Analysis

  • max time kernel
    127s
  • max time network
    138s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    14-11-2021 07:28

General

  • Target

    37b17ce0ed1fcc87e0f94f0039686901af4c6e822a7d514eafca4c5faae88f0b.exe

  • Size

    2.1MB

  • MD5

    03efae21eae96e2e8c788217b0e68377

  • SHA1

    ba46c911a47cced4b72a68d5e3083f6e0e153e45

  • SHA256

    37b17ce0ed1fcc87e0f94f0039686901af4c6e822a7d514eafca4c5faae88f0b

  • SHA512

    4fa856972b7174b333e9aa1142834c6c25c2d31958cf7379f10ca2a948f99e134943e2a3c591ad88fd06d1d2d6fefa906eec6998c6c90f208b89b8bf11326d4c

Malware Config

Extracted

Family

redline

Botnet

ОШИБКА

C2

185.183.32.161:45391

Extracted

Family

redline

Botnet

11/13

C2

94.103.9.133:1169

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • Executes dropped EXE 10 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37b17ce0ed1fcc87e0f94f0039686901af4c6e822a7d514eafca4c5faae88f0b.exe
    "C:\Users\Admin\AppData\Local\Temp\37b17ce0ed1fcc87e0f94f0039686901af4c6e822a7d514eafca4c5faae88f0b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Users\Admin\AppData\Local\Temp\clean.exe
      "C:\Users\Admin\AppData\Local\Temp\clean.exe"
      2⤵
      • Executes dropped EXE
      PID:2712
    • C:\Users\Admin\AppData\Local\Temp\OQTGVRp.exe
      "C:\Users\Admin\AppData\Local\Temp\OQTGVRp.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:640
      • C:\Windows\SysWOW64\makecab.exe
        makecab
        3⤵
          PID:1484
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c cmd < Duro.potx
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3852
          • C:\Windows\SysWOW64\cmd.exe
            cmd
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2808
            • C:\Windows\SysWOW64\findstr.exe
              findstr /V /R "^JdynOpYGXnWkzSuDQWhFskbJYxaqZbxLWAnCRclynOJXkaaxpyDmJmtnSvAxQXHArlfSxDLxLiiDBmnGwYRUUVevcZJcVQgAupUqemqFzoNBaA$" Due.potx
              5⤵
                PID:1260
              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com
                Forma.exe.com b
                5⤵
                • Executes dropped EXE
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:2604
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com b
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:1144
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
                    7⤵
                    • Executes dropped EXE
                    PID:392
              • C:\Windows\SysWOW64\PING.EXE
                ping 127.0.0.1
                5⤵
                • Runs ping.exe
                PID:3112
        • C:\Users\Admin\AppData\Local\Temp\clean.exe
          "C:\Users\Admin\AppData\Local\Temp\clean.exe"
          2⤵
          • Executes dropped EXE
          PID:1360
        • C:\Users\Admin\AppData\Local\Temp\QdUPABU.exe
          "C:\Users\Admin\AppData\Local\Temp\QdUPABU.exe"
          2⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1180
          • C:\Windows\SysWOW64\makecab.exe
            makecab
            3⤵
              PID:816
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c cmd < Aggrava.accdt
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:380
              • C:\Windows\SysWOW64\cmd.exe
                cmd
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2816
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /V /R "^ShpzYFLbYRfWJuFRXyNbzLysSxWtdBORrgKocLRwRlexRlxdHPIcxtdioSAEIHivrnSxvvvjgLGoIKmHZGvBSzvYYDqDljzlrGszaqTlaviIninbaTFelFEKwTcTvTew$" Pie.accdt
                  5⤵
                    PID:1068
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Udi.exe.com
                    Udi.exe.com k
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of WriteProcessMemory
                    PID:1176
                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Udi.exe.com
                      C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Udi.exe.com k
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of WriteProcessMemory
                      PID:1824
                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RegAsm.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RegAsm.exe
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2600
                  • C:\Windows\SysWOW64\PING.EXE
                    ping 127.0.0.1
                    5⤵
                    • Runs ping.exe
                    PID:1580

