Analysis

  • max time kernel
    102s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/06/2023, 02:09

General

  • Target

    bd7dc29769774a02d65d61f6c01e8c5e4e5f141f9a13357ff2f30a750a799fc9.exe

  • Size

    777KB

  • MD5

    5993787919daef85ad9d535c9243f522

  • SHA1

    4f2ba7c4a5e023897e28b9924f486286a53ec716

  • SHA256

    bd7dc29769774a02d65d61f6c01e8c5e4e5f141f9a13357ff2f30a750a799fc9

  • SHA512

    eb513e2f2b2f0dce93aa5008a4d19be73d58261a13d831eb13108389a7cbdba4fba1a2c101e7d31270c1a80b9489d95167a6b71b4651177a901b58ca2c33e547

  • SSDEEP

    12288:mMrKy90As9eZlfRQOI7/MbsG3gyQZ8Nk0xcjaEsaqLrXzEDZAYAhZbYJ:4ysQZlJQdTMwagy7sKXzEWY+g

Malware Config

Extracted

Family

redline

Botnet

dusa

C2

83.97.73.126:19046

Attributes
  • auth_value

    ee896466545fedf9de5406175fb82de5

Extracted

Family

redline

Botnet

brain

C2

83.97.73.126:19046

Attributes
  • auth_value

    5fb8269baadec0c49899b9a7a0c8851f

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd7dc29769774a02d65d61f6c01e8c5e4e5f141f9a13357ff2f30a750a799fc9.exe
    "C:\Users\Admin\AppData\Local\Temp\bd7dc29769774a02d65d61f6c01e8c5e4e5f141f9a13357ff2f30a750a799fc9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:464
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0797989.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0797989.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4060
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2490698.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2490698.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4120
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1826921.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1826921.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2672
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0632341.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0632341.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3936
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1948
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7847770.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7847770.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2308
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3424
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:2040
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4828
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:1636
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:2504
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:3156
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:1112
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:2548
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:3780
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:4304
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7248610.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7248610.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:4924
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1148
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:4868
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:4360

              Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                      Filesize

                      226B

                      MD5

                      916851e072fbabc4796d8916c5131092

                      SHA1

                      d48a602229a690c512d5fdaf4c8d77547a88e7a2

                      SHA256

                      7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                      SHA512

                      07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7248610.exe

                      Filesize

                      304KB

                      MD5

                      0b0e7a5a541b30a6254ab0be3439ae93

                      SHA1

                      12967e89165c9803a2715a1276e467aa794d823d

                      SHA256

                      9cbd19b87a04f4f76bb66822f4fe391a2ec1073371a6cb3c16f430c24777ee04

                      SHA512

                      e81c80ad5a5e8048d6464189c3ba15bbe0b3f65fb99106ebaee7b191def81e67bb677b13e37f25cfd120f6f106bd3ab04d266f1aa13a18c375a9948e7f4ca0d6

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7248610.exe

                      Filesize

                      304KB

                      MD5

                      0b0e7a5a541b30a6254ab0be3439ae93

                      SHA1

                      12967e89165c9803a2715a1276e467aa794d823d

                      SHA256

                      9cbd19b87a04f4f76bb66822f4fe391a2ec1073371a6cb3c16f430c24777ee04

                      SHA512

                      e81c80ad5a5e8048d6464189c3ba15bbe0b3f65fb99106ebaee7b191def81e67bb677b13e37f25cfd120f6f106bd3ab04d266f1aa13a18c375a9948e7f4ca0d6

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0797989.exe

                      Filesize

                      448KB

                      MD5

                      3db65896f1bb6e5b50266fd02bc43c5c

                      SHA1

                      a8c99c3f92c86b518c13412c69c07840465f8dc7

                      SHA256

                      2ed200d0cba1f70f01cf6a9e6d9d6bc22cfd46ade7c76acb5fd5985d494a5887

                      SHA512

                      4e0cabc135e400fc4f376d647c031802b60c82bb9a0b4347adbf8bcd48d3028da0075174e2588cf64c220e3d1900bf73d2d976314b73022f1ab622fbe507580e

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0797989.exe

                      Filesize

                      448KB

                      MD5

                      3db65896f1bb6e5b50266fd02bc43c5c

                      SHA1

                      a8c99c3f92c86b518c13412c69c07840465f8dc7

                      SHA256

                      2ed200d0cba1f70f01cf6a9e6d9d6bc22cfd46ade7c76acb5fd5985d494a5887

                      SHA512

                      4e0cabc135e400fc4f376d647c031802b60c82bb9a0b4347adbf8bcd48d3028da0075174e2588cf64c220e3d1900bf73d2d976314b73022f1ab622fbe507580e

