Analysis

  • max time kernel
    119s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-06-2023 16:32

General

  • Target

    6e55c4781f2a872e95b33240287d602ae64415db3e098f4c2cdaddfdef6415e8.exe

  • Size

    670KB

  • MD5

    ed658c42e4d730dacbd8248c80499a83

  • SHA1

    f66bfe5c069ee152a299426f2d19453a52b842c7

  • SHA256

    6e55c4781f2a872e95b33240287d602ae64415db3e098f4c2cdaddfdef6415e8

  • SHA512

    e48d94c1e74ea4790b6c8be7be23e39a43a390f1c26b0535b8baaf6484378653a13c3fe4367ee2fa085245feb8e06456297b85a71b14342e5c2a1b23a49b066c

  • SSDEEP

    12288:RMray90TFCAFfKLEk3qJufXgWbuj3qXlD2VYDhn9mRXoIrK7Jy:vyUHFfOEgTg33q1D2V4n9a4IW7M

Malware Config

Extracted

Family

redline

Botnet

muha

C2

83.97.73.129:19068

Attributes
  • auth_value

    3c237e5fecb41481b7af249e79828a46

Extracted

Family

redline

Botnet

crazy

C2

83.97.73.129:19068

Attributes
  • auth_value

    66bc4d9682ea090eef64a299ece12fdd

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e55c4781f2a872e95b33240287d602ae64415db3e098f4c2cdaddfdef6415e8.exe
    "C:\Users\Admin\AppData\Local\Temp\6e55c4781f2a872e95b33240287d602ae64415db3e098f4c2cdaddfdef6415e8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4550742.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4550742.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:908
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8607183.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8607183.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2632
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1969775.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1969775.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:624
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2916
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 624 -s 596
            5⤵
            • Program crash
            PID:3404
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4471466.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4471466.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5104
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1077571.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1077571.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2136
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:436
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN lamod.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:1844
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "lamod.exe" /P "Admin:N"&&CACLS "lamod.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3924
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:400
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "lamod.exe" /P "Admin:N"
                6⤵
                  PID:1460
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "lamod.exe" /P "Admin:R" /E
                  6⤵
                    PID:4232
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:2996
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:5044
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:3032
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:4312
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1334517.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1334517.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:3760
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3988
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3760 -s 156
                    3⤵
                    • Program crash
                    PID:912
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 624 -ip 624
                1⤵
                  PID:3300
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3760 -ip 3760
                  1⤵
                    PID:3636
                  • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                    C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                    1⤵
                    • Executes dropped EXE
                    PID:4944

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Execution

                  Scheduled Task

                  1
                  T1053

                  Persistence

                  Modify Existing Service

                  1
                  T1031

                  Registry Run Keys / Startup Folder

                  1
                  T1060

                  Scheduled Task

                  1
                  T1053

                  Privilege Escalation

                  Scheduled Task

                  1
                  T1053

                  Defense Evasion

                  Modify Registry

                  2
                  T1112

                  Disabling Security Tools

                  1
                  T1089

                  Credential Access

                  Credentials in Files

                  2
                  T1081

                  Discovery

                  Query Registry

                  2
                  T1012

                  System Information Discovery

                  2
                  T1082

                  Collection

                  Data from Local System

                  2
                  T1005

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log
                    Filesize

                    226B

                    MD5

                    916851e072fbabc4796d8916c5131092

                    SHA1

                    d48a602229a690c512d5fdaf4c8d77547a88e7a2

                    SHA256

                    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                    SHA512

                    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1334517.exe
                    Filesize

                    308KB

                    MD5

                    f26e43206856731c6ee85127be6c4004

                    SHA1

                    ac2010e9afa075475a8e3a4c1635557397eed2bf

                    SHA256

                    e6a2e69ddc59bd3dcb435df60f68e4652368b051687df4b5691333f0edea5f85

                    SHA512

                    75caa228f3bfb027ad805a0f19325f7e09969cbe3b977662c0b9e54d233e93e27a0805d2c7c10b3d70e14d91b16db1baf9c66e15f1b2ecbb8d89a24a20c2f9fb

