Analysis

  • max time kernel
    140s
  • max time network
    134s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26-05-2023 11:11

General

  • Target

    5e370f6fddfce822088a875b74a98788ec813165da60c525774b3a793309c59a.exe

  • Size

    764KB

  • MD5

    2f0a6c925c2a58d5d63fa46edde89fe5

  • SHA1

    385b14cbe3077674d190b9301d19d9c3ea917c2b

  • SHA256

    5e370f6fddfce822088a875b74a98788ec813165da60c525774b3a793309c59a

  • SHA512

    53d6e4aad0d749bcdb803c77053bad7a65cd1907c5efd69d2b16fc95119f455eeaa231f2aad9e623ee1bed91989e8394a49b50e194da2c19d992582d165cbd97

  • SSDEEP

    12288:IMr6y90mIabxzezYqj9wxt13YuEpAvyG32qL62mp4d7Pmd8LB6EEok:SyGatKzNmxt1HEpAP82a4pPmdoCL

Malware Config

Extracted

Family

redline

Botnet

misa

C2

83.97.73.122:19062

Attributes
  • auth_value

    9e79529a6bdb4962f44d12b0d6d62d32

Extracted

Family

redline

Botnet

goga

C2

83.97.73.122:19062

Attributes
  • auth_value

    6d57dff6d3c42dddb8a76dc276b8467f

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e370f6fddfce822088a875b74a98788ec813165da60c525774b3a793309c59a.exe
    "C:\Users\Admin\AppData\Local\Temp\5e370f6fddfce822088a875b74a98788ec813165da60c525774b3a793309c59a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4012
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0978069.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0978069.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4556
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5389343.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5389343.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4720
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4096654.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4096654.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4824
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4868
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7769754.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7769754.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4948
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2603221.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2603221.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4492
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4564
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:4376
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3108
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:4352
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:4224
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:4180
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:3256
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:3408
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:4132
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:204
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5458226.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5458226.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:4916
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1672
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:4468
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:2228
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:2168

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Defense Evasion

              Modify Registry

              2
              T1112

              Disabling Security Tools

              1
              T1089

              Credential Access

              Credentials in Files

              1
              T1081

              Discovery

              Query Registry

              1
              T1012

              System Information Discovery

              1
              T1082

              Collection

              Data from Local System

              1
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log
                Filesize

                226B

                MD5

                957779c42144282d8cd83192b8fbc7cf

                SHA1

                de83d08d2cca06b9ff3d1ef239d6b60b705d25fe

                SHA256

                0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51

                SHA512

                f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5458226.exe
                Filesize

                316KB

                MD5

                cb461986217d56a5e7b1cd16c3774d24

                SHA1

                239737a6aef46d7019701aff1ef614955aa8a758

                SHA256

                80f8c142a315f6999fc78a5aa389ad39d97b34ea48deb870ace242c0ecd62df3

                SHA512

                85d5fab261fc9520b491bcbc266372745f1b85c5ae408775a7f509fff1fb590ea874a3a8ceff2301fcde0bffb1751e33f24bdf4f9354656434d088462ca036dc

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5458226.exe
                Filesize

                316KB

                MD5

                cb461986217d56a5e7b1cd16c3774d24

                SHA1

                239737a6aef46d7019701aff1ef614955aa8a758

                SHA256

                80f8c142a315f6999fc78a5aa389ad39d97b34ea48deb870ace242c0ecd62df3

                SHA512

                85d5fab261fc9520b491bcbc266372745f1b85c5ae408775a7f509fff1fb590ea874a3a8ceff2301fcde0bffb1751e33f24bdf4f9354656434d088462ca036dc

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0978069.exe
                Filesize

                447KB

                MD5

                6828d6ee7fe9307ab5561c3b0b14a4ad

                SHA1

                06e33695d68a7622e64a0bc2530039afd65ecd68

                SHA256

                bdb3d2f07da410b68869d896f9f37377537436dfa1a7f8eda55ddba714841498

                SHA512

                2d92e79760512f4a67d6ec5c728772c989b665b6739b1b428d5bdc28742ef5ce7621914682bfb4f71d007dcba986cfe9434c27c891945633a2781be3f4b6e8d7

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0978069.exe
                Filesize

                447KB

                MD5

                6828d6ee7fe9307ab5561c3b0b14a4ad

                SHA1

                06e33695d68a7622e64a0bc2530039afd65ecd68

                SHA256

                bdb3d2f07da410b68869d896f9f37377537436dfa1a7f8eda55ddba714841498

                SHA512

                2d92e79760512f4a67d6ec5c728772c989b665b6739b1b428d5bdc28742ef5ce7621914682bfb4f71d007dcba986cfe9434c27c891945633a2781be3f4b6e8d7

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2603221.exe
                Filesize