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7847770.exe

                      Filesize

                      217KB

                      MD5

                      4ca1ac19d548fb7f4d4acc38277f384a

                      SHA1

                      37f83ed6681fcbdc748246e1d382f8c8cd2ac8f4

                      SHA256

                      819fe7bb2ce786e456c3258ccaf8cf395233accea628fb998caee6be7e2f2839

                      SHA512

                      34094ddab2497d4f7056e5d6d1e2d90ee0452dcff50efbe9f3d750713cd66c98896d318b93191967eb8ee0edb045b0d87c703c03b9899ec77a9e5e954ab130dc

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7847770.exe

                      Filesize

                      217KB

                      MD5

                      4ca1ac19d548fb7f4d4acc38277f384a

                      SHA1

                      37f83ed6681fcbdc748246e1d382f8c8cd2ac8f4

                      SHA256

                      819fe7bb2ce786e456c3258ccaf8cf395233accea628fb998caee6be7e2f2839

                      SHA512

                      34094ddab2497d4f7056e5d6d1e2d90ee0452dcff50efbe9f3d750713cd66c98896d318b93191967eb8ee0edb045b0d87c703c03b9899ec77a9e5e954ab130dc

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2490698.exe

                      Filesize

                      276KB

                      MD5

                      725dd89518d4541de7a2c6a671358073

                      SHA1

                      51cec8a86379206959e92b31ef983c871fa77665

                      SHA256

                      5f4c67a94c2587ce8a79f57bf7f7035aa6479a20cd6707d53f81d5b372819910

                      SHA512

                      e68849940faee8e3a6d5036a3cae1f2ed8ebffe7d6d72db1d88662828831e15ba76baf4e50853ebcf1ceedda5cc9490fa984eca0779cf6dd1aa46f58a3f050b5

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2490698.exe

                      Filesize

                      276KB

                      MD5

                      725dd89518d4541de7a2c6a671358073

                      SHA1

                      51cec8a86379206959e92b31ef983c871fa77665

                      SHA256

                      5f4c67a94c2587ce8a79f57bf7f7035aa6479a20cd6707d53f81d5b372819910

                      SHA512

                      e68849940faee8e3a6d5036a3cae1f2ed8ebffe7d6d72db1d88662828831e15ba76baf4e50853ebcf1ceedda5cc9490fa984eca0779cf6dd1aa46f58a3f050b5

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1826921.exe

                      Filesize

                      168KB

                      MD5

                      6377e6144c243ef428757f6d3f47d7b6

                      SHA1

                      4d28a7beadf6b807bc37e8285154e94171865293

                      SHA256

                      312f7f5738d70b9e10002425c24d227a7f1cae124a044e9d14ccbce9661f49d3

                      SHA512

                      f03edb1c24a6f0f780181de4376798f54f6ce2712f7956b4839ad1566c88242f51d21c38d668a8b2b08145878b0fed90225f32c4d49e62e582f8a4013431eae8

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1826921.exe

                      Filesize

                      168KB

                      MD5

                      6377e6144c243ef428757f6d3f47d7b6

                      SHA1

                      4d28a7beadf6b807bc37e8285154e94171865293

                      SHA256

                      312f7f5738d70b9e10002425c24d227a7f1cae124a044e9d14ccbce9661f49d3

                      SHA512

                      f03edb1c24a6f0f780181de4376798f54f6ce2712f7956b4839ad1566c88242f51d21c38d668a8b2b08145878b0fed90225f32c4d49e62e582f8a4013431eae8

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0632341.exe

                      Filesize

                      147KB

                      MD5

                      ff5414de63b3b655a9e84e166d60b65a

                      SHA1

                      6cd2cf30ba7bae8b09079e31542d0f3066b34881

                      SHA256

                      e9ec12e033e6ffb290f6299f24bcbe1f726d914fae141af5a4dbe26b0f72ce8a

                      SHA512

                      ebec04b4e5a3cba528cd2d5cffc444807318a964afd23ba3e1a84e105e470969c00f53954f66c54914a4590dbadc64ebdf86a6a48174223c4d307327bea657a1

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0632341.exe

                      Filesize

                      147KB

                      MD5

                      ff5414de63b3b655a9e84e166d60b65a

                      SHA1

                      6cd2cf30ba7bae8b09079e31542d0f3066b34881

                      SHA256

                      e9ec12e033e6ffb290f6299f24bcbe1f726d914fae141af5a4dbe26b0f72ce8a

                      SHA512

                      ebec04b4e5a3cba528cd2d5cffc444807318a964afd23ba3e1a84e105e470969c00f53954f66c54914a4590dbadc64ebdf86a6a48174223c4d307327bea657a1

                    • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                      Filesize

                      217KB

                      MD5

                      4ca1ac19d548fb7f4d4acc38277f384a

                      SHA1

                      37f83ed6681fcbdc748246e1d382f8c8cd2ac8f4

                      SHA256

                      819fe7bb2ce786e456c3258ccaf8cf395233accea628fb998caee6be7e2f2839

                      SHA512

                      34094ddab2497d4f7056e5d6d1e2d90ee0452dcff50efbe9f3d750713cd66c98896d318b93191967eb8ee0edb045b0d87c703c03b9899ec77a9e5e954ab130dc

