Analysis
-
max time kernel
177s -
max time network
98s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
09-05-2022 01:11
Static task
static1
Behavioral task
behavioral1
Sample
ff791e2212ce12a8e334ce553857eb89.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ff791e2212ce12a8e334ce553857eb89.exe
Resource
win10v2004-20220414-en
General
-
Target
ff791e2212ce12a8e334ce553857eb89.exe
-
Size
1.8MB
-
MD5
ff791e2212ce12a8e334ce553857eb89
-
SHA1
1d76dc8f24fe839b8938a6c84fa55dfabaa10e39
-
SHA256
5d4cd0ca70d224e17ba7f0c1a0a64cd68505d8ac10ffc23d96fba3ae166c60c8
-
SHA512
559407e2d66ae8f5741fb38527b2f5ee98deaf13054226ca43f6bf00bb40380c8c8d5fc6a64d5640b7d72dc52a727ca3e6f5f71422147e63b1214a5193e15295
Malware Config
Extracted
redline
@ansdvsvsvd
46.8.220.88:65531
-
auth_value
d7b874c6650abbcb219b4f56f4676fee
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/996-57-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/996-62-0x000000000041BC4E-mapping.dmp family_redline behavioral1/memory/996-65-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/996-63-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
fl.exeservices32.exesihost32.exepid process 968 fl.exe 1988 services32.exe 1540 sihost32.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\fl.exe vmprotect C:\Users\Admin\AppData\Local\Temp\fl.exe vmprotect C:\Users\Admin\AppData\Local\Temp\fl.exe vmprotect behavioral1/memory/968-71-0x000000013F090000-0x000000013F8AA000-memory.dmp vmprotect C:\Windows\System32\services32.exe vmprotect C:\Windows\system32\services32.exe vmprotect \Windows\System32\services32.exe vmprotect behavioral1/memory/1988-86-0x000000013F7F0000-0x000000014000A000-memory.dmp vmprotect -
Loads dropped DLL 3 IoCs
Processes:
AppLaunch.execmd.exeservices32.exepid process 996 AppLaunch.exe 1784 cmd.exe 1988 services32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Drops file in System32 directory 7 IoCs
Processes:
fl.exepowershell.exeservices32.exepowershell.exepowershell.exepowershell.exedescription ioc process File created C:\Windows\system32\services32.exe fl.exe File opened for modification C:\Windows\system32\services32.exe fl.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File created C:\Windows\system32\Microsoft\Telemetry\sihost32.exe services32.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ff791e2212ce12a8e334ce553857eb89.exedescription pid process target process PID 1620 set thread context of 996 1620 ff791e2212ce12a8e334ce553857eb89.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
AppLaunch.exefl.exeservices32.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 996 AppLaunch.exe 968 fl.exe 1988 services32.exe 1988 services32.exe 1132 powershell.exe 1612 powershell.exe 800 powershell.exe 840 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
AppLaunch.exefl.exeservices32.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 996 AppLaunch.exe Token: SeDebugPrivilege 968 fl.exe Token: SeDebugPrivilege 1988 services32.exe Token: SeDebugPrivilege 1132 powershell.exe Token: SeDebugPrivilege 1612 powershell.exe Token: SeDebugPrivilege 800 powershell.exe Token: SeDebugPrivilege 840 powershell.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
