Analysis

  • max time kernel
    145s
  • max time network
    154s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    27-01-2022 17:49

General

  • Target

    22c4e23b27ee13f042f198725d4e5e370f9ec986c0b02f2da6a144758e25b90f.msi

  • Size

    7.0MB

  • MD5

    8f8f140fc190448aa8b9b1e3ae118039

  • SHA1

    37c537bb09d0b2738bf78a83d6ee6d7e78febe17

  • SHA256

    22c4e23b27ee13f042f198725d4e5e370f9ec986c0b02f2da6a144758e25b90f

  • SHA512

    c058ddf5a3259cab006d711a4caa6dc244ef1e95d9a2dcdac4c8a07d95c92b77245c3f74b76f497907f9f9fc92d932522bc9ba6cd4682e6e068adaabf0d43680

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • Core1 .NET packer 1 IoCs

    Detects packer/loader used by .NET malware.

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 16 IoCs
  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\22c4e23b27ee13f042f198725d4e5e370f9ec986c0b02f2da6a144758e25b90f.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2668
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Windows\System32\MsiExec.exe
      C:\Windows\System32\MsiExec.exe -Embedding 6DBEC74BB17CD0B13FEF72FA7C883291 C
      2⤵
      • Loads dropped DLL
      PID:2376
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:1832
      • C:\Windows\System32\MsiExec.exe
        C:\Windows\System32\MsiExec.exe -Embedding 8AD46CF74D8D1EE30E723B9666874350
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1072
        • C:\Users\Admin\AppData\Roaming\svshost.exe
          "C:\Users\Admin\AppData\Roaming\svshost.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:4080
        • C:\Users\Admin\AppData\Roaming\svsrhost.exe
          "C:\Users\Admin\AppData\Roaming\svsrhost.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          PID:3540
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
        PID:1448
      • \??\c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k netsvcs -s DsmSvc
        1⤵
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:860

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      Query Registry

      2
      T1012

      Peripheral Device Discovery

      2
      T1120

      System Information Discovery

      2
      T1082

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\27647008-20b6-47c4-ba3f-ec7b720daa19\Repository.ini
        MD5

        b0d1a6cd1c8a2d46675cc75f44920ce5

        SHA1

        9b17bc944871aadd6b7640378966a87e3c7d666f

        SHA256

        f48e5239688355412a7a15218bd501cd2f71b2e497584c6b019ef21df643191b

        SHA512

        7aa31d1d268e21269d14ce406e0f6dbe8217c2c0cd2d81815223efda18b3fc24fc918753def0847e344a92f73d306aa0cafb0434c21cd242a3be5285aa241f56

      • C:\Users\Admin\AppData\Local\Temp\MSI1EAF.tmp
        MD5

        8636e27b4e9fe2e7d4ef7f77fe3ba1d2

        SHA1

        f1c7c604ad423ae6885a4df033440056a937e9c2

        SHA256

        5080ab5f709a25411f372c9d9d4fbcedb95d6a39334533815ab4eb975a43c74c

        SHA512

        dc509d0d1d279380b0c7b44dfc45d22d4ea22188672add296bde316efb4d7a7e0942944e072920df029e6f47fa6f251147179d67a5d747172fa2c3482208cd2e

      • C:\Users\Admin\AppData\Local\Temp\MSI1FAA.tmp
        MD5

        8636e27b4e9fe2e7d4ef7f77fe3ba1d2

        SHA1

        f1c7c604ad423ae6885a4df033440056a937e9c2

        SHA256

        5080ab5f709a25411f372c9d9d4fbcedb95d6a39334533815ab4eb975a43c74c

        SHA512

        dc509d0d1d279380b0c7b44dfc45d22d4ea22188672add296bde316efb4d7a7e0942944e072920df029e6f47fa6f251147179d67a5d747172fa2c3482208cd2e

