Analysis

  • max time kernel
    142s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-09-2022 17:31

General

  • Target

    file.exe

  • Size

    266KB

  • MD5

    542e377b7f62682e7fe65be4abea95cc

  • SHA1

    e42976a4b7b5c4ffad3fdd9b7e7c054543255489

  • SHA256

    41ab80747568556afc3efa5177acf7ea124db76ab4bdc1fd5fdb4424ab3a1a9f

  • SHA512

    67b413b214c5aaa6f4658165bc8a40e2bcdf2bd85432385857a6e61a3bea4cb0eb95d94196dd19786e58662e4450fdc2fe8a6116c1147c0b28339f484d141fd3

  • SSDEEP

    6144:27Q4DvBjzYmTs2D1wxcuLE80ZO0nLR9W:27Q4D54MZwxcuZ30nF9W

Malware Config

Extracted

Family

redline

Botnet

sep10as1

C2

185.215.113.122:15386

Attributes
  • auth_value

    e45012eae57b2e57b34752fc802550c3

Extracted

Family

redline

Botnet

Lyla.11.09

C2

185.215.113.216:21921

Attributes
  • auth_value

    a1e5192e588aa983d678ceb4d6e0d8b5

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 11 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Users\Admin\AppData\Local\Temp\file.exe
      "C:\Users\Admin\AppData\Local\Temp\file.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4948
      • C:\Users\Admin\AppData\Local\Temp\G3H8IKB809KJBMB.exe
        "C:\Users\Admin\AppData\Local\Temp\G3H8IKB809KJBMB.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3296
        • C:\Users\Admin\AppData\Local\Temp\G3H8IKB809KJBMB.exe
          "C:\Users\Admin\AppData\Local\Temp\G3H8IKB809KJBMB.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1360
      • C:\Users\Admin\AppData\Local\Temp\G3H8IKB809KJBMB.exe
        "C:\Users\Admin\AppData\Local\Temp\G3H8IKB809KJBMB.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1868
        • C:\Users\Admin\AppData\Local\Temp\G3H8IKB809KJBMB.exe
          "C:\Users\Admin\AppData\Local\Temp\G3H8IKB809KJBMB.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:884
      • C:\Users\Admin\AppData\Local\Temp\1HF8D1BB0DME6A7.exe
        "C:\Users\Admin\AppData\Local\Temp\1HF8D1BB0DME6A7.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3764
        • C:\Users\Admin\AppData\Local\Temp\1HF8D1BB0DME6A7.exe
          "C:\Users\Admin\AppData\Local\Temp\1HF8D1BB0DME6A7.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1368
      • C:\Users\Admin\AppData\Local\Temp\K0IB7EA17835F8H.exe
        "C:\Users\Admin\AppData\Local\Temp\K0IB7EA17835F8H.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3756
        • C:\Users\Admin\AppData\Local\Temp\K0IB7EA17835F8H.exe
          "C:\Users\Admin\AppData\Local\Temp\K0IB7EA17835F8H.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:840
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C start C:\Windows\Temp\xsv.exe
            5⤵
              PID:4768
              • C:\Windows\Temp\xsv.exe
                C:\Windows\Temp\xsv.exe
                6⤵
                • Executes dropped EXE
                • Adds Run key to start application
                PID:3848
        • C:\Users\Admin\AppData\Local\Temp\6EFB3I937C51AID.exe
          "C:\Users\Admin\AppData\Local\Temp\6EFB3I937C51AID.exe"
          3⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:4336
          • C:\Windows\SysWOW64\regsvr32.exe
            "C:\Windows\System32\regsvr32.exe" SnQV6I.A -s
            4⤵
            • Loads dropped DLL
            PID:4152
        • C:\Users\Admin\AppData\Local\Temp\6EFB3I937C51AID.exe
          https://iplogger.org/1x5az7
          3⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:68
          • C:\Windows\SysWOW64\regsvr32.exe
            "C:\Windows\System32\regsvr32.exe" SnQV6I.A -s
            4⤵
            • Loads dropped DLL
            PID:1288

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\1HF8D1BB0DME6A7.exe.log
      Filesize

      42B

      MD5

      84cfdb4b995b1dbf543b26b86c863adc

      SHA1

      d2f47764908bf30036cf8248b9ff5541e2711fa2

      SHA256

      d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b

      SHA512

      485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\G3H8IKB809KJBMB.exe.log
      Filesize

      42B

      MD5

      84cfdb4b995b1dbf543b26b86c863adc

      SHA1

      d2f47764908bf30036cf8248b9ff5541e2711fa2

      SHA256

      d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b

      SHA512

      485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\K0IB7EA17835F8H.exe.log
      Filesize

