434769ac165adc8251fb129937ff3e3

                SHA512

                e43ba119e5b2ba1960b98c126309634cd8fc16a82c4b6cb34bf6d1f046e2fea63010e6bf47b6c89da58bbb2ac070f639d534781fd30362ef19bd871f49b590d6

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3891625.exe

                Filesize

                448KB

                MD5

                8631120ec45549421e4f6bd68063639b

                SHA1

                6dc550f63776d6b29b1c9047dddd849b49e7fbf0

                SHA256

                a437790f00ab31dbce5686fd7d23cddf507607ce1098ee3bd6d4f50dbb7c855f

                SHA512

                cc7c5f191fdcc45af1cd800ccc2e816b760c605f79cb426906ba972d4dbbfc15761d259b4b55ce5c103fa149e3ac729cf619b137e660600928026f6a7898e07b

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3891625.exe

                Filesize

                448KB

                MD5

                8631120ec45549421e4f6bd68063639b

                SHA1

                6dc550f63776d6b29b1c9047dddd849b49e7fbf0

                SHA256

                a437790f00ab31dbce5686fd7d23cddf507607ce1098ee3bd6d4f50dbb7c855f

                SHA512

                cc7c5f191fdcc45af1cd800ccc2e816b760c605f79cb426906ba972d4dbbfc15761d259b4b55ce5c103fa149e3ac729cf619b137e660600928026f6a7898e07b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1320536.exe

                Filesize

                216KB

                MD5

                346a95ff6ac7fc6d2e050aa8ff2d8e30

                SHA1

                c3a06880ddaa1c7379f081a726f13873ed5ce22e

                SHA256

                ed944aae77b0f20b13795e77d1c633e9d0706103168c52f93185fe75a2d10190

                SHA512

                2711308c25aabd04df259559a04fac28d135e97ef9911c3d4526292ef6a93389e021a3995de5c94cdc2f483c56baa3822e00ffde221f1fde90bdce84489b10f0

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1320536.exe

                Filesize

                216KB

                MD5

                346a95ff6ac7fc6d2e050aa8ff2d8e30

                SHA1

                c3a06880ddaa1c7379f081a726f13873ed5ce22e

                SHA256

                ed944aae77b0f20b13795e77d1c633e9d0706103168c52f93185fe75a2d10190

                SHA512

                2711308c25aabd04df259559a04fac28d135e97ef9911c3d4526292ef6a93389e021a3995de5c94cdc2f483c56baa3822e00ffde221f1fde90bdce84489b10f0

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3151507.exe

                Filesize

                276KB

                MD5

                226b3ec7bd882680fb76a5337c503d9b

                SHA1

                95c6a95ee066adfff71db9b2fb9ccc1ada724b39

                SHA256

                b2ed8d8d9cbef48b5f4f6c7c0c69c6f9df8e3bd5a71c7daafb5dbd4d559554c3

                SHA512

                5e38686d51c4d4604a172d6ac69e6e81a7ba8996d2522101164c4044d8c36ec2a8923b37e908ba2fb0684d7caa8dab9b518759046adc3e0d45f8f006b4b37dd1

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3151507.exe

                Filesize

                276KB

                MD5

                226b3ec7bd882680fb76a5337c503d9b

                SHA1

                95c6a95ee066adfff71db9b2fb9ccc1ada724b39

                SHA256

                b2ed8d8d9cbef48b5f4f6c7c0c69c6f9df8e3bd5a71c7daafb5dbd4d559554c3

                SHA512

                5e38686d51c4d4604a172d6ac69e6e81a7ba8996d2522101164c4044d8c36ec2a8923b37e908ba2fb0684d7caa8dab9b518759046adc3e0d45f8f006b4b37dd1

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2268732.exe

                Filesize

                147KB

                MD5

                4f52cbf28f48361311ebbabeac0331de

                SHA1

                1ac55baf730b750c038ed181c4329642e5f37788

                SHA256

                9dc1186ae5013f4879b16fa7013abf7ee5c56d2c950426a3ead9d6e3e3546806

                SHA512

                08bd7504544370f40e75456581db5acf16f854c22cf6b0f58d5abb1ee09b5a9ee88214b7e323003321c54b533a8928b6c3d9a00c7e20a7f7e5bcec821ea93ecc

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2268732.exe

                Filesize

                147KB

                MD5

                4f52cbf28f48361311ebbabeac0331de

                SHA1

                1ac55baf730b750c038ed181c4329642e5f37788

                SHA256

                9dc1186ae5013f4879b16fa7013abf7ee5c56d2c950426a3ead9d6e3e3546806

                SHA512

                08bd7504544370f40e75456581db5acf16f854c22cf6b0f58d5abb1ee09b5a9ee88214b7e323003321c54b533a8928b6c3d9a00c7e20a7f7e5bcec821ea93ecc

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9391394.exe

                Filesize

                168KB

                MD5

                60f5d6ddb9bbf6e9ad52f74e94f61b5b

                SHA1

                2e552db2cebaf79c9cefb643d414f2f96ed27937

                SHA256

                964bc76d1372f8a0c6f45adb92431b581956cd804413da50dde35aece4fa69c1

                SHA512

                75aeda0cc0f49deba48edec6b52cc2e23e068792ef53de7e405b5b96b8ec228d441603e86f777d79deaa2c7bc39afb6be2d01290f64b341c67593f7c6cc59570