                206KB

                MD5

                2e49ae65e33116377072de9118f26af4

                SHA1

                3f82b23d4d044a49ee2252f0e57dba6cc00b4cc0

                SHA256

                515e7cc5036ae4f7487752995a2f37f222212ca6604b4fc27354a2e706aa1c48

                SHA512

                248ee30210bf3a048699f122c12615e2eaa9046067069c48ad0221f2a1fe7a3e64150c15771ef1bf1a1460f86701c68707d80e392a2c700315b6643a95d11bc0

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2603221.exe
                Filesize

                206KB

                MD5

                2e49ae65e33116377072de9118f26af4

                SHA1

                3f82b23d4d044a49ee2252f0e57dba6cc00b4cc0

                SHA256

                515e7cc5036ae4f7487752995a2f37f222212ca6604b4fc27354a2e706aa1c48

                SHA512

                248ee30210bf3a048699f122c12615e2eaa9046067069c48ad0221f2a1fe7a3e64150c15771ef1bf1a1460f86701c68707d80e392a2c700315b6643a95d11bc0

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5389343.exe
                Filesize

                275KB

                MD5

                9020b77ebf41a2a019e7f786d6ffb7b6

                SHA1

                74314b0446ba0c18e40b17f5051edbde14b5edfe

                SHA256

                da734ab7d90a774798ba2887063ca9ed3851f183ffc03d308d248388d40cb86d

                SHA512

                86509303426c3b580b11c8e775577faed9340bd46f3614053e43243a111cb537c6400eb2210a9a2f105c99169192113411cd7bbf843d94bb61e9bed2bd35d7e2

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5389343.exe
                Filesize

                275KB

                MD5

                9020b77ebf41a2a019e7f786d6ffb7b6

                SHA1

                74314b0446ba0c18e40b17f5051edbde14b5edfe

                SHA256

                da734ab7d90a774798ba2887063ca9ed3851f183ffc03d308d248388d40cb86d

                SHA512

                86509303426c3b580b11c8e775577faed9340bd46f3614053e43243a111cb537c6400eb2210a9a2f105c99169192113411cd7bbf843d94bb61e9bed2bd35d7e2

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4096654.exe
                Filesize

                182KB

                MD5

                a1f077ae157ea06d422eaaba33b703ca

                SHA1

                2466e21fb4fbdc5fd97bb7037b1c7bc6ef0eb44d

                SHA256

                6918ebb291d09e2e5b4ae20a329498db1de261a615bc8d2e23904d2554a88328

                SHA512

                318101070f4ded85152b8a4b99ce11e9361510fd7af8e0b6365a32dfde783924bc0a535f0fe86ae8875c49bd9665c25d1549fa9230915b51950d99cd59c2dce6

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4096654.exe
                Filesize

                182KB

                MD5

                a1f077ae157ea06d422eaaba33b703ca

                SHA1

                2466e21fb4fbdc5fd97bb7037b1c7bc6ef0eb44d

                SHA256

                6918ebb291d09e2e5b4ae20a329498db1de261a615bc8d2e23904d2554a88328

                SHA512

                318101070f4ded85152b8a4b99ce11e9361510fd7af8e0b6365a32dfde783924bc0a535f0fe86ae8875c49bd9665c25d1549fa9230915b51950d99cd59c2dce6

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7769754.exe
                Filesize

                145KB

                MD5

                22acb109e44b4ca33a2d5db46e3788f0

                SHA1

                040396d8018dc44d746d02217c06c56250fd441b

                SHA256

                df19d5cda41bf75db51c28bfab1fa2d75c4894467bb9ca06a769ae4260db2700

                SHA512

                c32980396c50030ef7dd6ddc564d1edb3e98374915b883043dc5e27b44dff3985af18dd2d7a0f2ee2fd4d6687f132c736599af5098ccf043377ee3cdd606736e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7769754.exe
                Filesize

                145KB

                MD5

                22acb109e44b4ca33a2d5db46e3788f0

                SHA1

                040396d8018dc44d746d02217c06c56250fd441b

                SHA256

                df19d5cda41bf75db51c28bfab1fa2d75c4894467bb9ca06a769ae4260db2700

                SHA512

                c32980396c50030ef7dd6ddc564d1edb3e98374915b883043dc5e27b44dff3985af18dd2d7a0f2ee2fd4d6687f132c736599af5098ccf043377ee3cdd606736e

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                Filesize

                206KB

                MD5

                2e49ae65e33116377072de9118f26af4

                SHA1

                3f82b23d4d044a49ee2252f0e57dba6cc00b4cc0

                SHA256

                515e7cc5036ae4f7487752995a2f37f222212ca6604b4fc27354a2e706aa1c48

                SHA512

                248ee30210bf3a048699f122c12615e2eaa9046067069c48ad0221f2a1fe7a3e64150c15771ef1bf1a1460f86701c68707d80e392a2c700315b6643a95d11bc0

