Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    02-09-2021 15:44

General

  • Target

    9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe

  • Size

    622KB

  • MD5

    c401e59268ce122cbe861437d99de240

  • SHA1

    b73d04412ab3dc1b7ac6c11d8343ab29831a8b32

  • SHA256

    9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a

  • SHA512

    707e7f15af8b8bd9c99e70cd126c5fb5577ab1ceb8c45c23f5842fe666ca774e2966f77cf7eeaa30bd322d235bf004466a33909cd5ee8617f3c9e076b57fcb4f

Malware Config

Extracted

Family

redline

Botnet

test1

C2

54.38.136.110:27734

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
    "C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:740
    • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
      C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3820
    • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
      C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:936
    • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
      C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3424
    • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
      C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:908
    • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
      C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2268
    • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
      C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1140
    • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
      C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1784
    • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
      C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2164
    • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
      C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1216
    • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
      C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
      2⤵
        PID:4044
      • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
        C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1104
      • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
        C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:768
      • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
        C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3948
      • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
        C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1832
      • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
        C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2532
      • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
        C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3236
      • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
        C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:208
      • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
        C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2976
      • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
        C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3424
      • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
        C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
        2⤵
          PID:3992
        • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
          C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2580
        • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
          C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1548
        • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
          C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1140
        • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
          C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:908
        • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
          C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1512
        • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
          C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3036
        • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
          C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2420
        • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
          C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2576
        • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
          C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
          2⤵
            PID:3956
          • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
            C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3424
          • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
            C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3156
          • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
            C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1652
          • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
            C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4044
          • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
            C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3380
          • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
            C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3584
          • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
            C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
            2⤵
              PID:1772
            • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
              C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
              2⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2228
            • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
              C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
              2⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2072
            • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
              C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
              2⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:3700
            • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
              C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
              2⤵
                PID:3868
              • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
                C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
                2⤵
                  PID:380
                • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
                  C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
                  2⤵
                    PID:392
                  • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
                    C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
                    2⤵
                      PID:1620
                    • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
                      C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
                      2⤵
                        PID:1784
                      • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
                        C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
                        2⤵
                          PID:2164
                        • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
                          C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
                          2⤵
                            PID:768
                          • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
                            C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
                            2⤵
                              PID:204
                            • C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
                              C:\Users\Admin\AppData\Local\Temp\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe
                              2⤵
                                PID:3176

                            Network

                            MITRE ATT&CK Matrix ATT&CK v6

                            Credential Access

                            Credentials in Files

                            2
                            T1081

                            Discovery

                            Query Registry

                            1
                            T1012

                            Collection

                            Data from Local System

                            2
                            T1005

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\9ea4469f78d2953c8061672f6c7630a9728b42944e37be3e30bc6774812af88a.exe.log
                              MD5

                              4016082507360f6a157b92f0f6d337f2

                              SHA1

                              280e28cfb1c9abc93d14ae82871ce14515e600dc

                              SHA256

                              ea7884e784e0daae71821a28aa203e90241c026909b1b9346a4f48ae4b6d2c07

                              SHA512

                              511b35cb995227b51b1a3b2078b9cac477ca7085ad86482e518ef49dbae9e2c7411c920791e911caaef248b6b939e7a84012a8a3e66fcd1f4646e9c43e196d6b

                            • memory/208-392-0x0000000004EB0000-0x00000000053AE000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/208-379-0x000000000041C5F2-mapping.dmp
                            • memory/380-749-0x0000000004E60000-0x000000000535E000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/380-739-0x000000000041C5F2-mapping.dmp
                            • memory/740-116-0x0000000005170000-0x0000000005171000-memory.dmp
                              Filesize

                              4KB

                            • memory/740-117-0x0000000002DA0000-0x0000000002DA1000-memory.dmp
                              Filesize

                              4KB

                            • memory/740-118-0x0000000005300000-0x0000000005301000-memory.dmp
                              Filesize

                              4KB

                            • memory/740-114-0x00000000008E0000-0x00000000008E1000-memory.dmp
                              Filesize

                              4KB

                            • memory/768-305-0x0000000005320000-0x000000000581E000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/768-295-0x000000000041C5F2-mapping.dmp
                            • memory/768-799-0x000000000041C5F2-mapping.dmp
                            • memory/768-809-0x0000000005610000-0x0000000005B0E000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/908-499-0x0000000005480000-0x000000000597E000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/908-487-0x000000000041C5F2-mapping.dmp
                            • memory/908-156-0x000000000041C5F2-mapping.dmp
                            • memory/908-165-0x00000000057E0000-0x0000000005CDE000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/936-175-0x0000000008F30000-0x0000000008F31000-memory.dmp
                              Filesize

                              4KB

                            • memory/936-132-0x000000000041C5F2-mapping.dmp
                            • memory/936-142-0x00000000055C0000-0x0000000005ABE000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/1104-277-0x000000000041C5F2-mapping.dmp
                            • memory/1104-286-0x0000000004F40000-0x000000000543E000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/1140-478-0x0000000002860000-0x0000000002861000-memory.dmp
                              Filesize

                              4KB

                            • memory/1140-196-0x000000000041C5F2-mapping.dmp
                            • memory/1140-206-0x0000000005710000-0x0000000005C0E000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/1140-469-0x000000000041C5F2-mapping.dmp
                            • memory/1216-264-0x0000000004FB0000-0x00000000054AE000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/1216-247-0x000000000041C5F2-mapping.dmp
                            • memory/1512-505-0x000000000041C5F2-mapping.dmp
                            • memory/1512-517-0x0000000003040000-0x0000000003052000-memory.dmp
                              Filesize

                              72KB

                            • memory/1548-457-0x000000000041C5F2-mapping.dmp
                            • memory/1548-467-0x0000000004F10000-0x000000000540E000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/1620-767-0x0000000004E00000-0x00000000052FE000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/1620-757-0x000000000041C5F2-mapping.dmp
                            • memory/1652-613-0x000000000041C5F2-mapping.dmp
                            • memory/1652-628-0x0000000004DA0000-0x000000000529E000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/1784-774-0x000000000041C5F2-mapping.dmp
                            • memory/1784-784-0x00000000052D0000-0x00000000057CE000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/1784-230-0x0000000005690000-0x0000000005B8E000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/1784-216-0x000000000041C5F2-mapping.dmp
                            • memory/1832-324-0x000000000041C5F2-mapping.dmp
                            • memory/1832-334-0x0000000005840000-0x0000000005D3E000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/2072-708-0x000000000041C5F2-mapping.dmp
                            • memory/2072-717-0x0000000005630000-0x0000000005B2E000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/2164-235-0x000000000041C5F2-mapping.dmp
                            • memory/2164-245-0x0000000005740000-0x0000000005C3E000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/2164-797-0x0000000005830000-0x0000000005E36000-memory.dmp
                              Filesize

                              6.0MB

                            • memory/2164-787-0x000000000041C5F2-mapping.dmp
                            • memory/2228-690-0x000000000041C5F2-mapping.dmp
                            • memory/2228-698-0x0000000005880000-0x0000000005D7E000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/2268-178-0x000000000041C5F2-mapping.dmp
                            • memory/2268-187-0x0000000006180000-0x0000000006786000-memory.dmp
                              Filesize

                              6.0MB

                            • memory/2420-541-0x000000000041C5F2-mapping.dmp
                            • memory/2420-556-0x0000000005640000-0x0000000005B3E000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/2532-353-0x0000000005140000-0x000000000563E000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/2532-342-0x000000000041C5F2-mapping.dmp
                            • memory/2576-569-0x0000000004F40000-0x0000000005546000-memory.dmp
                              Filesize

                              6.0MB

                            • memory/2576-559-0x000000000041C5F2-mapping.dmp
                            • memory/2580-438-0x000000000041C5F2-mapping.dmp
                            • memory/2580-453-0x0000000004E20000-0x000000000531E000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/2976-411-0x0000000005080000-0x000000000557E000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/2976-396-0x000000000041C5F2-mapping.dmp
                            • memory/3036-523-0x000000000041C5F2-mapping.dmp
                            • memory/3036-536-0x0000000005250000-0x000000000574E000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/3156-600-0x000000000041C5F2-mapping.dmp
                            • memory/3156-610-0x0000000005100000-0x00000000055FE000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/3236-360-0x000000000041C5F2-mapping.dmp
                            • memory/3236-374-0x0000000002AB0000-0x0000000002AB1000-memory.dmp
                              Filesize

                              4KB

                            • memory/3380-663-0x00000000056B0000-0x0000000005BAE000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/3380-648-0x000000000041C5F2-mapping.dmp
                            • memory/3424-598-0x0000000005390000-0x000000000588E000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/3424-583-0x000000000041C5F2-mapping.dmp
                            • memory/3424-153-0x0000000005090000-0x000000000558E000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/3424-414-0x000000000041C5F2-mapping.dmp
                            • memory/3424-144-0x000000000041C5F2-mapping.dmp
                            • memory/3424-428-0x00000000053E0000-0x00000000058DE000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/3584-682-0x0000000005700000-0x0000000005BFE000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/3584-666-0x000000000041C5F2-mapping.dmp
                            • memory/3700-721-0x000000000041C5F2-mapping.dmp
                            • memory/3700-730-0x0000000005370000-0x000000000586E000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/3820-166-0x0000000008400000-0x0000000008401000-memory.dmp
                              Filesize

                              4KB

                            • memory/3820-129-0x0000000004FC0000-0x00000000054BE000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/3820-119-0x0000000000400000-0x0000000000422000-memory.dmp
                              Filesize

                              136KB

                            • memory/3820-120-0x000000000041C5F2-mapping.dmp
                            • memory/3820-168-0x0000000008B00000-0x0000000008B01000-memory.dmp
                              Filesize

                              4KB

                            • memory/3820-123-0x00000000054C0000-0x00000000054C1000-memory.dmp
                              Filesize

                              4KB

                            • memory/3820-130-0x0000000005F10000-0x0000000005F11000-memory.dmp
                              Filesize

                              4KB

                            • memory/3820-124-0x0000000005FD0000-0x0000000005FD1000-memory.dmp
                              Filesize

                              4KB

                            • memory/3820-128-0x0000000005ED0000-0x0000000005ED1000-memory.dmp
                              Filesize

                              4KB

                            • memory/3820-127-0x00000000052D0000-0x00000000052D1000-memory.dmp
                              Filesize

                              4KB

                            • memory/3820-126-0x00000000050D0000-0x00000000050D1000-memory.dmp
                              Filesize

                              4KB

                            • memory/3820-125-0x0000000005120000-0x0000000005121000-memory.dmp
                              Filesize

                              4KB

                            • memory/3948-317-0x0000000004990000-0x0000000004E8E000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/3948-307-0x000000000041C5F2-mapping.dmp
                            • memory/4044-645-0x0000000005050000-0x000000000554E000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/4044-630-0x000000000041C5F2-mapping.dmp