Analysis

  • max time kernel
    147s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-06-2023 14:59

General

  • Target

    b555487f27c0eeb7b1accf0d70e682339a0f007848e79b88a29734b6adc3522d.exe

  • Size

    601KB

  • MD5

    77fae6a15569095763ba9196c1b1e359

  • SHA1

    727369c54de31c82e6fa039e02d34e00d1d3648f

  • SHA256

    b555487f27c0eeb7b1accf0d70e682339a0f007848e79b88a29734b6adc3522d

  • SHA512

    5a410bf06b45811319cf626418c92fcea9c3c3fbfff94c574bedeeafd57674d9fe520409444785ad62d135474959fc0a1bfa8594c099db9f9dc960eb3724c39e

  • SSDEEP

    12288:3Mrpy901hwNBeuWTBIzsJD+2ISml3xdr2y/1Q51VgO3cv8WgG6:qywhqBe1T7JD+SmlrrJ/kOOFHv

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.129:19068

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b555487f27c0eeb7b1accf0d70e682339a0f007848e79b88a29734b6adc3522d.exe
    "C:\Users\Admin\AppData\Local\Temp\b555487f27c0eeb7b1accf0d70e682339a0f007848e79b88a29734b6adc3522d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4660
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6921295.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6921295.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1948
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2955082.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2955082.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4256
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7448470.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7448470.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4348
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5575872.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5575872.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2340
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8271643.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8271643.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1656
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2724
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN lamod.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:1516
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "lamod.exe" /P "Admin:N"&&CACLS "lamod.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4456
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "lamod.exe" /P "Admin:N"
              6⤵
                PID:1676
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                6⤵
                  PID:1696
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "lamod.exe" /P "Admin:R" /E
                  6⤵
                    PID:1008
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\a9e2a16078" /P "Admin:N"
                    6⤵
                      PID:996
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      6⤵
                        PID:1884
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:2024
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:4736
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2835922.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2835922.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:4356
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:8
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4356 -s 596
                    3⤵
                    • Program crash
                    PID:2812
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4356 -ip 4356
                1⤵
                  PID:772
                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  1⤵
                  • Executes dropped EXE
                  PID:4632
                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  1⤵
                  • Executes dropped EXE
                  PID:5100

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Execution

                Scheduled Task

                1
                T1053

                Persistence

                Modify Existing Service

                1
                T1031

                Registry Run Keys / Startup Folder

                1
                T1060

                Scheduled Task

                1
                T1053

                Privilege Escalation

                Scheduled Task

                1
                T1053

                Defense Evasion

                Modify Registry

                3
                T1112

                Disabling Security Tools

                2
                T1089

                Credential Access

                Credentials in Files

                2
                T1081

                Discovery

                Query Registry

                2
                T1012

                System Information Discovery

                2
                T1082

                Collection

                Data from Local System

                2
                T1005

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2835922.exe
                  Filesize

                  308KB

                  MD5

                  18e5875f4162ba0fd98084b6eb70b15b

                  SHA1

                  401b4db4bd982c351a14be82ce894a243cfbee28

                  SHA256

                  3be620db652d55b2149e3ac7d21e7844eeb3cb9872477e258ca896e1143f5ef5

                  SHA512

                  6485f5279144537993c9b5521e1da44dc7303b668bc1dab9be08911407229e00772d8fcd9ccc3fbeab7d30abd308ad3e0d36122ed27e0fcf378195be026cce16

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2835922.exe
                  Filesize

                  308KB

                  MD5

                  18e5875f4162ba0fd98084b6eb70b15b

                  SHA1

                  401b4db4bd982c351a14be82ce894a243cfbee28

                  SHA256

                  3be620db652d55b2149e3ac7d21e7844eeb3cb9872477e258ca896e1143f5ef5

                  SHA512

                  6485f5279144537993c9b5521e1da44dc7303b668bc1dab9be08911407229e00772d8fcd9ccc3fbeab7d30abd308ad3e0d36122ed27e0fcf378195be026cce16

