Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04/06/2023, 08:28

General

  • Target

    8778619951d27e091f0d18bcc6398f03e5aa4f78193fc27ecf3e339ca465e41a.exe

  • Size

    777KB

  • MD5

    5179b8f5f0a4a2c88c1c9ab074f50e60

  • SHA1

    b29c860c17dd0e7fd3349c3f1233f421e0240581

  • SHA256

    8778619951d27e091f0d18bcc6398f03e5aa4f78193fc27ecf3e339ca465e41a

  • SHA512

    129d3ad65bb519fa091d8288ea5d7442a41cbded39a6050a8d7f89ef8c930414e0a02aa323c1395ab8d419c7aeaa6abaad16ffd010cc0a04c95cafabc8e821d2

  • SSDEEP

    12288:FMrKy90+dhpOH7XQryEMaoL+Jdl6/It/j0itUeSOo9BbZX8de7DJA+6LFgO9b:HyJdSbXrEMaoaJdEIerlbZEK++HC

Malware Config

Extracted

Family

redline

Botnet

dusa

C2

83.97.73.126:19046

Attributes
  • auth_value

    ee896466545fedf9de5406175fb82de5

Extracted

Family

redline

Botnet

brain

C2

83.97.73.126:19046

Attributes
  • auth_value

    5fb8269baadec0c49899b9a7a0c8851f

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8778619951d27e091f0d18bcc6398f03e5aa4f78193fc27ecf3e339ca465e41a.exe
    "C:\Users\Admin\AppData\Local\Temp\8778619951d27e091f0d18bcc6398f03e5aa4f78193fc27ecf3e339ca465e41a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1296
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9100412.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9100412.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3508
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2082866.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2082866.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2900
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5041833.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5041833.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3956
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7414038.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7414038.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:652
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1000
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8959246.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8959246.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3716
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3864
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:2216
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1960
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:232
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:212
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:208
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:1256
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:2548
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:1508
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:2920
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7696541.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7696541.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:1880
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3176
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:2176
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:2200
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:788

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                226B

                MD5

                957779c42144282d8cd83192b8fbc7cf

                SHA1

                de83d08d2cca06b9ff3d1ef239d6b60b705d25fe

                SHA256

                0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51

                SHA512

                f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7696541.exe

                Filesize

                304KB

                MD5

                8abf78a2ceb07e5b94c2a1205be2988b

                SHA1

                82761754f02980c5314c2fb1c3fe7674e669f958

                SHA256

                6573cbf28a498df8969d523bba77fd3d877e019b1f9af54163a5e4526687ddfd

                SHA512

                736e88b20b43192f687541e39337262456542f6cc7cddb474ebf133cf8cf742231384de7be25f3db3b8cf75da6129e01c276fc630a943fb307538e7473face82

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7696541.exe

                Filesize

                304KB

                MD5

                8abf78a2ceb07e5b94c2a1205be2988b

                SHA1

                82761754f02980c5314c2fb1c3fe7674e669f958

                SHA256

                6573cbf28a498df8969d523bba77fd3d877e019b1f9af54163a5e4526687ddfd

                SHA512

                736e88b20b43192f687541e39337262456542f6cc7cddb474ebf133cf8cf742231384de7be25f3db3b8cf75da6129e01c276fc630a943fb307538e7473face82

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9100412.exe

                Filesize

                447KB

                MD5

                971fcd29ff5189c56eff46412473bb29

                SHA1

                f123d5af0d7b9aa79ad2528b3b4d1183b01ae804

                SHA256

                a4ca12046bd7cd303c2ec9260eabff7685fdc7d3c18d59955660866bef826c60

                SHA512

                ab4c32410aff180dea79cb07004a8f99804fe502bf866d60af837d4371934abae0550a403e784247623d1909b5a383c58f330d8fc4a934e8fedf4dc0406efab5

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9100412.exe

                Filesize

                447KB

                MD5

                971fcd29ff5189c56eff46412473bb29

                SHA1

                f123d5af0d7b9aa79ad2528b3b4d1183b01ae804

                SHA256

                a4ca12046bd7cd303c2ec9260eabff7685fdc7d3c18d59955660866bef826c60

                SHA512

                ab4c32410aff180dea79cb07004a8f99804fe502bf866d60af837d4371934abae0550a403e784247623d1909b5a383c58f330d8fc4a934e8fedf4dc0406efab5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8959246.exe

                Filesize

                217KB

                MD5

                3e8774889bd238f71a1aeb966397467e

                SHA1

                73a348550794425f592e744b226c75155afe1e08

                SHA256

                5362bcaa99124599d3a01ac65dff1b6691427efa4e85895dd9c77731300bd3a2

                SHA512

                f1d3612487a06e5a838f9e41b1f439bb277f12311aae863391ecad494d1e064bb114c6f0e8d431d4113aff8c0112be60bd878b67be4305c8d60b8f98e8a1066e