                    • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                      Filesize

                      217KB

                      MD5

                      4ca1ac19d548fb7f4d4acc38277f384a

                      SHA1

                      37f83ed6681fcbdc748246e1d382f8c8cd2ac8f4

                      SHA256

                      819fe7bb2ce786e456c3258ccaf8cf395233accea628fb998caee6be7e2f2839

                      SHA512

                      34094ddab2497d4f7056e5d6d1e2d90ee0452dcff50efbe9f3d750713cd66c98896d318b93191967eb8ee0edb045b0d87c703c03b9899ec77a9e5e954ab130dc

                    • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                      Filesize

                      217KB

                      MD5

                      4ca1ac19d548fb7f4d4acc38277f384a

                      SHA1

                      37f83ed6681fcbdc748246e1d382f8c8cd2ac8f4

                      SHA256

                      819fe7bb2ce786e456c3258ccaf8cf395233accea628fb998caee6be7e2f2839

                      SHA512

                      34094ddab2497d4f7056e5d6d1e2d90ee0452dcff50efbe9f3d750713cd66c98896d318b93191967eb8ee0edb045b0d87c703c03b9899ec77a9e5e954ab130dc

                    • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                      Filesize

                      217KB

                      MD5

                      4ca1ac19d548fb7f4d4acc38277f384a

                      SHA1

                      37f83ed6681fcbdc748246e1d382f8c8cd2ac8f4

                      SHA256

                      819fe7bb2ce786e456c3258ccaf8cf395233accea628fb998caee6be7e2f2839

                      SHA512

                      34094ddab2497d4f7056e5d6d1e2d90ee0452dcff50efbe9f3d750713cd66c98896d318b93191967eb8ee0edb045b0d87c703c03b9899ec77a9e5e954ab130dc

                    • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                      Filesize

                      217KB

                      MD5

                      4ca1ac19d548fb7f4d4acc38277f384a

                      SHA1

                      37f83ed6681fcbdc748246e1d382f8c8cd2ac8f4

                      SHA256

                      819fe7bb2ce786e456c3258ccaf8cf395233accea628fb998caee6be7e2f2839

                      SHA512

                      34094ddab2497d4f7056e5d6d1e2d90ee0452dcff50efbe9f3d750713cd66c98896d318b93191967eb8ee0edb045b0d87c703c03b9899ec77a9e5e954ab130dc

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      547bae937be965d63f61d89e8eafb4a1

                      SHA1

                      85466c95625bcbb7f68aa89a367149d35f80e1fa

                      SHA256

                      015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                      SHA512

                      1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      547bae937be965d63f61d89e8eafb4a1

                      SHA1

                      85466c95625bcbb7f68aa89a367149d35f80e1fa

                      SHA256

                      015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                      SHA512

                      1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      547bae937be965d63f61d89e8eafb4a1

                      SHA1

                      85466c95625bcbb7f68aa89a367149d35f80e1fa

                      SHA256

                      015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                      SHA512

                      1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                      Filesize

                      162B

                      MD5

                      1b7c22a214949975556626d7217e9a39

                      SHA1

                      d01c97e2944166ed23e47e4a62ff471ab8fa031f

                      SHA256

                      340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                      SHA512

                      ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                    • memory/1148-193-0x0000000000400000-0x000000000042E000-memory.dmp

                      Filesize

                      184KB

                    • memory/1148-198-0x00000000050A0000-0x00000000050B0000-memory.dmp

                      Filesize

                      64KB

                    • memory/1948-172-0x0000000000400000-0x000000000040A000-memory.dmp

                      Filesize

                      40KB

                    • memory/2672-157-0x000000000A1B0000-0x000000000A1C2000-memory.dmp

                      Filesize

                      72KB

                    • memory/2672-167-0x000000000C3F0000-0x000000000C91C000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/2672-166-0x000000000BCF0000-0x000000000BEB2000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/2672-165-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2672-164-0x000000000B220000-0x000000000B270000-memory.dmp

                      Filesize

                      320KB

                    • memory/2672-163-0x000000000B740000-0x000000000BCE4000-memory.dmp

                      Filesize

                      5.6MB

                    • memory/2672-162-0x000000000A5A0000-0x000000000A606000-memory.dmp

                      Filesize

                      408KB

                    • memory/2672-161-0x000000000A640000-0x000000000A6D2000-memory.dmp

                      Filesize

                      584KB

                    • memory/2672-160-0x000000000A520000-0x000000000A596000-memory.dmp

                      Filesize

                      472KB

                    • memory/2672-159-0x000000000A210000-0x000000000A24C000-memory.dmp

                      Filesize

                      240KB

                    • memory/2672-158-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2672-156-0x000000000A280000-0x000000000A38A000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/2672-155-0x000000000A770000-0x000000000AD88000-memory.dmp

                      Filesize

                      6.1MB

                    • memory/2672-154-0x0000000000300000-0x000000000032E000-memory.dmp

                      Filesize

                      184KB