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6921295.exe
                  Filesize

                  377KB

                  MD5

                  2afe13b3a88ea787428c19a20bec3f3d

                  SHA1

                  53ec2192fdb7cdeaeb6ef888c7df1ab01d5bada1

                  SHA256

                  d8493df9befd1d9188da4b0d3d43384088f32d43d618328709f32384a306e105

                  SHA512

                  cbd4fff0d13179642a52a0b07b97f8ce0b1e3e72cf91a476982d12d0d639c24b5e6821dc47f6ba0879a8aa39fb37ed3c19086cecef3acdcb2f7b2642646298e6

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6921295.exe
                  Filesize

                  377KB

                  MD5

                  2afe13b3a88ea787428c19a20bec3f3d

                  SHA1

                  53ec2192fdb7cdeaeb6ef888c7df1ab01d5bada1

                  SHA256

                  d8493df9befd1d9188da4b0d3d43384088f32d43d618328709f32384a306e105

                  SHA512

                  cbd4fff0d13179642a52a0b07b97f8ce0b1e3e72cf91a476982d12d0d639c24b5e6821dc47f6ba0879a8aa39fb37ed3c19086cecef3acdcb2f7b2642646298e6

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8271643.exe
                  Filesize

                  208KB

                  MD5

                  cc2c181547dde1c73528970069e7401d

                  SHA1

                  12cdde18017828b55ed627af4fe97567bb3301a6

                  SHA256

                  25fd1bfc83772eb70e96a696c8d4f1d5df8ed0acbc126f6efc64f1d70fbe42d6

                  SHA512

                  898b81005dbff6b7729c11f2658c18f44f90ab406bed862dd57ee93aef456da1a6b81bba34f3cd0483951e477be3ba38c80ed8de916f2fecf3114ad0be77a9f0

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8271643.exe
                  Filesize

                  208KB

                  MD5

                  cc2c181547dde1c73528970069e7401d

                  SHA1

                  12cdde18017828b55ed627af4fe97567bb3301a6

                  SHA256

                  25fd1bfc83772eb70e96a696c8d4f1d5df8ed0acbc126f6efc64f1d70fbe42d6

                  SHA512

                  898b81005dbff6b7729c11f2658c18f44f90ab406bed862dd57ee93aef456da1a6b81bba34f3cd0483951e477be3ba38c80ed8de916f2fecf3114ad0be77a9f0

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2955082.exe
                  Filesize

                  206KB

                  MD5

                  f987cf9f656a670552c0615bc8b7bf83

                  SHA1

                  e06dca04c7b7eb743ff7702938cd5894726d6532

                  SHA256

                  a78df053e1f7c9376fe0c53e87c48c730586587ed31cfa58e32247a56d9ea443

                  SHA512

                  05529289f8446c1b0f322d76a0e520d10e748f830b6bc9500872841e53fb83fdeab0caf8004774926650a4f00cf4f52866f95b29d5b4f39dd9e11d79f0d14265

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2955082.exe
                  Filesize

                  206KB

                  MD5

                  f987cf9f656a670552c0615bc8b7bf83

                  SHA1

                  e06dca04c7b7eb743ff7702938cd5894726d6532

                  SHA256

                  a78df053e1f7c9376fe0c53e87c48c730586587ed31cfa58e32247a56d9ea443

                  SHA512

                  05529289f8446c1b0f322d76a0e520d10e748f830b6bc9500872841e53fb83fdeab0caf8004774926650a4f00cf4f52866f95b29d5b4f39dd9e11d79f0d14265

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7448470.exe
                  Filesize

                  173KB

                  MD5

                  bdeef7105644296718cd616c61e4a349

                  SHA1

                  6b4acfef68bbafffa39b3f39b3a522f21c0c2b3b

                  SHA256

                  e074a28235e056d7217dc62ad9d1d9166eba6984e17509f2335419270313be5c

                  SHA512

                  ae47684cc533d992ecb32989b94a92430e95ce801ebe8565c6d73dce7c70828a838ccb30841f3fce669db6b4bd07b2baa92571d3bbc29d3443c09d5be964881a