      42B

      MD5

      84cfdb4b995b1dbf543b26b86c863adc

      SHA1

      d2f47764908bf30036cf8248b9ff5541e2711fa2

      SHA256

      d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b

      SHA512

      485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce

    • C:\Users\Admin\AppData\Local\Temp\1HF8D1BB0DME6A7.exe
      Filesize

      155KB

      MD5

      f9e5e8e28ee4775d810ba50b85b8cf65

      SHA1

      9ee3208226dcc1f247861b06bff7e9793f1cc3fe

      SHA256

      8609b2a6570708891a3182848a3bb3ec265b648399307200d61e59574c00efaf

      SHA512

      0e4a749cb560c3438f47d0290fa06a1bf010cddc4553168ba49423f78191126a07badd896685caab559717625b5141c2ddac2e1fab52926dd2c0750d90cc27d8

    • C:\Users\Admin\AppData\Local\Temp\1HF8D1BB0DME6A7.exe
      Filesize

      155KB

      MD5

      f9e5e8e28ee4775d810ba50b85b8cf65

      SHA1

      9ee3208226dcc1f247861b06bff7e9793f1cc3fe

      SHA256

      8609b2a6570708891a3182848a3bb3ec265b648399307200d61e59574c00efaf

      SHA512

      0e4a749cb560c3438f47d0290fa06a1bf010cddc4553168ba49423f78191126a07badd896685caab559717625b5141c2ddac2e1fab52926dd2c0750d90cc27d8

    • C:\Users\Admin\AppData\Local\Temp\1HF8D1BB0DME6A7.exe
      Filesize

      155KB

      MD5

      f9e5e8e28ee4775d810ba50b85b8cf65

      SHA1

      9ee3208226dcc1f247861b06bff7e9793f1cc3fe

      SHA256

      8609b2a6570708891a3182848a3bb3ec265b648399307200d61e59574c00efaf

      SHA512

      0e4a749cb560c3438f47d0290fa06a1bf010cddc4553168ba49423f78191126a07badd896685caab559717625b5141c2ddac2e1fab52926dd2c0750d90cc27d8

    • C:\Users\Admin\AppData\Local\Temp\6EFB3I937C51AID.exe
      Filesize

      1.8MB

      MD5

      97065ca4ead741d0b8355056cfc64988

      SHA1

      1f7f0137f8392e3ff63093a86981023ec5047fa2

      SHA256

      98988a30bfc046fb735c16d519a3978f8748f8d7f91ee24c2aa49b8c444eab4b

      SHA512

      d008e77355df8e9fc7220a3ba882f60c6e7ed914f8bf311a15dcd88895c451c1a423747c7d2e07055addbbb6bc8d63c5ce0519a13824929326f0b999b4a4446a

    • C:\Users\Admin\AppData\Local\Temp\6EFB3I937C51AID.exe
      Filesize

      1.8MB

      MD5

      97065ca4ead741d0b8355056cfc64988

      SHA1

      1f7f0137f8392e3ff63093a86981023ec5047fa2

      SHA256

      98988a30bfc046fb735c16d519a3978f8748f8d7f91ee24c2aa49b8c444eab4b

      SHA512

      d008e77355df8e9fc7220a3ba882f60c6e7ed914f8bf311a15dcd88895c451c1a423747c7d2e07055addbbb6bc8d63c5ce0519a13824929326f0b999b4a4446a

    • C:\Users\Admin\AppData\Local\Temp\6EFB3I937C51AID.exe
      Filesize

      1.8MB

      MD5

      97065ca4ead741d0b8355056cfc64988

      SHA1

      1f7f0137f8392e3ff63093a86981023ec5047fa2

      SHA256

      98988a30bfc046fb735c16d519a3978f8748f8d7f91ee24c2aa49b8c444eab4b

      SHA512

      d008e77355df8e9fc7220a3ba882f60c6e7ed914f8bf311a15dcd88895c451c1a423747c7d2e07055addbbb6bc8d63c5ce0519a13824929326f0b999b4a4446a

    • C:\Users\Admin\AppData\Local\Temp\G3H8IKB809KJBMB.exe
      Filesize

      204KB

      MD5

      568f063d6b5200d3cd3a5f27acb89450

      SHA1

      f20d632ce99244212c851dc2ae7865d3b47e6f25

      SHA256

      81fb6b8a8d20dab5752cf390fb96bdea22b7e47136d02ec59d112bda856f0bec

      SHA512

      5906f7f26cf0c6f6ee098649434e0d380d5d29d9834483fbf0395abd4d144398ecebd144ac355c179aeb51125f7e9aaec838edac33c23e5ebde01402ccad3357