      • C:\Users\Admin\AppData\Local\Temp\MSI2057.tmp
        MD5

        8636e27b4e9fe2e7d4ef7f77fe3ba1d2

        SHA1

        f1c7c604ad423ae6885a4df033440056a937e9c2

        SHA256

        5080ab5f709a25411f372c9d9d4fbcedb95d6a39334533815ab4eb975a43c74c

        SHA512

        dc509d0d1d279380b0c7b44dfc45d22d4ea22188672add296bde316efb4d7a7e0942944e072920df029e6f47fa6f251147179d67a5d747172fa2c3482208cd2e

      • C:\Users\Admin\AppData\Local\Temp\MSIF869.tmp
        MD5

        8636e27b4e9fe2e7d4ef7f77fe3ba1d2

        SHA1

        f1c7c604ad423ae6885a4df033440056a937e9c2

        SHA256

        5080ab5f709a25411f372c9d9d4fbcedb95d6a39334533815ab4eb975a43c74c

        SHA512

        dc509d0d1d279380b0c7b44dfc45d22d4ea22188672add296bde316efb4d7a7e0942944e072920df029e6f47fa6f251147179d67a5d747172fa2c3482208cd2e

      • C:\Users\Admin\AppData\Roaming\svshost.exe
        MD5

        144623037a06ca80c7651a2636a41f19

        SHA1

        e7de44c61fa98433b8369f70bfebdb53489066c7

        SHA256

        aecf492d73211e6f7212fc2388ce9c7e6dfcf25da9a907d43265fd33052665b6

        SHA512

        445cfb6d4692d9910f9030966f4cfddf9bd7a25e106e9ca9fed05c57ce82b3d5f9e7db67d0ddef3d637a1d02f04c3502749f479e9922bab06e076927703be701

      • C:\Users\Admin\AppData\Roaming\svshost.exe
        MD5

        be60b4ef9bd397d9dcfbf18cc1ef3d78

        SHA1

        4fb36072539fd92267ff003fdb734afaa6620ce6

        SHA256

        a957b938a02878771183a2ab0bff4146ca9ebe1f566b98e6f19df582efd27923

        SHA512

        d49d147c3dd092e8a37f18b1993c141b04a44a29d93bd62444f30cd1887edaeb82c6cd002f3aa10b789545001352a402700df0f6d9d371f4b52efe6d0f9812f3

      • C:\Users\Admin\AppData\Roaming\svsrhost.exe
        MD5

        3b5d157e9768a3c2bf968d2be19ce1ab

        SHA1

        463a0a128bd2c23767877d7a753f2dbfd3a91ae3

        SHA256

        8f2cd5d8fa08046242a7d2c1f61c410c47df392046ccd3ae29719c2264d260bb

        SHA512

        45624e4251d4b971e0bfdd058cf71d3159d7fc6ba51a5dea93973396ae99b84ff887b7d55a4a414dbe830fc2595c9f58fd9dd7e8dcef9646f48a6d3b8da15b22

      • C:\Users\Admin\AppData\Roaming\svsrhost.exe
        MD5

        c4cab87803586980ddf9e981db938dd9

        SHA1

        ff1bece9dd0648e8c07eaca6a24b75c59e6d9d66

        SHA256

        bce834460a6894428eeced0359ec4f819d7ddf14bfa1d37a06b9ace09958c1c5

        SHA512

        905425da40e323f8518b2d0c67119c0793d91448c3aebb536da68d787215de4fe28426d21084a6e728aa91c705e38fd60c379e51accc0139aafe0eae28606b85

      • C:\Windows\Installer\MSIA43B.tmp
        MD5

        8636e27b4e9fe2e7d4ef7f77fe3ba1d2

        SHA1

        f1c7c604ad423ae6885a4df033440056a937e9c2

        SHA256

        5080ab5f709a25411f372c9d9d4fbcedb95d6a39334533815ab4eb975a43c74c

        SHA512

        dc509d0d1d279380b0c7b44dfc45d22d4ea22188672add296bde316efb4d7a7e0942944e072920df029e6f47fa6f251147179d67a5d747172fa2c3482208cd2e