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Persistence

          Registry Run Keys / Startup Folder

          1
          T1060

          Defense Evasion

          Modify Registry

          1
          T1112

          Discovery

          Query Registry

          1
          T1012

          System Information Discovery

          1
          T1082

          Remote System Discovery

          1
          T1018

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Due.potx
            MD5

            6684f94034e10a93758e2c22c75f1613

            SHA1

            25b7d85449caa642beafcf488f1af1fb745ad0ca

            SHA256

            3e6fff185ac509106bed8e02969acc2c272f65300249e66b5a504c92d4a58d0e

            SHA512

            43141e2a5f1cd92cff9a63e1af68d9a1af458ae8f5f7b489172d06e21fe103793a045ed4ee613b4618b42665c5d644d058c0ac78d19d0ef55cf5936201cfd1fb

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Duro.potx
            MD5

            32672958dfe282494f18f8be6b5daea8

            SHA1

            29eb8689b235ffc001286410039ff1399b9e3d33

            SHA256

            a9a4218d1a194894aaf6b487c502a24f0f84041a20e720a4a719201ffc31ae02

            SHA512

            05a7c2ee83b6284df5f072ba493a0b90e315e54c786ee22b159e3d1197335c72f8b637ddf2e1c7884c4275e0ebc553d68492ae2ed42b43d11c0010808e5dc5f4

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Era.potx
            MD5

            016c737a43c6e6e2cb7abf7d85c5057d

            SHA1

            e68f088fa89473aa3cc032429bcc62b4b0f61116

            SHA256

            b1263474b5adfaa1419a51ebd697ddcb05ff89bc6c037e08d376994f4550957b

            SHA512

            ebba96e749127d7678bae1d47cd00a287812a49840da72932f97e8469e49a3eb01b0c198aa69ae42c03211cfed275c77fdf086679433dc8c55ea60b1ccf3c607

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com
            MD5

            c56b5f0201a3b3de53e561fe76912bfd

            SHA1

            2a4062e10a5de813f5688221dbeb3f3ff33eb417

            SHA256

            237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

            SHA512

            195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com
            MD5

            c56b5f0201a3b3de53e561fe76912bfd

            SHA1

            2a4062e10a5de813f5688221dbeb3f3ff33eb417

            SHA256

            237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

            SHA512

            195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com
            MD5

            c56b5f0201a3b3de53e561fe76912bfd

            SHA1

            2a4062e10a5de813f5688221dbeb3f3ff33eb417

            SHA256

            237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

            SHA512

            195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
            MD5

            b58b926c3574d28d5b7fdd2ca3ec30d5

            SHA1

            d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

            SHA256

            6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

            SHA512

            b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
            MD5

            b58b926c3574d28d5b7fdd2ca3ec30d5

            SHA1

            d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

            SHA256

            6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

            SHA512

            b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b
            MD5

            016c737a43c6e6e2cb7abf7d85c5057d

            SHA1

            e68f088fa89473aa3cc032429bcc62b4b0f61116

            SHA256

            b1263474b5adfaa1419a51ebd697ddcb05ff89bc6c037e08d376994f4550957b

            SHA512

            ebba96e749127d7678bae1d47cd00a287812a49840da72932f97e8469e49a3eb01b0c198aa69ae42c03211cfed275c77fdf086679433dc8c55ea60b1ccf3c607

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Aggrava.accdt
            MD5

            ea7b73c99c39a859e7e8b0a815570986

            SHA1

            bd74eb1f49d26a461060f131683021750889a65f

            SHA256

            edd2efdd14116825ff18d706aad2bd716382acbe678eda85c5057bd257b1a02e

            SHA512

            167288428c40eab8e1864bf7db8e70721790763bed0db598af1da860950839058255f58398a61070fbafeea575d9557ec7c6d5b9c424b217602968a40cdf34d9

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Migliore.accdt
            MD5

            d9119aa074bfaff410bb7a4139146a19

            SHA1

            74ea5a967fcba2dde0b27de519dbaf1ef7028636

            SHA256

            797bdb0508bf241ccc4beff1da822e26b5113592556fbbf53623ec2f0c432ec7

            SHA512

            1187f6c0f0f9488bfd57129622b24e747b54a50cb1141bc7fc9e1d62e9a80c415efa85c7322d3391a88fb9e9b8335daabf0e258d3896f2eba571e9e7fbba32b6

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Pie.accdt
            MD5

            a172c86dab6bebb6c82410c1f1c1567d

            SHA1

            56a171dfe8137793f45640fc31b3a159f5a84c7d

            SHA256

            d83dd02bf0531d87e4b1af3a68cd601b21d33e2a9e77bc7e8cf1753f77b10438

            SHA512

            107df456743e3e793ca75e2c5e7bfad1ee1801cae03636dec2539cd4c4995b601c3d79118ad0874c6caf8293d1812bf31d459549f7925cb814e30bad4fc30896