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7448470.exe
                  Filesize

                  173KB

                  MD5

                  bdeef7105644296718cd616c61e4a349

                  SHA1

                  6b4acfef68bbafffa39b3f39b3a522f21c0c2b3b

                  SHA256

                  e074a28235e056d7217dc62ad9d1d9166eba6984e17509f2335419270313be5c

                  SHA512

                  ae47684cc533d992ecb32989b94a92430e95ce801ebe8565c6d73dce7c70828a838ccb30841f3fce669db6b4bd07b2baa92571d3bbc29d3443c09d5be964881a

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5575872.exe
                  Filesize

                  14KB

                  MD5

                  2c09f2d4d93a02aee9385d21182d1cc6

                  SHA1

                  4e8f981ce61f28c8ad12bea8fe732ed021019ae3

                  SHA256

                  c5801d0c36f519b9d4bb84fb828f9a8a8f843b962d8852e48c4cfc94ca3ec4f6

                  SHA512

                  19163787ff1e72d9b5788d45f4b2c2b064af8931faf58f71f13949844251f4c81c55725181b09446d7bc1c690a4f4ae8caeb3a589f98fb8a36fcc3c11b39a0bc

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5575872.exe
                  Filesize

                  14KB

                  MD5

                  2c09f2d4d93a02aee9385d21182d1cc6

                  SHA1

                  4e8f981ce61f28c8ad12bea8fe732ed021019ae3

                  SHA256

                  c5801d0c36f519b9d4bb84fb828f9a8a8f843b962d8852e48c4cfc94ca3ec4f6

                  SHA512

                  19163787ff1e72d9b5788d45f4b2c2b064af8931faf58f71f13949844251f4c81c55725181b09446d7bc1c690a4f4ae8caeb3a589f98fb8a36fcc3c11b39a0bc

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  Filesize

                  208KB

                  MD5

                  cc2c181547dde1c73528970069e7401d

                  SHA1

                  12cdde18017828b55ed627af4fe97567bb3301a6

                  SHA256

                  25fd1bfc83772eb70e96a696c8d4f1d5df8ed0acbc126f6efc64f1d70fbe42d6

                  SHA512

                  898b81005dbff6b7729c11f2658c18f44f90ab406bed862dd57ee93aef456da1a6b81bba34f3cd0483951e477be3ba38c80ed8de916f2fecf3114ad0be77a9f0

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  Filesize

                  208KB

                  MD5

                  cc2c181547dde1c73528970069e7401d

                  SHA1

                  12cdde18017828b55ed627af4fe97567bb3301a6

                  SHA256

                  25fd1bfc83772eb70e96a696c8d4f1d5df8ed0acbc126f6efc64f1d70fbe42d6

                  SHA512

                  898b81005dbff6b7729c11f2658c18f44f90ab406bed862dd57ee93aef456da1a6b81bba34f3cd0483951e477be3ba38c80ed8de916f2fecf3114ad0be77a9f0

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  Filesize

                  208KB

                  MD5

                  cc2c181547dde1c73528970069e7401d

                  SHA1

                  12cdde18017828b55ed627af4fe97567bb3301a6

                  SHA256

                  25fd1bfc83772eb70e96a696c8d4f1d5df8ed0acbc126f6efc64f1d70fbe42d6

                  SHA512

                  898b81005dbff6b7729c11f2658c18f44f90ab406bed862dd57ee93aef456da1a6b81bba34f3cd0483951e477be3ba38c80ed8de916f2fecf3114ad0be77a9f0