      • C:\Windows\Installer\MSIA5C2.tmp
        MD5

        8636e27b4e9fe2e7d4ef7f77fe3ba1d2

        SHA1

        f1c7c604ad423ae6885a4df033440056a937e9c2

        SHA256

        5080ab5f709a25411f372c9d9d4fbcedb95d6a39334533815ab4eb975a43c74c

        SHA512

        dc509d0d1d279380b0c7b44dfc45d22d4ea22188672add296bde316efb4d7a7e0942944e072920df029e6f47fa6f251147179d67a5d747172fa2c3482208cd2e

      • C:\Windows\Installer\MSIA96D.tmp
        MD5

        8636e27b4e9fe2e7d4ef7f77fe3ba1d2

        SHA1

        f1c7c604ad423ae6885a4df033440056a937e9c2

        SHA256

        5080ab5f709a25411f372c9d9d4fbcedb95d6a39334533815ab4eb975a43c74c

        SHA512

        dc509d0d1d279380b0c7b44dfc45d22d4ea22188672add296bde316efb4d7a7e0942944e072920df029e6f47fa6f251147179d67a5d747172fa2c3482208cd2e

      • C:\Windows\Installer\MSIAC3E.tmp
        MD5

        8636e27b4e9fe2e7d4ef7f77fe3ba1d2

        SHA1

        f1c7c604ad423ae6885a4df033440056a937e9c2

        SHA256

        5080ab5f709a25411f372c9d9d4fbcedb95d6a39334533815ab4eb975a43c74c

        SHA512

        dc509d0d1d279380b0c7b44dfc45d22d4ea22188672add296bde316efb4d7a7e0942944e072920df029e6f47fa6f251147179d67a5d747172fa2c3482208cd2e

      • C:\Windows\Installer\MSIADF4.tmp
        MD5

        8636e27b4e9fe2e7d4ef7f77fe3ba1d2

        SHA1

        f1c7c604ad423ae6885a4df033440056a937e9c2

        SHA256

        5080ab5f709a25411f372c9d9d4fbcedb95d6a39334533815ab4eb975a43c74c

        SHA512

        dc509d0d1d279380b0c7b44dfc45d22d4ea22188672add296bde316efb4d7a7e0942944e072920df029e6f47fa6f251147179d67a5d747172fa2c3482208cd2e

      • C:\Windows\Installer\MSID4E7.tmp
        MD5

        8636e27b4e9fe2e7d4ef7f77fe3ba1d2

        SHA1

        f1c7c604ad423ae6885a4df033440056a937e9c2

        SHA256

        5080ab5f709a25411f372c9d9d4fbcedb95d6a39334533815ab4eb975a43c74c

        SHA512

        dc509d0d1d279380b0c7b44dfc45d22d4ea22188672add296bde316efb4d7a7e0942944e072920df029e6f47fa6f251147179d67a5d747172fa2c3482208cd2e

      • C:\Windows\Installer\MSID891.tmp
        MD5

        8636e27b4e9fe2e7d4ef7f77fe3ba1d2

        SHA1

        f1c7c604ad423ae6885a4df033440056a937e9c2

        SHA256

        5080ab5f709a25411f372c9d9d4fbcedb95d6a39334533815ab4eb975a43c74c

        SHA512

        dc509d0d1d279380b0c7b44dfc45d22d4ea22188672add296bde316efb4d7a7e0942944e072920df029e6f47fa6f251147179d67a5d747172fa2c3482208cd2e

      • C:\Windows\Installer\MSIF4F5.tmp
        MD5

        8636e27b4e9fe2e7d4ef7f77fe3ba1d2

        SHA1

        f1c7c604ad423ae6885a4df033440056a937e9c2

        SHA256

        5080ab5f709a25411f372c9d9d4fbcedb95d6a39334533815ab4eb975a43c74c

        SHA512

        dc509d0d1d279380b0c7b44dfc45d22d4ea22188672add296bde316efb4d7a7e0942944e072920df029e6f47fa6f251147179d67a5d747172fa2c3482208cd2e

      • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2
        MD5

        781a79fb676e39a93ea7278fbbfc42cb

        SHA1

        b249a280aac753672137e3b857c3b3020448b7fc

        SHA256

        3a76b780511fbe160a136c3209ac719306bbc134195437b7c70c53a307aba2c5

        SHA512

        4fb2eec3472acf16b9e58ecab7fd81cffc1a2d07c0bbaa9e31c1c7bc19062782295441e7f49dcef0d26c3ef6f73925215c88eeb652817833b7bf91594526b8a7

      • \??\Volume{2b67a87f-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{a043c196-0dff-47d7-ab14-6465a11096fc}_OnDiskSnapshotProp
        MD5

        02c1e4174846fdb4baf652b01d6d3f03

        SHA1

        3b9594fdd1889d7f94775b8a53354bf25043630c

        SHA256

        7fb007c0569f44f7c1b80967a03b49b3f1e3563536351dc1d52fa0cb80f886ed

        SHA512

        5511c602b004483ec87689cbe32f95119b06ddf9c07206a5bf8faf36fad88acd444ce81c8fe515468696c7928ba30d40f8fe1bd4bebef412f45fa0e08284cf42

      • \Users\Admin\AppData\Local\Temp\MSI1EAF.tmp
        MD5

        8636e27b4e9fe2e7d4ef7f77fe3ba1d2

        SHA1

        f1c7c604ad423ae6885a4df033440056a937e9c2

        SHA256

        5080ab5f709a25411f372c9d9d4fbcedb95d6a39334533815ab4eb975a43c74c

        SHA512

        dc509d0d1d279380b0c7b44dfc45d22d4ea22188672add296bde316efb4d7a7e0942944e072920df029e6f47fa6f251147179d67a5d747172fa2c3482208cd2e

      • \Users\Admin\AppData\Local\Temp\MSI1FAA.tmp
        MD5

        8636e27b4e9fe2e7d4ef7f77fe3ba1d2

        SHA1

        f1c7c604ad423ae6885a4df033440056a937e9c2

        SHA256

        5080ab5f709a25411f372c9d9d4fbcedb95d6a39334533815ab4eb975a43c74c

        SHA512

        dc509d0d1d279380b0c7b44dfc45d22d4ea22188672add296bde316efb4d7a7e0942944e072920df029e6f47fa6f251147179d67a5d747172fa2c3482208cd2e

      • \Users\Admin\AppData\Local\Temp\MSI2057.tmp
        MD5

        8636e27b4e9fe2e7d4ef7f77fe3ba1d2

        SHA1

        f1c7c604ad423ae6885a4df033440056a937e9c2

        SHA256

        5080ab5f709a25411f372c9d9d4fbcedb95d6a39334533815ab4eb975a43c74c

        SHA512

        dc509d0d1d279380b0c7b44dfc45d22d4ea22188672add296bde316efb4d7a7e0942944e072920df029e6f47fa6f251147179d67a5d747172fa2c3482208cd2e

      • \Users\Admin\AppData\Local\Temp\MSIF869.tmp
        MD5

        8636e27b4e9fe2e7d4ef7f77fe3ba1d2

        SHA1

        f1c7c604ad423ae6885a4df033440056a937e9c2

        SHA256

        5080ab5f709a25411f372c9d9d4fbcedb95d6a39334533815ab4eb975a43c74c

        SHA512

        dc509d0d1d279380b0c7b44dfc45d22d4ea22188672add296bde316efb4d7a7e0942944e072920df029e6f47fa6f251147179d67a5d747172fa2c3482208cd2e