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RegAsm.exe
            MD5

            b58b926c3574d28d5b7fdd2ca3ec30d5

            SHA1

            d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

            SHA256

            6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

            SHA512

            b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RegAsm.exe
            MD5

            b58b926c3574d28d5b7fdd2ca3ec30d5

            SHA1

            d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

            SHA256

            6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

            SHA512

            b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Udi.exe.com
            MD5

            c56b5f0201a3b3de53e561fe76912bfd

            SHA1

            2a4062e10a5de813f5688221dbeb3f3ff33eb417

            SHA256

            237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

            SHA512

            195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Udi.exe.com
            MD5

            c56b5f0201a3b3de53e561fe76912bfd

            SHA1

            2a4062e10a5de813f5688221dbeb3f3ff33eb417

            SHA256

            237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

            SHA512

            195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Udi.exe.com
            MD5

            c56b5f0201a3b3de53e561fe76912bfd

            SHA1

            2a4062e10a5de813f5688221dbeb3f3ff33eb417

            SHA256

            237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

            SHA512

            195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k
            MD5

            d9119aa074bfaff410bb7a4139146a19

            SHA1

            74ea5a967fcba2dde0b27de519dbaf1ef7028636

            SHA256

            797bdb0508bf241ccc4beff1da822e26b5113592556fbbf53623ec2f0c432ec7

            SHA512

            1187f6c0f0f9488bfd57129622b24e747b54a50cb1141bc7fc9e1d62e9a80c415efa85c7322d3391a88fb9e9b8335daabf0e258d3896f2eba571e9e7fbba32b6

          • C:\Users\Admin\AppData\Local\Temp\OQTGVRp.exe
            MD5

            ae5b62f74b751690528b1158da869f4b

            SHA1

            9ba07ae06ba49b16fa32dfdd51df33ae771597f4

            SHA256

            9300234fb143a410b3fc3fa0e0631a6a15f563a086af6854d0917ae5653ff0f5

            SHA512

            ba5fd421118e296b9678cbabc19419db1645dbf4c403e5d20cc29a6a2e6e41b71a18e4779004dd79c2f8ede2f13ca9d7ebd5717954cb92bc990d338b77a6e3a2

          • C:\Users\Admin\AppData\Local\Temp\OQTGVRp.exe
            MD5

            ae5b62f74b751690528b1158da869f4b

            SHA1

            9ba07ae06ba49b16fa32dfdd51df33ae771597f4

            SHA256

            9300234fb143a410b3fc3fa0e0631a6a15f563a086af6854d0917ae5653ff0f5

            SHA512

            ba5fd421118e296b9678cbabc19419db1645dbf4c403e5d20cc29a6a2e6e41b71a18e4779004dd79c2f8ede2f13ca9d7ebd5717954cb92bc990d338b77a6e3a2

          • C:\Users\Admin\AppData\Local\Temp\QdUPABU.exe
            MD5

            6a537efb426fe0de4d613615a82fa729

            SHA1

            ed5acfd81d01a5804df26cb259793e532992f07a

            SHA256

            0f20bd03381fabc111c319d58c04e5c8c4fdf4a12fbfed2ae5b0d13b8964ff7b

            SHA512

            bbdc5c3ffd04bc2e35b6cb476dd05315db9d6673edea1b7beafbf70544d4f4a54652213c149362dd8392fddb47d341ee9b17e109d0f8fd8286fceca7abf17ba5

          • C:\Users\Admin\AppData\Local\Temp\QdUPABU.exe
            MD5

            6a537efb426fe0de4d613615a82fa729

            SHA1

            ed5acfd81d01a5804df26cb259793e532992f07a

            SHA256

            0f20bd03381fabc111c319d58c04e5c8c4fdf4a12fbfed2ae5b0d13b8964ff7b

            SHA512

            bbdc5c3ffd04bc2e35b6cb476dd05315db9d6673edea1b7beafbf70544d4f4a54652213c149362dd8392fddb47d341ee9b17e109d0f8fd8286fceca7abf17ba5

          • C:\Users\Admin\AppData\Local\Temp\clean.exe
            MD5

            374a47aa60ba4ef1c2306be2949f0849

            SHA1

            612fedf2475d75d3805d9801f00de1111591b7cc

            SHA256

            c1570c01feaf033c8d7697a7a873b77754b22aa67e0ca0499ed22095b651d2af

            SHA512

            ecb64e77cbca48ae129c08c93565c937a336c7f0016d19a12b76aee8e2508f21615ee1c104123ed5b5dc5e0e077bc81ac8c7042285e778b855a009b6087fad9d