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1334517.exe
                    Filesize

                    308KB

                    MD5

                    f26e43206856731c6ee85127be6c4004

                    SHA1

                    ac2010e9afa075475a8e3a4c1635557397eed2bf

                    SHA256

                    e6a2e69ddc59bd3dcb435df60f68e4652368b051687df4b5691333f0edea5f85

                    SHA512

                    75caa228f3bfb027ad805a0f19325f7e09969cbe3b977662c0b9e54d233e93e27a0805d2c7c10b3d70e14d91b16db1baf9c66e15f1b2ecbb8d89a24a20c2f9fb

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4550742.exe
                    Filesize

                    447KB

                    MD5

                    379132733ca03aff02a10eb0babaa7f1

                    SHA1

                    d2ba3ad784080c58eccf8ca6c318ca09c5ef0ab5

                    SHA256

                    fbc0f6d8054a84b9798b6949a47e9c567a425b12d52c6b2357990f369eeee9d8

                    SHA512

                    c7278ba05551e28187aa4ffdb8e49d60d3bc8758dff075d1990e3d89fae6b434bf537fcb7cac6a26ca9ed24dabb31ac2083fe6a0d321322d38b202e5e17688b2

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4550742.exe
                    Filesize

                    447KB

                    MD5

                    379132733ca03aff02a10eb0babaa7f1

                    SHA1

                    d2ba3ad784080c58eccf8ca6c318ca09c5ef0ab5

                    SHA256

                    fbc0f6d8054a84b9798b6949a47e9c567a425b12d52c6b2357990f369eeee9d8

                    SHA512

                    c7278ba05551e28187aa4ffdb8e49d60d3bc8758dff075d1990e3d89fae6b434bf537fcb7cac6a26ca9ed24dabb31ac2083fe6a0d321322d38b202e5e17688b2

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1077571.exe
                    Filesize

                    209KB

                    MD5

                    c832bbafb44b4bde02ffa12d32169134

                    SHA1

                    ff6e3364486065863ae1bc8e01b66124d2dda0aa

                    SHA256

                    3dd3ebc2a73c6534b39bc4fbb646a97834f15287a6c955d9fd7b634711b5ebf0

                    SHA512

                    97debb5bb629f718803c694d405e99b82bc8e662eab4cea0ce34272c4262900dfe7551b42f40e994c57a6c9d1fa965c1b6662adcc0fd3e5ab35071898f9a483f

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1077571.exe
                    Filesize

                    209KB

                    MD5

                    c832bbafb44b4bde02ffa12d32169134

                    SHA1

                    ff6e3364486065863ae1bc8e01b66124d2dda0aa

                    SHA256

                    3dd3ebc2a73c6534b39bc4fbb646a97834f15287a6c955d9fd7b634711b5ebf0

                    SHA512

                    97debb5bb629f718803c694d405e99b82bc8e662eab4cea0ce34272c4262900dfe7551b42f40e994c57a6c9d1fa965c1b6662adcc0fd3e5ab35071898f9a483f

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8607183.exe
                    Filesize

                    275KB

                    MD5

                    898266547aa4e6de8166a653444ade13

                    SHA1

                    24d5d82c6430e27c96e4c8552eedbec6a387b17e

                    SHA256

                    5d27192c148e815e6a17dc179ce3ff2e22f6acb1ca58291a1e1378d48f042121

                    SHA512

                    f5aaea9585b798aa0734af17db2e5182a308ed3ab9815c3efda51c9d67e34bd845b4d773b2e6b3ad1e24c738645b229fa3c756ab0e0155f4ee8ae3a2031c141d

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8607183.exe
                    Filesize

                    275KB

                    MD5

                    898266547aa4e6de8166a653444ade13

                    SHA1

                    24d5d82c6430e27c96e4c8552eedbec6a387b17e

                    SHA256

                    5d27192c148e815e6a17dc179ce3ff2e22f6acb1ca58291a1e1378d48f042121

                    SHA512

                    f5aaea9585b798aa0734af17db2e5182a308ed3ab9815c3efda51c9d67e34bd845b4d773b2e6b3ad1e24c738645b229fa3c756ab0e0155f4ee8ae3a2031c141d

