Analysis

  • max time kernel
    130s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-06-2023 15:06

General

  • Target

    209b40d55fe65deaf7293a4f65ff6a6587a495bb88cf9349c55d519d21569126.exe

  • Size

    601KB

  • MD5

    5dc76d0063168d10d691345f5d44657e

  • SHA1

    c73e5d5bd3509c978e3e2f520652f4c4681aa208

  • SHA256

    209b40d55fe65deaf7293a4f65ff6a6587a495bb88cf9349c55d519d21569126

  • SHA512

    8e126ae903481c117d9b7ab714b11415f9c4e01d8e8048f1aad25ce5750a89b8bce1236b6610c02d9a8a326105377909a4f48639cac551acecd73771595a7b4d

  • SSDEEP

    12288:3MrVy90Bxr6UWS0Qh0jrioPgNIHzG+ZCkWOarYvdl8Wc/jBSH5:ey66O048tDTG+ZCkWOaMUj+5

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.129:19068

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\209b40d55fe65deaf7293a4f65ff6a6587a495bb88cf9349c55d519d21569126.exe
    "C:\Users\Admin\AppData\Local\Temp\209b40d55fe65deaf7293a4f65ff6a6587a495bb88cf9349c55d519d21569126.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:980
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0008215.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0008215.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4760
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5693004.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5693004.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4112
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1096980.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1096980.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4828
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8967117.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8967117.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3312
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8825125.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8825125.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3824
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3700
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN lamod.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:2348
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "lamod.exe" /P "Admin:N"&&CACLS "lamod.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:5076
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:3792
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "lamod.exe" /P "Admin:N"
                6⤵
                  PID:3672
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "lamod.exe" /P "Admin:R" /E
                  6⤵
                    PID:4024
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:3384
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:3492
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:4580
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:4008
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2419047.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2419047.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:3944
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3928
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 152
                    3⤵
                    • Program crash
                    PID:1468
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3944 -ip 3944
                1⤵
                  PID:2020
                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  1⤵
                  • Executes dropped EXE
                  PID:2604
                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  1⤵
                  • Executes dropped EXE
                  PID:4272

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Execution

                Scheduled Task

                1
                T1053

                Persistence

                Modify Existing Service

                1
                T1031

                Registry Run Keys / Startup Folder

                1
                T1060

                Scheduled Task

                1
                T1053

                Privilege Escalation

                Scheduled Task

                1
                T1053

                Defense Evasion

                Modify Registry

                3
                T1112

                Disabling Security Tools

                2
                T1089

                Credential Access

                Credentials in Files

                2
                T1081

                Discovery

                Query Registry

                2
                T1012

                System Information Discovery

                2
                T1082

                Collection

                Data from Local System

                2
                T1005

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2419047.exe
                  Filesize

                  308KB

                  MD5

                  97e87b8df5896528df9d67bc65915dad

                  SHA1

                  6c619fe9e51758278c6487a15630bfbfa92e9c8f

                  SHA256

                  97953b55fe72447a86daaf2b2bbd4445c89c8c1dc7995abf0c831c0d36e09a4b

                  SHA512

                  aff251dfc15be65544cd82c2df38c17e296476043505c1f7fe2c10952f2189c40fac196f01ca3918fcc2658aff392553c060fe3a3577f84ccf0c1502b38481f6

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2419047.exe
                  Filesize

                  308KB

                  MD5

                  97e87b8df5896528df9d67bc65915dad

                  SHA1

                  6c619fe9e51758278c6487a15630bfbfa92e9c8f

                  SHA256

                  97953b55fe72447a86daaf2b2bbd4445c89c8c1dc7995abf0c831c0d36e09a4b

                  SHA512

                  aff251dfc15be65544cd82c2df38c17e296476043505c1f7fe2c10952f2189c40fac196f01ca3918fcc2658aff392553c060fe3a3577f84ccf0c1502b38481f6

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0008215.exe
                  Filesize

                  377KB

                  MD5

                  183dc0f7c8cd2537c7882b21c87ed3ff

                  SHA1

                  1dc0c72a68fcad419e70063e59ae8ca044b1339e

                  SHA256

                  d2f0b32bc0b17e0582c682e81b374eee1dec7c8e9f6267081127e48ad8709d06

                  SHA512

                  ee9f5a0a89adb7f038ed989b77dc969acd4d1f4430b637031bff86682622f6ae5dd4396aa84651e2e6777207115570a949e9474ed6fead24943b0dcde50c2a01

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0008215.exe
                  Filesize

                  377KB

                  MD5

                  183dc0f7c8cd2537c7882b21c87ed3ff

                  SHA1

                  1dc0c72a68fcad419e70063e59ae8ca044b1339e

                  SHA256

                  d2f0b32bc0b17e0582c682e81b374eee1dec7c8e9f6267081127e48ad8709d06

                  SHA512

                  ee9f5a0a89adb7f038ed989b77dc969acd4d1f4430b637031bff86682622f6ae5dd4396aa84651e2e6777207115570a949e9474ed6fead24943b0dcde50c2a01

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8825125.exe
                  Filesize

                  208KB

                  MD5

                  0337018ad2e9c26151ec6dc904dfb31f

                  SHA1

                  f67c6f5c6d844658f71c885637de1a32f2810dce

                  SHA256

                  a1a11ef82430185fa61a7fd5444e89907c251f2f5165d55e19df620bb3eeb99d

                  SHA512

                  70d93adc99d745855738e82f6378ead3966465e99aef0ea3fdaaf53d8e7468f7a259f8a9bd4e9e729cc074e952ed4fcd666f1b0e7e14740432a95a49412e462b

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8825125.exe
                  Filesize

                  208KB

                  MD5

                  0337018ad2e9c26151ec6dc904dfb31f

                  SHA1

                  f67c6f5c6d844658f71c885637de1a32f2810dce

                  SHA256

                  a1a11ef82430185fa61a7fd5444e89907c251f2f5165d55e19df620bb3eeb99d

                  SHA512

                  70d93adc99d745855738e82f6378ead3966465e99aef0ea3fdaaf53d8e7468f7a259f8a9bd4e9e729cc074e952ed4fcd666f1b0e7e14740432a95a49412e462b

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5693004.exe
                  Filesize

                  206KB

                  MD5

                  e3d682b6ea69fb304188aabcc8520810

                  SHA1

                  ed50f0c59365c30e5755dc9afd2b649f91c3d6aa

                  SHA256

                  7c22bed4bd99130028305efbde942a6e26cdcf8a4fcb833487b8e315259fc4c0

                  SHA512

                  11a628c85ab1d8bad0df075f84878554da51671aa3f28f9c1db80d411daf804a47a4556b91910a8e864df188b7bd6b128c30e621a41ea73987cc4f8fe2f4d931

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5693004.exe
                  Filesize

                  206KB

                  MD5

                  e3d682b6ea69fb304188aabcc8520810

                  SHA1

                  ed50f0c59365c30e5755dc9afd2b649f91c3d6aa

                  SHA256

                  7c22bed4bd99130028305efbde942a6e26cdcf8a4fcb833487b8e315259fc4c0

                  SHA512

                  11a628c85ab1d8bad0df075f84878554da51671aa3f28f9c1db80d411daf804a47a4556b91910a8e864df188b7bd6b128c30e621a41ea73987cc4f8fe2f4d931

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1096980.exe
                  Filesize

                  173KB

                  MD5

                  0cf83e3374309d631449c1a7ea6b56bd

                  SHA1

                  8b7e24bf950f42827285426fbaaa79cb5d01a38a

                  SHA256

                  6c46943a692662e69e8dcf7d3c4ab5633041514004f84d38b82bfa1376246748

                  SHA512

                  e6eaf3545835bddbd923731cdec3688fbbbec15db6e5cf6cf57a4b3dd732c26d3041006b6ae40822071e19852b3904cc0518a7471a8486e771f0be9c0df2d584

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1096980.exe
                  Filesize

                  173KB

                  MD5

                  0cf83e3374309d631449c1a7ea6b56bd

                  SHA1

                  8b7e24bf950f42827285426fbaaa79cb5d01a38a

                  SHA256

                  6c46943a692662e69e8dcf7d3c4ab5633041514004f84d38b82bfa1376246748

                  SHA512

                  e6eaf3545835bddbd923731cdec3688fbbbec15db6e5cf6cf57a4b3dd732c26d3041006b6ae40822071e19852b3904cc0518a7471a8486e771f0be9c0df2d584

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8967117.exe
                  Filesize

                  14KB

                  MD5

                  56c844f1e51ea8ddc5002444c60f1da8

                  SHA1

                  b89aa62154067a2cab6c366282387d4785df7123

                  SHA256

                  fd56351ef973c1d3fe293c422e6e5f27cde45c258d8ca818cd871aac923b43b9

                  SHA512

                  e8dae0d777debbae8df364749ae094878da4245ae9bf3c93837b2aba34e288762624ceb24589caa609f6a6992545e5c41ac21496645f44b940ee5da652645dee

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8967117.exe
                  Filesize

                  14KB

                  MD5

                  56c844f1e51ea8ddc5002444c60f1da8

                  SHA1

                  b89aa62154067a2cab6c366282387d4785df7123

                  SHA256

                  fd56351ef973c1d3fe293c422e6e5f27cde45c258d8ca818cd871aac923b43b9

                  SHA512

                  e8dae0d777debbae8df364749ae094878da4245ae9bf3c93837b2aba34e288762624ceb24589caa609f6a6992545e5c41ac21496645f44b940ee5da652645dee

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  Filesize

                  208KB

                  MD5

                  0337018ad2e9c26151ec6dc904dfb31f

                  SHA1

                  f67c6f5c6d844658f71c885637de1a32f2810dce

                  SHA256

                  a1a11ef82430185fa61a7fd5444e89907c251f2f5165d55e19df620bb3eeb99d

                  SHA512

                  70d93adc99d745855738e82f6378ead3966465e99aef0ea3fdaaf53d8e7468f7a259f8a9bd4e9e729cc074e952ed4fcd666f1b0e7e14740432a95a49412e462b

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  Filesize

                  208KB

                  MD5

                  0337018ad2e9c26151ec6dc904dfb31f

                  SHA1

                  f67c6f5c6d844658f71c885637de1a32f2810dce

                  SHA256

                  a1a11ef82430185fa61a7fd5444e89907c251f2f5165d55e19df620bb3eeb99d

                  SHA512

                  70d93adc99d745855738e82f6378ead3966465e99aef0ea3fdaaf53d8e7468f7a259f8a9bd4e9e729cc074e952ed4fcd666f1b0e7e14740432a95a49412e462b

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  Filesize

                  208KB

                  MD5

                  0337018ad2e9c26151ec6dc904dfb31f

                  SHA1

                  f67c6f5c6d844658f71c885637de1a32f2810dce

                  SHA256

                  a1a11ef82430185fa61a7fd5444e89907c251f2f5165d55e19df620bb3eeb99d

                  SHA512

                  70d93adc99d745855738e82f6378ead3966465e99aef0ea3fdaaf53d8e7468f7a259f8a9bd4e9e729cc074e952ed4fcd666f1b0e7e14740432a95a49412e462b

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  Filesize

                  208KB

                  MD5

                  0337018ad2e9c26151ec6dc904dfb31f

                  SHA1

                  f67c6f5c6d844658f71c885637de1a32f2810dce

                  SHA256

                  a1a11ef82430185fa61a7fd5444e89907c251f2f5165d55e19df620bb3eeb99d

                  SHA512

                  70d93adc99d745855738e82f6378ead3966465e99aef0ea3fdaaf53d8e7468f7a259f8a9bd4e9e729cc074e952ed4fcd666f1b0e7e14740432a95a49412e462b