ff791e2212ce12a8e334ce553857eb89.exeAppLaunch.exefl.execmd.execmd.execmd.exeservices32.execmd.exedescription pid process target process PID 1620 wrote to memory of 996 1620 ff791e2212ce12a8e334ce553857eb89.exe AppLaunch.exe PID 1620 wrote to memory of 996 1620 ff791e2212ce12a8e334ce553857eb89.exe AppLaunch.exe PID 1620 wrote to memory of 996 1620 ff791e2212ce12a8e334ce553857eb89.exe AppLaunch.exe PID 1620 wrote to memory of 996 1620 ff791e2212ce12a8e334ce553857eb89.exe AppLaunch.exe PID 1620 wrote to memory of 996 1620 ff791e2212ce12a8e334ce553857eb89.exe AppLaunch.exe PID 1620 wrote to memory of 996 1620 ff791e2212ce12a8e334ce553857eb89.exe AppLaunch.exe PID 1620 wrote to memory of 996 1620 ff791e2212ce12a8e334ce553857eb89.exe AppLaunch.exe PID 1620 wrote to memory of 996 1620 ff791e2212ce12a8e334ce553857eb89.exe AppLaunch.exe PID 1620 wrote to memory of 996 1620 ff791e2212ce12a8e334ce553857eb89.exe AppLaunch.exe PID 996 wrote to memory of 968 996 AppLaunch.exe fl.exe PID 996 wrote to memory of 968 996 AppLaunch.exe fl.exe PID 996 wrote to memory of 968 996 AppLaunch.exe fl.exe PID 996 wrote to memory of 968 996 AppLaunch.exe fl.exe PID 968 wrote to memory of 1180 968 fl.exe cmd.exe PID 968 wrote to memory of 1180 968 fl.exe cmd.exe PID 968 wrote to memory of 1180 968 fl.exe cmd.exe PID 1180 wrote to memory of 1132 1180 cmd.exe powershell.exe PID 1180 wrote to memory of 1132 1180 cmd.exe powershell.exe PID 1180 wrote to memory of 1132 1180 cmd.exe powershell.exe PID 968 wrote to memory of 1744 968 fl.exe cmd.exe PID 968 wrote to memory of 1744 968 fl.exe cmd.exe PID 968 wrote to memory of 1744 968 fl.exe cmd.exe PID 1744 wrote to memory of 1776 1744 cmd.exe schtasks.exe PID 1744 wrote to memory of 1776 1744 cmd.exe schtasks.exe PID 1744 wrote to memory of 1776 1744 cmd.exe schtasks.exe PID 968 wrote to memory of 1784 968 fl.exe cmd.exe PID 968 wrote to memory of 1784 968 fl.exe cmd.exe PID 968 wrote to memory of 1784 968 fl.exe cmd.exe PID 1784 wrote to memory of 1988 1784 cmd.exe services32.exe PID 1784 wrote to memory of 1988 1784 cmd.exe services32.exe PID 1784 wrote to memory of 1988 1784 cmd.exe services32.exe PID 1988 wrote to memory of 1728 1988 services32.exe cmd.exe PID 1988 wrote to memory of 1728 1988 services32.exe cmd.exe PID 1988 wrote to memory of 1728 1988 services32.exe cmd.exe PID 1728 wrote to memory of 1612 1728 cmd.exe powershell.exe PID 1728 wrote to memory of 1612 1728 cmd.exe powershell.exe PID 1728 wrote to memory of 1612 1728 cmd.exe powershell.exe PID 1988 wrote to memory of 1540 1988 services32.exe sihost32.exe PID 1988 wrote to memory of 1540 1988 services32.exe sihost32.exe PID 1988 wrote to memory of 1540 1988 services32.exe sihost32.exe PID 1728 wrote to memory of 800 1728 cmd.exe powershell.exe PID 1728 wrote to memory of 800 1728 cmd.exe powershell.exe PID 1728 wrote to memory of 800 1728 cmd.exe powershell.exe PID 1180 wrote to memory of 840 1180 cmd.exe powershell.exe PID 1180 wrote to memory of 840 1180 cmd.exe powershell.exe PID 1180 wrote to memory of 840 1180 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff791e2212ce12a8e334ce553857eb89.exe"C:\Users\Admin\AppData\Local\Temp\ff791e2212ce12a8e334ce553857eb89.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fl.exe"C:\Users\Admin\AppData\Local\Temp\fl.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"5⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"5⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr "C:\Windows\system32\services32.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services32" /tr "C:\Windows\system32\services32.exe"5⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exe"cmd" cmd /c "C:\Windows\system32\services32.exe"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\services32.exeC:\Windows\system32\services32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"7⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"7⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"6⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\fl.exeFilesize