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9391394.exe

                Filesize

                168KB

                MD5

                60f5d6ddb9bbf6e9ad52f74e94f61b5b

                SHA1

                2e552db2cebaf79c9cefb643d414f2f96ed27937

                SHA256

                964bc76d1372f8a0c6f45adb92431b581956cd804413da50dde35aece4fa69c1

                SHA512

                75aeda0cc0f49deba48edec6b52cc2e23e068792ef53de7e405b5b96b8ec228d441603e86f777d79deaa2c7bc39afb6be2d01290f64b341c67593f7c6cc59570

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                346a95ff6ac7fc6d2e050aa8ff2d8e30

                SHA1

                c3a06880ddaa1c7379f081a726f13873ed5ce22e

                SHA256

                ed944aae77b0f20b13795e77d1c633e9d0706103168c52f93185fe75a2d10190

                SHA512

                2711308c25aabd04df259559a04fac28d135e97ef9911c3d4526292ef6a93389e021a3995de5c94cdc2f483c56baa3822e00ffde221f1fde90bdce84489b10f0

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                346a95ff6ac7fc6d2e050aa8ff2d8e30

                SHA1

                c3a06880ddaa1c7379f081a726f13873ed5ce22e

                SHA256

                ed944aae77b0f20b13795e77d1c633e9d0706103168c52f93185fe75a2d10190

                SHA512

                2711308c25aabd04df259559a04fac28d135e97ef9911c3d4526292ef6a93389e021a3995de5c94cdc2f483c56baa3822e00ffde221f1fde90bdce84489b10f0

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                346a95ff6ac7fc6d2e050aa8ff2d8e30

                SHA1

                c3a06880ddaa1c7379f081a726f13873ed5ce22e

                SHA256

                ed944aae77b0f20b13795e77d1c633e9d0706103168c52f93185fe75a2d10190

                SHA512

                2711308c25aabd04df259559a04fac28d135e97ef9911c3d4526292ef6a93389e021a3995de5c94cdc2f483c56baa3822e00ffde221f1fde90bdce84489b10f0

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                346a95ff6ac7fc6d2e050aa8ff2d8e30

                SHA1

                c3a06880ddaa1c7379f081a726f13873ed5ce22e

                SHA256

                ed944aae77b0f20b13795e77d1c633e9d0706103168c52f93185fe75a2d10190

                SHA512

                2711308c25aabd04df259559a04fac28d135e97ef9911c3d4526292ef6a93389e021a3995de5c94cdc2f483c56baa3822e00ffde221f1fde90bdce84489b10f0

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                346a95ff6ac7fc6d2e050aa8ff2d8e30

                SHA1

                c3a06880ddaa1c7379f081a726f13873ed5ce22e

                SHA256

                ed944aae77b0f20b13795e77d1c633e9d0706103168c52f93185fe75a2d10190

                SHA512

                2711308c25aabd04df259559a04fac28d135e97ef9911c3d4526292ef6a93389e021a3995de5c94cdc2f483c56baa3822e00ffde221f1fde90bdce84489b10f0

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                346a95ff6ac7fc6d2e050aa8ff2d8e30

                SHA1

                c3a06880ddaa1c7379f081a726f13873ed5ce22e

                SHA256

                ed944aae77b0f20b13795e77d1c633e9d0706103168c52f93185fe75a2d10190

                SHA512

                2711308c25aabd04df259559a04fac28d135e97ef9911c3d4526292ef6a93389e021a3995de5c94cdc2f483c56baa3822e00ffde221f1fde90bdce84489b10f0

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/3760-194-0x0000000000790000-0x00000000007BE000-memory.dmp

                Filesize

                184KB

              • memory/3760-200-0x0000000004C30000-0x0000000004C40000-memory.dmp

                Filesize

                64KB

              • memory/4272-163-0x0000000005910000-0x0000000005F28000-memory.dmp

                Filesize

                6.1MB

              • memory/4272-176-0x0000000008AA0000-0x0000000008FCC000-memory.dmp

                Filesize

                5.2MB

              • memory/4272-175-0x0000000006E80000-0x0000000007042000-memory.dmp

                Filesize

                1.8MB

              • memory/4272-174-0x00000000050E0000-0x00000000050F0000-memory.dmp

                Filesize

                64KB

              • memory/4272-173-0x00000000065B0000-0x0000000006600000-memory.dmp

                Filesize

                320KB

              • memory/4272-171-0x0000000005F30000-0x0000000005F96000-memory.dmp

                Filesize

                408KB

              • memory/4272-170-0x00000000068D0000-0x0000000006E74000-memory.dmp

                Filesize

                5.6MB

              • memory/4272-169-0x0000000005870000-0x0000000005902000-memory.dmp

                Filesize

                584KB

              • memory/4272-168-0x0000000005650000-0x00000000056C6000-memory.dmp

                Filesize

                472KB

              • memory/4272-167-0x0000000005310000-0x000000000534C000-memory.dmp

                Filesize

                240KB

              • memory/4272-166-0x00000000052F0000-0x0000000005302000-memory.dmp

                Filesize

                72KB

              • memory/4272-165-0x00000000050E0000-0x00000000050F0000-memory.dmp

                Filesize

                64KB

              • memory/4272-164-0x0000000005400000-0x000000000550A000-memory.dmp

                Filesize

                1.0MB

              • memory/4272-162-0x0000000000850000-0x000000000087E000-memory.dmp

                Filesize

                184KB

              • memory/4708-154-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB