Analysis

  • max time kernel
    139s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-06-2023 07:13

General

  • Target

    07166899.exe

  • Size

    599KB

  • MD5

    f4d153c0a650e3183a8b29611c4c8ff1

  • SHA1

    4b33072bb61d0ed056fb52794cd79740d5497bf5

  • SHA256

    cb4f213d58e190fd647be421ddd3e345a3d6e2281f103442f72dfbf5601cd408

  • SHA512

    3b573d88b2ed0a0eb609e32f46fdd3de9d92dc8ed7910da07c8731d4f429404b51d2fd979462362d771d3c55619410e35905793e78dd5f8f2eadce110e6bd828

  • SSDEEP

    12288:GMrGy908Llncb7/tz+xMKbzLyKyQNGD0t2ciSr3:YyXBnEr8xMgHygNGD0t3

Malware Config

Extracted

Family

redline

Botnet

duha

C2

83.97.73.129:19068

Attributes
  • auth_value

    aafe99874c3b8854069470882e00246c

Extracted

Family

amadey

Version

3.83

C2

77.91.68.30/music/rock/index.php

Extracted

Family

redline

Botnet

crazy

C2

83.97.73.129:19068

Attributes
  • auth_value

    66bc4d9682ea090eef64a299ece12fdd

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07166899.exe
    "C:\Users\Admin\AppData\Local\Temp\07166899.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5092
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6582503.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6582503.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8254002.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8254002.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:800
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3346405.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3346405.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3328
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g4833774.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g4833774.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3276986.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3276986.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4600
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2240
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN lamod.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:1336
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "lamod.exe" /P "Admin:N"&&CACLS "lamod.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1324
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:1956
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "lamod.exe" /P "Admin:N"
                6⤵
                  PID:1852
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "lamod.exe" /P "Admin:R" /E
                  6⤵
                    PID:2728
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:1328
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:4388
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:1856
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:2768
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0573596.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0573596.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:3364
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2352
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 596
                    3⤵
                    • Program crash
                    PID:1020
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3364 -ip 3364
                1⤵
                  PID:4240
                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  1⤵
                  • Executes dropped EXE
                  PID:4200
                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  1⤵
                  • Executes dropped EXE
                  PID:4932

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Execution

                Scheduled Task

                1
                T1053

                Persistence

                Modify Existing Service

                1
                T1031

                Registry Run Keys / Startup Folder

                1
                T1060

                Scheduled Task

                1
                T1053

                Privilege Escalation

                Scheduled Task

                1
                T1053

                Defense Evasion

                Modify Registry

                3
                T1112

                Disabling Security Tools

                2
                T1089

                Credential Access

                Credentials in Files

                2
                T1081

                Discovery

                Query Registry

                2
                T1012

                System Information Discovery

                2
                T1082

                Collection

                Data from Local System

                2
                T1005

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0573596.exe
                  Filesize

                  302KB

                  MD5

                  7fbe82f42ae780bb5895479ac600b482

                  SHA1

                  976aec4b8bce1644c34ddda1426b55bb9393088b

                  SHA256

                  f48da5f0d601f655c1490ebc6d254ea72f999ed33f088db2604743806a16fff2

                  SHA512

                  6e6a396021e97fbc6dc40ff201e17af29e9b72fc0799271f39978183e3c44b678a9ad5925a9e9b68e8f866a55f5170a7ca9858a3c8c2eaaf0203bf73b9de7c69

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0573596.exe
                  Filesize

                  302KB

                  MD5

                  7fbe82f42ae780bb5895479ac600b482

                  SHA1

                  976aec4b8bce1644c34ddda1426b55bb9393088b

                  SHA256

                  f48da5f0d601f655c1490ebc6d254ea72f999ed33f088db2604743806a16fff2

                  SHA512

                  6e6a396021e97fbc6dc40ff201e17af29e9b72fc0799271f39978183e3c44b678a9ad5925a9e9b68e8f866a55f5170a7ca9858a3c8c2eaaf0203bf73b9de7c69

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6582503.exe
                  Filesize

                  377KB

                  MD5

                  35f676f40628a647b4982660ab029e84

                  SHA1

                  18e684831528ba1aa5405ccd998ddbed592e281a

                  SHA256

                  acb5328595edc887f57e2a8fa9505e114b53ba3c6db78ac59d3938514345fcde

                  SHA512

                  7ef70a7cd8771b389a29646ae60ef3325501ccff99ad769dbe41bcfa31e8bfda1081299327407f27ae0a9e2ca87da81000331c7b34b294f6792a5e5301c4de6e

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6582503.exe
                  Filesize

                  377KB

                  MD5

                  35f676f40628a647b4982660ab029e84

                  SHA1

                  18e684831528ba1aa5405ccd998ddbed592e281a

                  SHA256

                  acb5328595edc887f57e2a8fa9505e114b53ba3c6db78ac59d3938514345fcde

                  SHA512

                  7ef70a7cd8771b389a29646ae60ef3325501ccff99ad769dbe41bcfa31e8bfda1081299327407f27ae0a9e2ca87da81000331c7b34b294f6792a5e5301c4de6e

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3276986.exe
                  Filesize

                  210KB

                  MD5

                  bdff2c7929bbc165fa7c6033209a7d8d

                  SHA1

                  affe808f5f52ca3e71bfb1b51e0c52d430d6a2a8

                  SHA256

                  1edfbe9f55dc9d19c03fad367153c73eac6f6a5a3f63515864f35154abdbb56a

                  SHA512

                  645140c746c699140cd02001b6c70dd2a41916d18f143e7ab61ae9badeb2f3a30f5b6f47de3d84fdca44f859030654923fe68479a48b64776bcddec89820d1fa

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3276986.exe
                  Filesize

                  210KB

                  MD5

                  bdff2c7929bbc165fa7c6033209a7d8d

                  SHA1

                  affe808f5f52ca3e71bfb1b51e0c52d430d6a2a8

                  SHA256

                  1edfbe9f55dc9d19c03fad367153c73eac6f6a5a3f63515864f35154abdbb56a

                  SHA512

                  645140c746c699140cd02001b6c70dd2a41916d18f143e7ab61ae9badeb2f3a30f5b6f47de3d84fdca44f859030654923fe68479a48b64776bcddec89820d1fa

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8254002.exe
                  Filesize

                  206KB

                  MD5

                  1cefdf3e230861e72a8827153864807e

                  SHA1

                  187035ca0c7bc3fd41f4e695ea9f136b39d7f317

                  SHA256

                  ac7550c0aa4a29eed3f41c02e7d87b732d9ba1efc371a96e6799fd145ce8f988

                  SHA512

                  37e6c529f88672d5583e6cc1411fa2a5b12f91558c89607be44719a3e3bd30ef9bfb58c6eac282576cef5f2acb083095a8c6c29040c970c80b5f21f69175de23

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8254002.exe
                  Filesize

                  206KB

                  MD5

                  1cefdf3e230861e72a8827153864807e

                  SHA1

                  187035ca0c7bc3fd41f4e695ea9f136b39d7f317

                  SHA256

                  ac7550c0aa4a29eed3f41c02e7d87b732d9ba1efc371a96e6799fd145ce8f988

                  SHA512

                  37e6c529f88672d5583e6cc1411fa2a5b12f91558c89607be44719a3e3bd30ef9bfb58c6eac282576cef5f2acb083095a8c6c29040c970c80b5f21f69175de23

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3346405.exe
                  Filesize

                  172KB

                  MD5

                  d945bd525a4dcd758340bb89997d2b68

                  SHA1

                  edc4f0e184e87610d06e18e1edd2f05b8c38f394

                  SHA256

                  7689388cd5d6c751a05c64c9d03b30174c6f245ea3b3b9b73d074f7c288c4e6b

                  SHA512

                  5c6c34ca8a3a6bf5401ed0224de2cb71e420a4de924ae5fdd96394fbb5c8281844e907356684561b2805c30999b8ee9795baf57c4f8ea47cb152eefac82c1a98

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3346405.exe
                  Filesize

                  172KB

                  MD5

                  d945bd525a4dcd758340bb89997d2b68

                  SHA1

                  edc4f0e184e87610d06e18e1edd2f05b8c38f394

                  SHA256

                  7689388cd5d6c751a05c64c9d03b30174c6f245ea3b3b9b73d074f7c288c4e6b

                  SHA512

                  5c6c34ca8a3a6bf5401ed0224de2cb71e420a4de924ae5fdd96394fbb5c8281844e907356684561b2805c30999b8ee9795baf57c4f8ea47cb152eefac82c1a98

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g4833774.exe
                  Filesize

                  12KB

                  MD5

                  397dc98d345b87247d32fe469660617d

                  SHA1

                  9af8b91041a6f770aedf595cd8c2a7c6e0707816

                  SHA256

                  435585059224493ea5768ab88aae0f560d2ba17738bf2a54490379aadd33ba80

                  SHA512

                  be9b3001ed77e9dfa8b9e0b969f29be77ab1b9212e7c057fa9304d2cc331f2b6c6001c8872e8cea912957c774098028146c574dddabc37645d694561945db8d1

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g4833774.exe
                  Filesize

                  12KB

                  MD5

                  397dc98d345b87247d32fe469660617d

                  SHA1

                  9af8b91041a6f770aedf595cd8c2a7c6e0707816

                  SHA256

                  435585059224493ea5768ab88aae0f560d2ba17738bf2a54490379aadd33ba80

                  SHA512

                  be9b3001ed77e9dfa8b9e0b969f29be77ab1b9212e7c057fa9304d2cc331f2b6c6001c8872e8cea912957c774098028146c574dddabc37645d694561945db8d1

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  Filesize

                  210KB

                  MD5

                  bdff2c7929bbc165fa7c6033209a7d8d

                  SHA1

                  affe808f5f52ca3e71bfb1b51e0c52d430d6a2a8

                  SHA256

                  1edfbe9f55dc9d19c03fad367153c73eac6f6a5a3f63515864f35154abdbb56a

                  SHA512

                  645140c746c699140cd02001b6c70dd2a41916d18f143e7ab61ae9badeb2f3a30f5b6f47de3d84fdca44f859030654923fe68479a48b64776bcddec89820d1fa

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  Filesize

                  210KB

                  MD5

                  bdff2c7929bbc165fa7c6033209a7d8d

                  SHA1

                  affe808f5f52ca3e71bfb1b51e0c52d430d6a2a8

                  SHA256

                  1edfbe9f55dc9d19c03fad367153c73eac6f6a5a3f63515864f35154abdbb56a

                  SHA512

                  645140c746c699140cd02001b6c70dd2a41916d18f143e7ab61ae9badeb2f3a30f5b6f47de3d84fdca44f859030654923fe68479a48b64776bcddec89820d1fa

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  Filesize

                  210KB

                  MD5

                  bdff2c7929bbc165fa7c6033209a7d8d

                  SHA1

                  affe808f5f52ca3e71bfb1b51e0c52d430d6a2a8

                  SHA256

                  1edfbe9f55dc9d19c03fad367153c73eac6f6a5a3f63515864f35154abdbb56a

                  SHA512

                  645140c746c699140cd02001b6c70dd2a41916d18f143e7ab61ae9badeb2f3a30f5b6f47de3d84fdca44f859030654923fe68479a48b64776bcddec89820d1fa

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  Filesize

                  210KB

                  MD5

                  bdff2c7929bbc165fa7c6033209a7d8d

                  SHA1

                  affe808f5f52ca3e71bfb1b51e0c52d430d6a2a8

                  SHA256

                  1edfbe9f55dc9d19c03fad367153c73eac6f6a5a3f63515864f35154abdbb56a

                  SHA512

                  645140c746c699140cd02001b6c70dd2a41916d18f143e7ab61ae9badeb2f3a30f5b6f47de3d84fdca44f859030654923fe68479a48b64776bcddec89820d1fa