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8959246.exe

                Filesize

                217KB

                MD5

                3e8774889bd238f71a1aeb966397467e

                SHA1

                73a348550794425f592e744b226c75155afe1e08

                SHA256

                5362bcaa99124599d3a01ac65dff1b6691427efa4e85895dd9c77731300bd3a2

                SHA512

                f1d3612487a06e5a838f9e41b1f439bb277f12311aae863391ecad494d1e064bb114c6f0e8d431d4113aff8c0112be60bd878b67be4305c8d60b8f98e8a1066e

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2082866.exe

                Filesize

                276KB

                MD5

                a1ea5ce58aeac7d65c9b9fbbdba43ba1

                SHA1

                c437afd66eb43981aed4bf3c356d076ec016585c

                SHA256

                8ac49c9cb0d7d032ae73c3c6c3889023b498465ae9c5666f8157ad6966fdd785

                SHA512

                d665361186eafa208d0e60b6e97f38f2ef48ce9ea968d58cdeb6fca0d409ceac7af653c4253b141bea7982c379b473c25d2c4a286f9462ee2702e264c213770e

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2082866.exe

                Filesize

                276KB

                MD5

                a1ea5ce58aeac7d65c9b9fbbdba43ba1

                SHA1

                c437afd66eb43981aed4bf3c356d076ec016585c

                SHA256

                8ac49c9cb0d7d032ae73c3c6c3889023b498465ae9c5666f8157ad6966fdd785

                SHA512

                d665361186eafa208d0e60b6e97f38f2ef48ce9ea968d58cdeb6fca0d409ceac7af653c4253b141bea7982c379b473c25d2c4a286f9462ee2702e264c213770e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5041833.exe

                Filesize

                168KB

                MD5

                be0493931da62e5e6b89dcfd91a4ed1c

                SHA1

                058f89a88ddd02bbcb937c5026e33a6477c90307

                SHA256

                716e7cfae8d1e97314b3b6c4374a8956f56a055f91916af91dd0a4bb5513e777

                SHA512

                1272b0b1f858de8ebfd9808b39cbabdc7ced34c73f434ec392e621fe6b4e691d789b732585652a7ddba84ee2d6475476ae40cf173bef052b8d40f2f1f4abfb26

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5041833.exe

                Filesize

                168KB

                MD5

                be0493931da62e5e6b89dcfd91a4ed1c

                SHA1

                058f89a88ddd02bbcb937c5026e33a6477c90307

                SHA256

                716e7cfae8d1e97314b3b6c4374a8956f56a055f91916af91dd0a4bb5513e777

                SHA512

                1272b0b1f858de8ebfd9808b39cbabdc7ced34c73f434ec392e621fe6b4e691d789b732585652a7ddba84ee2d6475476ae40cf173bef052b8d40f2f1f4abfb26

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7414038.exe

                Filesize

                147KB

                MD5

                7a7a779ea3810053607157f2ce1c2bed

                SHA1

                0b01ed2d20e877414d076acded408db4ff4e635f

                SHA256

                7ce61b9e0769312c8c61199fe3a80399e779cacabcaef46b261c2fc0b036de5e

                SHA512

                2c05a14512940e76e0bf375922a58f923a29e17bff06f4b57e0dd759ec2d5e8d746430d10252cc2a110ed791c925801a654cb6351b1ab1f0bf2c1dcfe33c1933

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7414038.exe

                Filesize

                147KB

                MD5

                7a7a779ea3810053607157f2ce1c2bed

                SHA1

                0b01ed2d20e877414d076acded408db4ff4e635f

                SHA256

                7ce61b9e0769312c8c61199fe3a80399e779cacabcaef46b261c2fc0b036de5e

                SHA512

                2c05a14512940e76e0bf375922a58f923a29e17bff06f4b57e0dd759ec2d5e8d746430d10252cc2a110ed791c925801a654cb6351b1ab1f0bf2c1dcfe33c1933

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                217KB

                MD5

                3e8774889bd238f71a1aeb966397467e

                SHA1

                73a348550794425f592e744b226c75155afe1e08

                SHA256

                5362bcaa99124599d3a01ac65dff1b6691427efa4e85895dd9c77731300bd3a2

                SHA512

                f1d3612487a06e5a838f9e41b1f439bb277f12311aae863391ecad494d1e064bb114c6f0e8d431d4113aff8c0112be60bd878b67be4305c8d60b8f98e8a1066e