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  Filesize

                  208KB

                  MD5

                  0337018ad2e9c26151ec6dc904dfb31f

                  SHA1

                  f67c6f5c6d844658f71c885637de1a32f2810dce

                  SHA256

                  a1a11ef82430185fa61a7fd5444e89907c251f2f5165d55e19df620bb3eeb99d

                  SHA512

                  70d93adc99d745855738e82f6378ead3966465e99aef0ea3fdaaf53d8e7468f7a259f8a9bd4e9e729cc074e952ed4fcd666f1b0e7e14740432a95a49412e462b

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                  Filesize

                  89KB

                  MD5

                  a5ed103ec4719a27ab3d3c01dac66f01

                  SHA1

                  c830d6980d7edea60568a518eccd36c0bc2a4924

                  SHA256

                  dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                  SHA512

                  b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                  Filesize

                  89KB

                  MD5

                  a5ed103ec4719a27ab3d3c01dac66f01

                  SHA1

                  c830d6980d7edea60568a518eccd36c0bc2a4924

                  SHA256

                  dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                  SHA512

                  b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                  Filesize

                  89KB

                  MD5

                  a5ed103ec4719a27ab3d3c01dac66f01

                  SHA1

                  c830d6980d7edea60568a518eccd36c0bc2a4924

                  SHA256

                  dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                  SHA512

                  b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
                  Filesize

                  162B

                  MD5

                  1b7c22a214949975556626d7217e9a39

                  SHA1

                  d01c97e2944166ed23e47e4a62ff471ab8fa031f

                  SHA256

                  340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                  SHA512

                  ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                • memory/3312-172-0x0000000000840000-0x000000000084A000-memory.dmp
                  Filesize

                  40KB

                • memory/3928-190-0x0000000000400000-0x0000000000430000-memory.dmp
                  Filesize

                  192KB

                • memory/3928-195-0x00000000053C0000-0x00000000053D0000-memory.dmp
                  Filesize

                  64KB

                • memory/4828-157-0x000000000A250000-0x000000000A262000-memory.dmp
                  Filesize

                  72KB

                • memory/4828-167-0x000000000BAA0000-0x000000000BAF0000-memory.dmp
                  Filesize

                  320KB

                • memory/4828-166-0x0000000004DB0000-0x0000000004DC0000-memory.dmp
                  Filesize

                  64KB

                • memory/4828-165-0x000000000C2E0000-0x000000000C80C000-memory.dmp
                  Filesize

                  5.2MB

                • memory/4828-164-0x000000000BBE0000-0x000000000BDA2000-memory.dmp
                  Filesize

                  1.8MB

                • memory/4828-163-0x000000000AF20000-0x000000000AF86000-memory.dmp
                  Filesize

                  408KB

                • memory/4828-162-0x000000000B460000-0x000000000BA04000-memory.dmp
                  Filesize

                  5.6MB

                • memory/4828-161-0x000000000A6E0000-0x000000000A772000-memory.dmp
                  Filesize

                  584KB

                • memory/4828-160-0x000000000A5C0000-0x000000000A636000-memory.dmp
                  Filesize

                  472KB

                • memory/4828-159-0x0000000004DB0000-0x0000000004DC0000-memory.dmp
                  Filesize

                  64KB

                • memory/4828-158-0x000000000A2B0000-0x000000000A2EC000-memory.dmp
                  Filesize

                  240KB

                • memory/4828-156-0x000000000A310000-0x000000000A41A000-memory.dmp
                  Filesize

                  1.0MB

                • memory/4828-155-0x000000000A790000-0x000000000ADA8000-memory.dmp
                  Filesize

                  6.1MB

                • memory/4828-154-0x0000000000390000-0x00000000003C0000-memory.dmp
                  Filesize

                  192KB