4.1MB
MD52500ec467ff51e3fa1f0bec71c419372
SHA1047542e3c35dd8e3775a70c08ac0243ee394adb4
SHA256de115955f1e0ff59c5ff3a388f81185b0873af4573f354f2972938b6366ab6ad
SHA5125a69d59afe0c161798028725282dc646152a63a71671cd7fe3f89d92f51bf41d1f1867632ad1439a3387c56a2aa98bfce058d23dafeb442042028cb6ab05da52
-
C:\Users\Admin\AppData\Local\Temp\fl.exeFilesize
4.1MB
MD52500ec467ff51e3fa1f0bec71c419372
SHA1047542e3c35dd8e3775a70c08ac0243ee394adb4
SHA256de115955f1e0ff59c5ff3a388f81185b0873af4573f354f2972938b6366ab6ad
SHA5125a69d59afe0c161798028725282dc646152a63a71671cd7fe3f89d92f51bf41d1f1867632ad1439a3387c56a2aa98bfce058d23dafeb442042028cb6ab05da52
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD54407b61713a046112183249bf198e17f
SHA1c8fa7fa31cfc318c7efbd40819bd984686ac805d
SHA256b05e7836834a99e9aaa927699448b5e636f2c8342d25a33bdbfd3758b500cfe6
SHA51217e9607f62d48fffae070394067ee4560fc3e5b9a4a7519e9f3b3bafd7b5248817e4214af70aa32056a6fdd0b287b19a711d331bb7309353101ae6dceec7bd7e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD54407b61713a046112183249bf198e17f
SHA1c8fa7fa31cfc318c7efbd40819bd984686ac805d
SHA256b05e7836834a99e9aaa927699448b5e636f2c8342d25a33bdbfd3758b500cfe6
SHA51217e9607f62d48fffae070394067ee4560fc3e5b9a4a7519e9f3b3bafd7b5248817e4214af70aa32056a6fdd0b287b19a711d331bb7309353101ae6dceec7bd7e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD505a0abf3711c04e5e60ec25c28933d11
SHA157de61c70ab3be3e275e64297aaa7462234b8867
SHA2562beac031f977651f2ca3bf20d6cae3aecdd2b3c7a990786504c54dc11a90e687
SHA5129621ddfae58422c381cf21e5aa643673044a29560fe8946c6fdbcbf9c867cd134527dcfcd4cb25fb709d54525b8495f14ebb01f87848a561c2998505102f8e6b
-
C:\Windows\System32\Microsoft\Telemetry\sihost32.exeFilesize
8KB
MD577cca26e33820b2af4c3fabf55a59da4
SHA112db96b1f931c7844dfb9e35b85ccc1dd4b5d1a7
SHA2565aba7ad9de8e24460cd36042fab70a5e3f0b3d8661b331a1cc67ce9c45874270
SHA512bf3211c976216e99742145e81140197860cc14e6a8e1083bd2e5bc9efa6020cb8d7146272a0f2ac9e171899f47ba683f1e2908017a7277649995d163a46e92b2
-
C:\Windows\System32\services32.exeFilesize
4.1MB
MD52500ec467ff51e3fa1f0bec71c419372
SHA1047542e3c35dd8e3775a70c08ac0243ee394adb4
SHA256de115955f1e0ff59c5ff3a388f81185b0873af4573f354f2972938b6366ab6ad
SHA5125a69d59afe0c161798028725282dc646152a63a71671cd7fe3f89d92f51bf41d1f1867632ad1439a3387c56a2aa98bfce058d23dafeb442042028cb6ab05da52
-
C:\Windows\system32\Microsoft\Telemetry\sihost32.exeFilesize
8KB
MD577cca26e33820b2af4c3fabf55a59da4
SHA112db96b1f931c7844dfb9e35b85ccc1dd4b5d1a7
SHA2565aba7ad9de8e24460cd36042fab70a5e3f0b3d8661b331a1cc67ce9c45874270
SHA512bf3211c976216e99742145e81140197860cc14e6a8e1083bd2e5bc9efa6020cb8d7146272a0f2ac9e171899f47ba683f1e2908017a7277649995d163a46e92b2
-
C:\Windows\system32\services32.exeFilesize
4.1MB
MD52500ec467ff51e3fa1f0bec71c419372
SHA1047542e3c35dd8e3775a70c08ac0243ee394adb4
SHA256de115955f1e0ff59c5ff3a388f81185b0873af4573f354f2972938b6366ab6ad
SHA5125a69d59afe0c161798028725282dc646152a63a71671cd7fe3f89d92f51bf41d1f1867632ad1439a3387c56a2aa98bfce058d23dafeb442042028cb6ab05da52
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Local\Temp\fl.exeFilesize
4.1MB
MD52500ec467ff51e3fa1f0bec71c419372
SHA1047542e3c35dd8e3775a70c08ac0243ee394adb4
SHA256de115955f1e0ff59c5ff3a388f81185b0873af4573f354f2972938b6366ab6ad
SHA5125a69d59afe0c161798028725282dc646152a63a71671cd7fe3f89d92f51bf41d1f1867632ad1439a3387c56a2aa98bfce058d23dafeb442042028cb6ab05da52
-
\Windows\System32\Microsoft\Telemetry\sihost32.exeFilesize
8KB
MD577cca26e33820b2af4c3fabf55a59da4
SHA112db96b1f931c7844dfb9e35b85ccc1dd4b5d1a7