          • C:\Users\Admin\AppData\Local\Temp\clean.exe
            MD5

            374a47aa60ba4ef1c2306be2949f0849

            SHA1

            612fedf2475d75d3805d9801f00de1111591b7cc

            SHA256

            c1570c01feaf033c8d7697a7a873b77754b22aa67e0ca0499ed22095b651d2af

            SHA512

            ecb64e77cbca48ae129c08c93565c937a336c7f0016d19a12b76aee8e2508f21615ee1c104123ed5b5dc5e0e077bc81ac8c7042285e778b855a009b6087fad9d

          • C:\Users\Admin\AppData\Local\Temp\clean.exe
            MD5

            374a47aa60ba4ef1c2306be2949f0849

            SHA1

            612fedf2475d75d3805d9801f00de1111591b7cc

            SHA256

            c1570c01feaf033c8d7697a7a873b77754b22aa67e0ca0499ed22095b651d2af

            SHA512

            ecb64e77cbca48ae129c08c93565c937a336c7f0016d19a12b76aee8e2508f21615ee1c104123ed5b5dc5e0e077bc81ac8c7042285e778b855a009b6087fad9d

          • memory/380-131-0x0000000000000000-mapping.dmp
          • memory/392-173-0x0000000000910000-0x0000000000948000-memory.dmp
            Filesize

            224KB

          • memory/392-184-0x0000000006E50000-0x0000000006E51000-memory.dmp
            Filesize

            4KB

          • memory/640-120-0x0000000000000000-mapping.dmp
          • memory/816-129-0x0000000000000000-mapping.dmp
          • memory/1068-136-0x0000000000000000-mapping.dmp
          • memory/1144-154-0x0000000000000000-mapping.dmp
          • memory/1176-145-0x0000000000000000-mapping.dmp
          • memory/1180-125-0x0000000000000000-mapping.dmp
          • memory/1260-137-0x0000000000000000-mapping.dmp
          • memory/1360-123-0x0000000000000000-mapping.dmp
          • memory/1484-128-0x0000000000000000-mapping.dmp
          • memory/1580-149-0x0000000000000000-mapping.dmp
          • memory/1824-152-0x0000000000000000-mapping.dmp
          • memory/2600-168-0x0000000007E10000-0x0000000007E11000-memory.dmp
            Filesize

            4KB

          • memory/2600-166-0x0000000005BF0000-0x0000000005BF1000-memory.dmp
            Filesize

            4KB

          • memory/2600-156-0x00000000011B0000-0x00000000011D0000-memory.dmp
            Filesize

            128KB

          • memory/2600-172-0x0000000007D50000-0x0000000007D51000-memory.dmp
            Filesize

            4KB

          • memory/2600-171-0x0000000007B50000-0x0000000007B51000-memory.dmp
            Filesize

            4KB

          • memory/2600-162-0x0000000005CB0000-0x0000000005CB1000-memory.dmp
            Filesize

            4KB

          • memory/2600-163-0x0000000005750000-0x0000000005751000-memory.dmp
            Filesize

            4KB

          • memory/2600-164-0x0000000005880000-0x0000000005881000-memory.dmp
            Filesize

            4KB

          • memory/2600-165-0x00000000057C0000-0x00000000057C1000-memory.dmp
            Filesize

            4KB

          • memory/2600-170-0x0000000007AB0000-0x0000000007AB1000-memory.dmp
            Filesize

            4KB

          • memory/2600-167-0x00000000056A0000-0x0000000005CA6000-memory.dmp
            Filesize

            6.0MB

          • memory/2600-169-0x0000000007990000-0x0000000007991000-memory.dmp
            Filesize

            4KB

          • memory/2604-142-0x0000000000000000-mapping.dmp
          • memory/2712-117-0x0000000000000000-mapping.dmp
          • memory/2748-116-0x0000000002FF0000-0x0000000002FF1000-memory.dmp
            Filesize

            4KB

          • memory/2748-115-0x0000000002FF0000-0x0000000002FF1000-memory.dmp
            Filesize

            4KB

          • memory/2808-134-0x0000000000000000-mapping.dmp
          • memory/2816-135-0x0000000000000000-mapping.dmp
          • memory/3112-148-0x0000000000000000-mapping.dmp
          • memory/3852-130-0x0000000000000000-mapping.dmp