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1969775.exe
                    Filesize

                    147KB

                    MD5

                    3be4403ac40222fa4355ed7fcb92e204

                    SHA1

                    ecc452360eb4b7dd105f6c0503f4fc611167321a

                    SHA256

                    a286173ac4d26cb3f6d09affd72793ade5a7872092fa6c7e16139199a72d5255

                    SHA512

                    07fead26038a7e1b7b2c7ef54ab70db179b0041d9ae1e1f0e7e8117fa7c08bc165fc9038e6fb70c456e18a21d129503018e5e1d6603af546d21c19887975c363

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1969775.exe
                    Filesize

                    147KB

                    MD5

                    3be4403ac40222fa4355ed7fcb92e204

                    SHA1

                    ecc452360eb4b7dd105f6c0503f4fc611167321a

                    SHA256

                    a286173ac4d26cb3f6d09affd72793ade5a7872092fa6c7e16139199a72d5255

                    SHA512

                    07fead26038a7e1b7b2c7ef54ab70db179b0041d9ae1e1f0e7e8117fa7c08bc165fc9038e6fb70c456e18a21d129503018e5e1d6603af546d21c19887975c363

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4471466.exe
                    Filesize

                    172KB

                    MD5

                    7b80b300dc90413b2c18582b1103d5e0

                    SHA1

                    c94da6168fe149a5c8f08c78f3e0d722e49f0342

                    SHA256

                    8be447ca9b538cd2dcae70669345fd36a494e3fceaa731e59ba17ba97c9d0a00

                    SHA512

                    6629fb49d07ffee92617b2c8b4e2a1d4d316a901bf6c2fd0b298c0e8c6ed28c159f6ae186cc28fcb94acd36e964594e3435fe9986a1fbcb0eedfed6a0002fe94

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4471466.exe
                    Filesize

                    172KB

                    MD5

                    7b80b300dc90413b2c18582b1103d5e0

                    SHA1

                    c94da6168fe149a5c8f08c78f3e0d722e49f0342

                    SHA256

                    8be447ca9b538cd2dcae70669345fd36a494e3fceaa731e59ba17ba97c9d0a00

                    SHA512

                    6629fb49d07ffee92617b2c8b4e2a1d4d316a901bf6c2fd0b298c0e8c6ed28c159f6ae186cc28fcb94acd36e964594e3435fe9986a1fbcb0eedfed6a0002fe94

                  • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                    Filesize

                    209KB

                    MD5

                    c832bbafb44b4bde02ffa12d32169134

                    SHA1

                    ff6e3364486065863ae1bc8e01b66124d2dda0aa

                    SHA256

                    3dd3ebc2a73c6534b39bc4fbb646a97834f15287a6c955d9fd7b634711b5ebf0

                    SHA512

                    97debb5bb629f718803c694d405e99b82bc8e662eab4cea0ce34272c4262900dfe7551b42f40e994c57a6c9d1fa965c1b6662adcc0fd3e5ab35071898f9a483f

                  • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                    Filesize

                    209KB

                    MD5

                    c832bbafb44b4bde02ffa12d32169134

                    SHA1

                    ff6e3364486065863ae1bc8e01b66124d2dda0aa

                    SHA256

                    3dd3ebc2a73c6534b39bc4fbb646a97834f15287a6c955d9fd7b634711b5ebf0

                    SHA512

                    97debb5bb629f718803c694d405e99b82bc8e662eab4cea0ce34272c4262900dfe7551b42f40e994c57a6c9d1fa965c1b6662adcc0fd3e5ab35071898f9a483f

                  • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                    Filesize