      • \Windows\Installer\MSIA43B.tmp
        MD5

        8636e27b4e9fe2e7d4ef7f77fe3ba1d2

        SHA1

        f1c7c604ad423ae6885a4df033440056a937e9c2

        SHA256

        5080ab5f709a25411f372c9d9d4fbcedb95d6a39334533815ab4eb975a43c74c

        SHA512

        dc509d0d1d279380b0c7b44dfc45d22d4ea22188672add296bde316efb4d7a7e0942944e072920df029e6f47fa6f251147179d67a5d747172fa2c3482208cd2e

      • \Windows\Installer\MSIA5C2.tmp
        MD5

        8636e27b4e9fe2e7d4ef7f77fe3ba1d2

        SHA1

        f1c7c604ad423ae6885a4df033440056a937e9c2

        SHA256

        5080ab5f709a25411f372c9d9d4fbcedb95d6a39334533815ab4eb975a43c74c

        SHA512

        dc509d0d1d279380b0c7b44dfc45d22d4ea22188672add296bde316efb4d7a7e0942944e072920df029e6f47fa6f251147179d67a5d747172fa2c3482208cd2e

      • \Windows\Installer\MSIA96D.tmp
        MD5

        8636e27b4e9fe2e7d4ef7f77fe3ba1d2

        SHA1

        f1c7c604ad423ae6885a4df033440056a937e9c2

        SHA256

        5080ab5f709a25411f372c9d9d4fbcedb95d6a39334533815ab4eb975a43c74c

        SHA512

        dc509d0d1d279380b0c7b44dfc45d22d4ea22188672add296bde316efb4d7a7e0942944e072920df029e6f47fa6f251147179d67a5d747172fa2c3482208cd2e

      • \Windows\Installer\MSIAC3E.tmp
        MD5

        8636e27b4e9fe2e7d4ef7f77fe3ba1d2

        SHA1

        f1c7c604ad423ae6885a4df033440056a937e9c2

        SHA256

        5080ab5f709a25411f372c9d9d4fbcedb95d6a39334533815ab4eb975a43c74c

        SHA512

        dc509d0d1d279380b0c7b44dfc45d22d4ea22188672add296bde316efb4d7a7e0942944e072920df029e6f47fa6f251147179d67a5d747172fa2c3482208cd2e

      • \Windows\Installer\MSIADF4.tmp
        MD5

        8636e27b4e9fe2e7d4ef7f77fe3ba1d2

        SHA1

        f1c7c604ad423ae6885a4df033440056a937e9c2

        SHA256

        5080ab5f709a25411f372c9d9d4fbcedb95d6a39334533815ab4eb975a43c74c

        SHA512

        dc509d0d1d279380b0c7b44dfc45d22d4ea22188672add296bde316efb4d7a7e0942944e072920df029e6f47fa6f251147179d67a5d747172fa2c3482208cd2e

      • \Windows\Installer\MSID4E7.tmp
        MD5

        8636e27b4e9fe2e7d4ef7f77fe3ba1d2

        SHA1

        f1c7c604ad423ae6885a4df033440056a937e9c2

        SHA256

        5080ab5f709a25411f372c9d9d4fbcedb95d6a39334533815ab4eb975a43c74c

        SHA512

        dc509d0d1d279380b0c7b44dfc45d22d4ea22188672add296bde316efb4d7a7e0942944e072920df029e6f47fa6f251147179d67a5d747172fa2c3482208cd2e

      • \Windows\Installer\MSID891.tmp
        MD5

        8636e27b4e9fe2e7d4ef7f77fe3ba1d2

        SHA1

        f1c7c604ad423ae6885a4df033440056a937e9c2

        SHA256

        5080ab5f709a25411f372c9d9d4fbcedb95d6a39334533815ab4eb975a43c74c

        SHA512

        dc509d0d1d279380b0c7b44dfc45d22d4ea22188672add296bde316efb4d7a7e0942944e072920df029e6f47fa6f251147179d67a5d747172fa2c3482208cd2e