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                217KB

                MD5

                3e8774889bd238f71a1aeb966397467e

                SHA1

                73a348550794425f592e744b226c75155afe1e08

                SHA256

                5362bcaa99124599d3a01ac65dff1b6691427efa4e85895dd9c77731300bd3a2

                SHA512

                f1d3612487a06e5a838f9e41b1f439bb277f12311aae863391ecad494d1e064bb114c6f0e8d431d4113aff8c0112be60bd878b67be4305c8d60b8f98e8a1066e

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                217KB

                MD5

                3e8774889bd238f71a1aeb966397467e

                SHA1

                73a348550794425f592e744b226c75155afe1e08

                SHA256

                5362bcaa99124599d3a01ac65dff1b6691427efa4e85895dd9c77731300bd3a2

                SHA512

                f1d3612487a06e5a838f9e41b1f439bb277f12311aae863391ecad494d1e064bb114c6f0e8d431d4113aff8c0112be60bd878b67be4305c8d60b8f98e8a1066e

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                217KB

                MD5

                3e8774889bd238f71a1aeb966397467e

                SHA1

                73a348550794425f592e744b226c75155afe1e08

                SHA256

                5362bcaa99124599d3a01ac65dff1b6691427efa4e85895dd9c77731300bd3a2

                SHA512

                f1d3612487a06e5a838f9e41b1f439bb277f12311aae863391ecad494d1e064bb114c6f0e8d431d4113aff8c0112be60bd878b67be4305c8d60b8f98e8a1066e

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                217KB

                MD5

                3e8774889bd238f71a1aeb966397467e

                SHA1

                73a348550794425f592e744b226c75155afe1e08

                SHA256

                5362bcaa99124599d3a01ac65dff1b6691427efa4e85895dd9c77731300bd3a2

                SHA512

                f1d3612487a06e5a838f9e41b1f439bb277f12311aae863391ecad494d1e064bb114c6f0e8d431d4113aff8c0112be60bd878b67be4305c8d60b8f98e8a1066e

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                217KB

                MD5

                3e8774889bd238f71a1aeb966397467e

                SHA1

                73a348550794425f592e744b226c75155afe1e08

                SHA256

                5362bcaa99124599d3a01ac65dff1b6691427efa4e85895dd9c77731300bd3a2

                SHA512

                f1d3612487a06e5a838f9e41b1f439bb277f12311aae863391ecad494d1e064bb114c6f0e8d431d4113aff8c0112be60bd878b67be4305c8d60b8f98e8a1066e

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • memory/1000-161-0x0000000004380000-0x000000000438A000-memory.dmp

                Filesize

                40KB

              • memory/3176-194-0x00000000056F0000-0x00000000056F6000-memory.dmp

                Filesize

                24KB

              • memory/3176-182-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/3176-195-0x0000000009890000-0x00000000098DB000-memory.dmp

                Filesize

                300KB

              • memory/3176-200-0x0000000009780000-0x0000000009790000-memory.dmp

                Filesize

                64KB

              • memory/3956-146-0x0000000009D50000-0x0000000009D62000-memory.dmp

                Filesize

                72KB

              • memory/3956-156-0x000000000AF90000-0x000000000AFE0000-memory.dmp

                Filesize

                320KB

              • memory/3956-155-0x000000000BE50000-0x000000000C37C000-memory.dmp

                Filesize

                5.2MB

              • memory/3956-154-0x000000000B750000-0x000000000B912000-memory.dmp

                Filesize

                1.8MB

              • memory/3956-153-0x000000000B250000-0x000000000B74E000-memory.dmp

                Filesize

                5.0MB

              • memory/3956-152-0x000000000A140000-0x000000000A1A6000-memory.dmp

                Filesize

                408KB

              • memory/3956-151-0x000000000A1E0000-0x000000000A272000-memory.dmp

                Filesize

                584KB

              • memory/3956-150-0x000000000A0C0000-0x000000000A136000-memory.dmp

                Filesize

                472KB

              • memory/3956-149-0x0000000009DF0000-0x0000000009E3B000-memory.dmp

                Filesize

                300KB

              • memory/3956-148-0x00000000048A0000-0x00000000048B0000-memory.dmp

                Filesize

                64KB

              • memory/3956-147-0x0000000009DB0000-0x0000000009DEE000-memory.dmp

                Filesize

                248KB

              • memory/3956-145-0x0000000009E40000-0x0000000009F4A000-memory.dmp

                Filesize

                1.0MB

              • memory/3956-144-0x000000000A340000-0x000000000A946000-memory.dmp

                Filesize

                6.0MB

              • memory/3956-143-0x0000000000850000-0x0000000000856000-memory.dmp

                Filesize

                24KB

              • memory/3956-142-0x0000000000010000-0x000000000003E000-memory.dmp

                Filesize

                184KB