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  Filesize

                  210KB

                  MD5

                  bdff2c7929bbc165fa7c6033209a7d8d

                  SHA1

                  affe808f5f52ca3e71bfb1b51e0c52d430d6a2a8

                  SHA256

                  1edfbe9f55dc9d19c03fad367153c73eac6f6a5a3f63515864f35154abdbb56a

                  SHA512

                  645140c746c699140cd02001b6c70dd2a41916d18f143e7ab61ae9badeb2f3a30f5b6f47de3d84fdca44f859030654923fe68479a48b64776bcddec89820d1fa

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                  Filesize

                  89KB

                  MD5

                  a5ed103ec4719a27ab3d3c01dac66f01

                  SHA1

                  c830d6980d7edea60568a518eccd36c0bc2a4924

                  SHA256

                  dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                  SHA512

                  b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                  Filesize

                  89KB

                  MD5

                  a5ed103ec4719a27ab3d3c01dac66f01

                  SHA1

                  c830d6980d7edea60568a518eccd36c0bc2a4924

                  SHA256

                  dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                  SHA512

                  b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                  Filesize

                  89KB

                  MD5

                  a5ed103ec4719a27ab3d3c01dac66f01

                  SHA1

                  c830d6980d7edea60568a518eccd36c0bc2a4924

                  SHA256

                  dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                  SHA512

                  b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
                  Filesize

                  162B

                  MD5

                  1b7c22a214949975556626d7217e9a39

                  SHA1

                  d01c97e2944166ed23e47e4a62ff471ab8fa031f

                  SHA256

                  340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                  SHA512

                  ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                • memory/1684-172-0x00000000002F0000-0x00000000002FA000-memory.dmp
                  Filesize

                  40KB

                • memory/2352-190-0x0000000000400000-0x0000000000430000-memory.dmp
                  Filesize

                  192KB

                • memory/2352-195-0x00000000050E0000-0x00000000050F0000-memory.dmp
                  Filesize

                  64KB

                • memory/3328-157-0x000000000A0E0000-0x000000000A0F2000-memory.dmp
                  Filesize

                  72KB

                • memory/3328-167-0x0000000004BF0000-0x0000000004C00000-memory.dmp
                  Filesize

                  64KB

                • memory/3328-166-0x000000000B920000-0x000000000B970000-memory.dmp
                  Filesize

                  320KB

                • memory/3328-165-0x000000000C0F0000-0x000000000C61C000-memory.dmp
                  Filesize

                  5.2MB

                • memory/3328-164-0x000000000B9F0000-0x000000000BBB2000-memory.dmp
                  Filesize

                  1.8MB

                • memory/3328-163-0x000000000A610000-0x000000000A676000-memory.dmp
                  Filesize

                  408KB

                • memory/3328-162-0x000000000B270000-0x000000000B814000-memory.dmp
                  Filesize

                  5.6MB

                • memory/3328-161-0x000000000A570000-0x000000000A602000-memory.dmp
                  Filesize

                  584KB

                • memory/3328-160-0x000000000A450000-0x000000000A4C6000-memory.dmp
                  Filesize

                  472KB

                • memory/3328-159-0x000000000A140000-0x000000000A17C000-memory.dmp
                  Filesize

                  240KB

                • memory/3328-158-0x0000000004BF0000-0x0000000004C00000-memory.dmp
                  Filesize

                  64KB

                • memory/3328-156-0x000000000A1A0000-0x000000000A2AA000-memory.dmp
                  Filesize

                  1.0MB

                • memory/3328-155-0x000000000A6A0000-0x000000000ACB8000-memory.dmp
                  Filesize

                  6.1MB

                • memory/3328-154-0x0000000000360000-0x0000000000390000-memory.dmp
                  Filesize

                  192KB