SHA2565aba7ad9de8e24460cd36042fab70a5e3f0b3d8661b331a1cc67ce9c45874270
SHA512bf3211c976216e99742145e81140197860cc14e6a8e1083bd2e5bc9efa6020cb8d7146272a0f2ac9e171899f47ba683f1e2908017a7277649995d163a46e92b2
-
\Windows\System32\services32.exeFilesize
4.1MB
MD52500ec467ff51e3fa1f0bec71c419372
SHA1047542e3c35dd8e3775a70c08ac0243ee394adb4
SHA256de115955f1e0ff59c5ff3a388f81185b0873af4573f354f2972938b6366ab6ad
SHA5125a69d59afe0c161798028725282dc646152a63a71671cd7fe3f89d92f51bf41d1f1867632ad1439a3387c56a2aa98bfce058d23dafeb442042028cb6ab05da52
-
memory/800-114-0x000007FEF1AE0000-0x000007FEF2503000-memory.dmpFilesize
10.1MB
-
memory/800-118-0x0000000002374000-0x0000000002377000-memory.dmpFilesize
12KB
-
memory/800-107-0x0000000000000000-mapping.dmp
-
memory/800-122-0x000000001B750000-0x000000001BA4F000-memory.dmpFilesize
3.0MB
-
memory/800-123-0x000000000237B000-0x000000000239A000-memory.dmpFilesize
124KB
-
memory/800-116-0x000007FEEDD80000-0x000007FEEE8DD000-memory.dmpFilesize
11.4MB
-
memory/840-117-0x000007FEEDD80000-0x000007FEEE8DD000-memory.dmpFilesize
11.4MB
-
memory/840-119-0x0000000002904000-0x0000000002907000-memory.dmpFilesize
12KB
-
memory/840-120-0x000000001B8E0000-0x000000001BBDF000-memory.dmpFilesize
3.0MB
-
memory/840-115-0x000007FEF1AE0000-0x000007FEF2503000-memory.dmpFilesize
10.1MB
-
memory/840-108-0x0000000000000000-mapping.dmp
-
memory/840-121-0x000000000290B000-0x000000000292A000-memory.dmpFilesize
124KB
-
memory/968-74-0x000000001C580000-0x000000001C768000-memory.dmpFilesize
1.9MB
-
memory/968-71-0x000000013F090000-0x000000013F8AA000-memory.dmpFilesize
8.1MB
-
memory/968-68-0x0000000000000000-mapping.dmp
-
memory/996-66-0x0000000074E91000-0x0000000074E93000-memory.dmpFilesize
8KB
-
memory/996-62-0x000000000041BC4E-mapping.dmp
-
memory/996-57-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/996-55-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/996-65-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/996-63-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1132-76-0x0000000000000000-mapping.dmp
-
memory/1132-99-0x000007FEF1F50000-0x000007FEF2AAD000-memory.dmpFilesize
11.4MB
-
memory/1132-77-0x000007FEFBA91000-0x000007FEFBA93000-memory.dmpFilesize
8KB
-
memory/1132-103-0x000000001B8A0000-0x000000001BB9F000-memory.dmpFilesize
3.0MB
-
memory/1132-101-0x0000000002854000-0x0000000002857000-memory.dmpFilesize
12KB
-
memory/1132-106-0x000000000285B000-0x000000000287A000-memory.dmpFilesize
124KB
-
memory/1132-79-0x000007FEEC630000-0x000007FEED053000-memory.dmpFilesize
10.1MB
-
memory/1180-75-0x0000000000000000-mapping.dmp
-
memory/1540-98-0x000000013F670000-0x000000013F676000-memory.dmpFilesize
24KB
-
memory/1540-95-0x0000000000000000-mapping.dmp
-
memory/1612-104-0x000000001B700000-0x000000001B9FF000-memory.dmpFilesize
3.0MB
-
memory/1612-100-0x000007FEF1F50000-0x000007FEF2AAD000-memory.dmpFilesize
11.4MB
-
memory/1612-105-0x00000000026CB000-0x00000000026EA000-memory.dmpFilesize
124KB
-
memory/1612-90-0x0000000000000000-mapping.dmp
-
memory/1612-93-0x000007FEEC630000-0x000007FEED053000-memory.dmpFilesize
10.1MB
-
memory/1612-102-0x00000000026C4000-0x00000000026C7000-memory.dmpFilesize
12KB
-
memory/1620-64-0x0000000000D10000-0x0000000000EDC000-memory.dmpFilesize
1.8MB
-
memory/1620-54-0x0000000000D10000-0x0000000000EDC000-memory.dmpFilesize
1.8MB
-
memory/1728-89-0x0000000000000000-mapping.dmp
-
memory/1744-78-0x0000000000000000-mapping.dmp
-
memory/1776-80-0x0000000000000000-mapping.dmp
-
memory/1784-81-0x0000000000000000-mapping.dmp
-
memory/1988-83-0x0000000000000000-mapping.dmp
-
memory/1988-86-0x000000013F7F0000-0x000000014000A000-memory.dmpFilesize
8.1MB