      • \Windows\Installer\MSIF4F5.tmp
        MD5

        8636e27b4e9fe2e7d4ef7f77fe3ba1d2

        SHA1

        f1c7c604ad423ae6885a4df033440056a937e9c2

        SHA256

        5080ab5f709a25411f372c9d9d4fbcedb95d6a39334533815ab4eb975a43c74c

        SHA512

        dc509d0d1d279380b0c7b44dfc45d22d4ea22188672add296bde316efb4d7a7e0942944e072920df029e6f47fa6f251147179d67a5d747172fa2c3482208cd2e

      • memory/3540-692-0x0000000001C90000-0x0000000001C92000-memory.dmp
        Filesize

        8KB

      • memory/3540-683-0x00000000016E0000-0x0000000001748000-memory.dmp
        Filesize

        416KB

      • memory/3540-693-0x0000000001D10000-0x0000000001D4E000-memory.dmp
        Filesize

        248KB

      • memory/3540-686-0x000000001D400000-0x000000001D5C2000-memory.dmp
        Filesize

        1.8MB

      • memory/3540-699-0x00000000016A0000-0x00000000016A6000-memory.dmp
        Filesize

        24KB

      • memory/3540-677-0x0000000000E70000-0x0000000000EB0000-memory.dmp
        Filesize

        256KB

      • memory/3540-691-0x0000000003A10000-0x0000000003A60000-memory.dmp
        Filesize

        320KB

      • memory/4080-681-0x0000000000ED0000-0x0000000000ED1000-memory.dmp
        Filesize

        4KB

      • memory/4080-690-0x0000000074BC0000-0x0000000074CB1000-memory.dmp
        Filesize

        964KB

      • memory/4080-684-0x00000000754F0000-0x00000000756B2000-memory.dmp
        Filesize

        1.8MB

      • memory/4080-694-0x00000000012D0000-0x00000000016ED000-memory.dmp
        Filesize

        4.1MB

      • memory/4080-696-0x00000000012D0000-0x00000000016ED000-memory.dmp
        Filesize

        4.1MB

      • memory/4080-680-0x0000000002F90000-0x0000000002FD5000-memory.dmp
        Filesize

        276KB

      • memory/4080-698-0x00000000721E0000-0x0000000072260000-memory.dmp
        Filesize

        512KB

      • memory/4080-679-0x00000000012D0000-0x00000000016ED000-memory.dmp
        Filesize

        4.1MB

      • memory/4080-700-0x00000000060B0000-0x00000000066B6000-memory.dmp
        Filesize

        6.0MB

      • memory/4080-701-0x00000000059C0000-0x00000000059D2000-memory.dmp
        Filesize

        72KB

      • memory/4080-702-0x0000000005BB0000-0x0000000005CBA000-memory.dmp
        Filesize

        1.0MB

      • memory/4080-703-0x0000000005A20000-0x0000000005A5E000-memory.dmp
        Filesize

        248KB

      • memory/4080-704-0x0000000074E30000-0x00000000753B4000-memory.dmp
        Filesize

        5.5MB

      • memory/4080-706-0x0000000005A90000-0x0000000005A91000-memory.dmp
        Filesize

        4KB

      • memory/4080-705-0x0000000076250000-0x0000000077598000-memory.dmp
        Filesize

        19.3MB

      • memory/4080-707-0x0000000005AA0000-0x0000000005AEB000-memory.dmp
        Filesize

        300KB

      • memory/4080-708-0x0000000071350000-0x000000007139B000-memory.dmp
        Filesize

        300KB

      • memory/4080-715-0x0000000006CF0000-0x0000000006D56000-memory.dmp
        Filesize

        408KB

      • memory/4080-716-0x0000000007360000-0x000000000785E000-memory.dmp
        Filesize

        5.0MB

      • memory/4080-717-0x0000000006F30000-0x0000000006FA6000-memory.dmp
        Filesize

        472KB

      • memory/4080-718-0x0000000007050000-0x00000000070E2000-memory.dmp
        Filesize

        584KB

      • memory/4080-719-0x0000000007030000-0x000000000704E000-memory.dmp
        Filesize

        120KB