                    209KB

                    MD5

                    c832bbafb44b4bde02ffa12d32169134

                    SHA1

                    ff6e3364486065863ae1bc8e01b66124d2dda0aa

                    SHA256

                    3dd3ebc2a73c6534b39bc4fbb646a97834f15287a6c955d9fd7b634711b5ebf0

                    SHA512

                    97debb5bb629f718803c694d405e99b82bc8e662eab4cea0ce34272c4262900dfe7551b42f40e994c57a6c9d1fa965c1b6662adcc0fd3e5ab35071898f9a483f

                  • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                    Filesize

                    209KB

                    MD5

                    c832bbafb44b4bde02ffa12d32169134

                    SHA1

                    ff6e3364486065863ae1bc8e01b66124d2dda0aa

                    SHA256

                    3dd3ebc2a73c6534b39bc4fbb646a97834f15287a6c955d9fd7b634711b5ebf0

                    SHA512

                    97debb5bb629f718803c694d405e99b82bc8e662eab4cea0ce34272c4262900dfe7551b42f40e994c57a6c9d1fa965c1b6662adcc0fd3e5ab35071898f9a483f

                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                    Filesize

                    89KB

                    MD5

                    a5ed103ec4719a27ab3d3c01dac66f01

                    SHA1

                    c830d6980d7edea60568a518eccd36c0bc2a4924

                    SHA256

                    dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                    SHA512

                    b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                    Filesize

                    89KB

                    MD5

                    a5ed103ec4719a27ab3d3c01dac66f01

                    SHA1

                    c830d6980d7edea60568a518eccd36c0bc2a4924

                    SHA256

                    dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                    SHA512

                    b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                    Filesize

                    89KB

                    MD5

                    a5ed103ec4719a27ab3d3c01dac66f01

                    SHA1

                    c830d6980d7edea60568a518eccd36c0bc2a4924

                    SHA256

                    dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                    SHA512

                    b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
                    Filesize

                    162B

                    MD5

                    1b7c22a214949975556626d7217e9a39

                    SHA1

                    d01c97e2944166ed23e47e4a62ff471ab8fa031f

                    SHA256

                    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                    SHA512

                    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                  • memory/2916-154-0x00000000003F0000-0x00000000003FA000-memory.dmp
                    Filesize

                    40KB

                  • memory/3988-194-0x0000000000400000-0x0000000000430000-memory.dmp
                    Filesize

                    192KB

                  • memory/3988-200-0x0000000004F30000-0x0000000004F40000-memory.dmp
                    Filesize

                    64KB

                  • memory/5104-162-0x0000000000270000-0x00000000002A0000-memory.dmp
                    Filesize

                    192KB

                  • memory/5104-176-0x000000000B270000-0x000000000B2C0000-memory.dmp
                    Filesize

                    320KB

                  • memory/5104-175-0x000000000C0F0000-0x000000000C61C000-memory.dmp
                    Filesize

                    5.2MB

                  • memory/5104-174-0x000000000B9F0000-0x000000000BBB2000-memory.dmp
                    Filesize

                    1.8MB

                  • memory/5104-173-0x000000000AE90000-0x000000000AEF6000-memory.dmp
                    Filesize

                    408KB

                  • memory/5104-172-0x000000000B440000-0x000000000B9E4000-memory.dmp
                    Filesize

                    5.6MB

                  • memory/5104-171-0x000000000ADF0000-0x000000000AE82000-memory.dmp
                    Filesize

                    584KB

                  • memory/5104-170-0x000000000AD70000-0x000000000ADE6000-memory.dmp
                    Filesize

                    472KB

                  • memory/5104-169-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
                    Filesize

                    64KB

                  • memory/5104-167-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
                    Filesize

                    64KB

                  • memory/5104-166-0x000000000A070000-0x000000000A0AC000-memory.dmp
                    Filesize

                    240KB

                  • memory/5104-165-0x0000000004B60000-0x0000000004B72000-memory.dmp
                    Filesize

                    72KB

                  • memory/5104-164-0x000000000A140000-0x000000000A24A000-memory.dmp
                    Filesize

                    1.0MB

                  • memory/5104-163-0x000000000A650000-0x000000000AC68000-memory.dmp
                    Filesize

                    6.1MB