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  Filesize

                  208KB

                  MD5

                  cc2c181547dde1c73528970069e7401d

                  SHA1

                  12cdde18017828b55ed627af4fe97567bb3301a6

                  SHA256

                  25fd1bfc83772eb70e96a696c8d4f1d5df8ed0acbc126f6efc64f1d70fbe42d6

                  SHA512

                  898b81005dbff6b7729c11f2658c18f44f90ab406bed862dd57ee93aef456da1a6b81bba34f3cd0483951e477be3ba38c80ed8de916f2fecf3114ad0be77a9f0

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  Filesize

                  208KB

                  MD5

                  cc2c181547dde1c73528970069e7401d

                  SHA1

                  12cdde18017828b55ed627af4fe97567bb3301a6

                  SHA256

                  25fd1bfc83772eb70e96a696c8d4f1d5df8ed0acbc126f6efc64f1d70fbe42d6

                  SHA512

                  898b81005dbff6b7729c11f2658c18f44f90ab406bed862dd57ee93aef456da1a6b81bba34f3cd0483951e477be3ba38c80ed8de916f2fecf3114ad0be77a9f0

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                  Filesize

                  89KB

                  MD5

                  a5ed103ec4719a27ab3d3c01dac66f01

                  SHA1

                  c830d6980d7edea60568a518eccd36c0bc2a4924

                  SHA256

                  dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                  SHA512

                  b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                  Filesize

                  89KB

                  MD5

                  a5ed103ec4719a27ab3d3c01dac66f01

                  SHA1

                  c830d6980d7edea60568a518eccd36c0bc2a4924

                  SHA256

                  dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                  SHA512

                  b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                  Filesize

                  89KB

                  MD5

                  a5ed103ec4719a27ab3d3c01dac66f01

                  SHA1

                  c830d6980d7edea60568a518eccd36c0bc2a4924

                  SHA256

                  dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                  SHA512

                  b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
                  Filesize

                  162B

                  MD5

                  1b7c22a214949975556626d7217e9a39

                  SHA1

                  d01c97e2944166ed23e47e4a62ff471ab8fa031f

                  SHA256

                  340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                  SHA512

                  ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                • memory/8-190-0x0000000000400000-0x0000000000430000-memory.dmp
                  Filesize

                  192KB

                • memory/8-195-0x0000000005700000-0x0000000005710000-memory.dmp
                  Filesize

                  64KB

                • memory/2340-172-0x0000000000540000-0x000000000054A000-memory.dmp
                  Filesize

                  40KB

                • memory/4348-157-0x0000000009F80000-0x0000000009F92000-memory.dmp
                  Filesize

                  72KB

                • memory/4348-167-0x000000000B7F0000-0x000000000B840000-memory.dmp
                  Filesize

                  320KB

                • memory/4348-166-0x000000000C0C0000-0x000000000C5EC000-memory.dmp
                  Filesize

                  5.2MB

                • memory/4348-165-0x000000000B9C0000-0x000000000BB82000-memory.dmp
                  Filesize

                  1.8MB

                • memory/4348-164-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
                  Filesize

                  64KB

                • memory/4348-163-0x000000000A4B0000-0x000000000A516000-memory.dmp
                  Filesize

                  408KB

                • memory/4348-162-0x000000000B140000-0x000000000B6E4000-memory.dmp
                  Filesize

                  5.6MB

                • memory/4348-161-0x000000000A410000-0x000000000A4A2000-memory.dmp
                  Filesize

                  584KB

                • memory/4348-160-0x000000000A2F0000-0x000000000A366000-memory.dmp
                  Filesize

                  472KB

                • memory/4348-159-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
                  Filesize

                  64KB

                • memory/4348-158-0x0000000009FE0000-0x000000000A01C000-memory.dmp
                  Filesize

                  240KB

                • memory/4348-156-0x000000000A060000-0x000000000A16A000-memory.dmp
                  Filesize

                  1.0MB

                • memory/4348-155-0x000000000A570000-0x000000000AB88000-memory.dmp
                  Filesize

                  6.1MB

                • memory/4348-154-0x0000000000200000-0x0000000000230000-memory.dmp
                  Filesize

                  192KB