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                Filesize

                206KB

                MD5

                2e49ae65e33116377072de9118f26af4

                SHA1

                3f82b23d4d044a49ee2252f0e57dba6cc00b4cc0

                SHA256

                515e7cc5036ae4f7487752995a2f37f222212ca6604b4fc27354a2e706aa1c48

                SHA512

                248ee30210bf3a048699f122c12615e2eaa9046067069c48ad0221f2a1fe7a3e64150c15771ef1bf1a1460f86701c68707d80e392a2c700315b6643a95d11bc0

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                Filesize

                206KB

                MD5

                2e49ae65e33116377072de9118f26af4

                SHA1

                3f82b23d4d044a49ee2252f0e57dba6cc00b4cc0

                SHA256

                515e7cc5036ae4f7487752995a2f37f222212ca6604b4fc27354a2e706aa1c48

                SHA512

                248ee30210bf3a048699f122c12615e2eaa9046067069c48ad0221f2a1fe7a3e64150c15771ef1bf1a1460f86701c68707d80e392a2c700315b6643a95d11bc0

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                Filesize

                206KB

                MD5

                2e49ae65e33116377072de9118f26af4

                SHA1

                3f82b23d4d044a49ee2252f0e57dba6cc00b4cc0

                SHA256

                515e7cc5036ae4f7487752995a2f37f222212ca6604b4fc27354a2e706aa1c48

                SHA512

                248ee30210bf3a048699f122c12615e2eaa9046067069c48ad0221f2a1fe7a3e64150c15771ef1bf1a1460f86701c68707d80e392a2c700315b6643a95d11bc0

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                Filesize

                206KB

                MD5

                2e49ae65e33116377072de9118f26af4

                SHA1

                3f82b23d4d044a49ee2252f0e57dba6cc00b4cc0

                SHA256

                515e7cc5036ae4f7487752995a2f37f222212ca6604b4fc27354a2e706aa1c48

                SHA512

                248ee30210bf3a048699f122c12615e2eaa9046067069c48ad0221f2a1fe7a3e64150c15771ef1bf1a1460f86701c68707d80e392a2c700315b6643a95d11bc0

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                Filesize

                206KB

                MD5

                2e49ae65e33116377072de9118f26af4

                SHA1

                3f82b23d4d044a49ee2252f0e57dba6cc00b4cc0

                SHA256

                515e7cc5036ae4f7487752995a2f37f222212ca6604b4fc27354a2e706aa1c48

                SHA512

                248ee30210bf3a048699f122c12615e2eaa9046067069c48ad0221f2a1fe7a3e64150c15771ef1bf1a1460f86701c68707d80e392a2c700315b6643a95d11bc0

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • memory/1672-214-0x0000000009210000-0x000000000925B000-memory.dmp
                Filesize

                300KB

              • memory/1672-205-0x0000000000400000-0x000000000042A000-memory.dmp
                Filesize

                168KB

              • memory/1672-219-0x0000000009350000-0x0000000009360000-memory.dmp
                Filesize

                64KB

              • memory/4868-142-0x0000000000410000-0x000000000041A000-memory.dmp
                Filesize

                40KB

              • memory/4948-154-0x0000000005DD0000-0x00000000063D6000-memory.dmp
                Filesize

                6.0MB

              • memory/4948-189-0x0000000007830000-0x0000000007D5C000-memory.dmp
                Filesize

                5.2MB

              • memory/4948-188-0x0000000007130000-0x00000000072F2000-memory.dmp
                Filesize

                1.8MB

              • memory/4948-187-0x00000000058E0000-0x00000000058F0000-memory.dmp
                Filesize

                64KB

              • memory/4948-172-0x0000000006860000-0x00000000068B0000-memory.dmp
                Filesize

                320KB

              • memory/4948-171-0x0000000006EE0000-0x0000000006F56000-memory.dmp
                Filesize

                472KB

              • memory/4948-170-0x00000000067C0000-0x0000000006852000-memory.dmp
                Filesize

                584KB

              • memory/4948-169-0x0000000005C00000-0x0000000005C66000-memory.dmp
                Filesize

                408KB

              • memory/4948-168-0x00000000068E0000-0x0000000006DDE000-memory.dmp
                Filesize

                5.0MB

              • memory/4948-159-0x0000000005890000-0x00000000058DB000-memory.dmp
                Filesize

                300KB

              • memory/4948-158-0x00000000058F0000-0x000000000592E000-memory.dmp
                Filesize

                248KB

              • memory/4948-157-0x00000000058E0000-0x00000000058F0000-memory.dmp
                Filesize

                64KB

              • memory/4948-156-0x0000000005870000-0x0000000005882000-memory.dmp
                Filesize

                72KB

              • memory/4948-155-0x0000000005940000-0x0000000005A4A000-memory.dmp
                Filesize

                1.0MB

              • memory/4948-153-0x0000000000EE0000-0x0000000000F0A000-memory.dmp
                Filesize

                168KB