    • C:\Users\Admin\AppData\Local\Temp\G3H8IKB809KJBMB.exe
      Filesize

      204KB

      MD5

      568f063d6b5200d3cd3a5f27acb89450

      SHA1

      f20d632ce99244212c851dc2ae7865d3b47e6f25

      SHA256

      81fb6b8a8d20dab5752cf390fb96bdea22b7e47136d02ec59d112bda856f0bec

      SHA512

      5906f7f26cf0c6f6ee098649434e0d380d5d29d9834483fbf0395abd4d144398ecebd144ac355c179aeb51125f7e9aaec838edac33c23e5ebde01402ccad3357

    • C:\Users\Admin\AppData\Local\Temp\G3H8IKB809KJBMB.exe
      Filesize

      204KB

      MD5

      568f063d6b5200d3cd3a5f27acb89450

      SHA1

      f20d632ce99244212c851dc2ae7865d3b47e6f25

      SHA256

      81fb6b8a8d20dab5752cf390fb96bdea22b7e47136d02ec59d112bda856f0bec

      SHA512

      5906f7f26cf0c6f6ee098649434e0d380d5d29d9834483fbf0395abd4d144398ecebd144ac355c179aeb51125f7e9aaec838edac33c23e5ebde01402ccad3357

    • C:\Users\Admin\AppData\Local\Temp\G3H8IKB809KJBMB.exe
      Filesize

      204KB

      MD5

      568f063d6b5200d3cd3a5f27acb89450

      SHA1

      f20d632ce99244212c851dc2ae7865d3b47e6f25

      SHA256

      81fb6b8a8d20dab5752cf390fb96bdea22b7e47136d02ec59d112bda856f0bec

      SHA512

      5906f7f26cf0c6f6ee098649434e0d380d5d29d9834483fbf0395abd4d144398ecebd144ac355c179aeb51125f7e9aaec838edac33c23e5ebde01402ccad3357

    • C:\Users\Admin\AppData\Local\Temp\G3H8IKB809KJBMB.exe
      Filesize

      204KB

      MD5

      568f063d6b5200d3cd3a5f27acb89450

      SHA1

      f20d632ce99244212c851dc2ae7865d3b47e6f25

      SHA256

      81fb6b8a8d20dab5752cf390fb96bdea22b7e47136d02ec59d112bda856f0bec

      SHA512

      5906f7f26cf0c6f6ee098649434e0d380d5d29d9834483fbf0395abd4d144398ecebd144ac355c179aeb51125f7e9aaec838edac33c23e5ebde01402ccad3357

    • C:\Users\Admin\AppData\Local\Temp\K0IB7EA17835F8H.exe
      Filesize

      379KB

      MD5

      b7816ff42c47c1a77f5c68edf014906c

      SHA1

      0f5f8bf094a127a799e3b6996558a485b443c541

      SHA256

      215dfb90e74cf1c103b04b1f7efe70d84b2f7312d4e9baa1d19ac6412a324a4a

      SHA512

      7e9495502126839b9ef097627a233769001e43a1a1072e59ef8bd0250e19ec7b87faed1f32296ca88068fa59b437dfe5f60c5069dc89b618abe577463107fe35

    • C:\Users\Admin\AppData\Local\Temp\K0IB7EA17835F8H.exe
      Filesize

      379KB

      MD5

      b7816ff42c47c1a77f5c68edf014906c

      SHA1

      0f5f8bf094a127a799e3b6996558a485b443c541

      SHA256

      215dfb90e74cf1c103b04b1f7efe70d84b2f7312d4e9baa1d19ac6412a324a4a

      SHA512

      7e9495502126839b9ef097627a233769001e43a1a1072e59ef8bd0250e19ec7b87faed1f32296ca88068fa59b437dfe5f60c5069dc89b618abe577463107fe35

    • C:\Users\Admin\AppData\Local\Temp\K0IB7EA17835F8H.exe
      Filesize

      379KB

      MD5

      b7816ff42c47c1a77f5c68edf014906c

      SHA1

      0f5f8bf094a127a799e3b6996558a485b443c541

      SHA256

      215dfb90e74cf1c103b04b1f7efe70d84b2f7312d4e9baa1d19ac6412a324a4a

      SHA512

      7e9495502126839b9ef097627a233769001e43a1a1072e59ef8bd0250e19ec7b87faed1f32296ca88068fa59b437dfe5f60c5069dc89b618abe577463107fe35

    • C:\Users\Admin\AppData\Local\Temp\SnQV6I.A
      Filesize

      1.5MB

      MD5

      3ac5152f21419d9cb4313faec3be0213

      SHA1

      d1e5d6b375cb78cfc5cf20d465d634cf6c0719a2

      SHA256

      18d80d5e998a6b988e959190f36beb454da7c371a6aa044760cb13cea911c3c2

      SHA512

      7f797be36ec6fc913b96f53d5a165778250a1a068e295d9332ccb02d5322618335d2993e51dafc7f67f56234a360d34a8651bec430b8c57ad3e8e0c5b69d4aa7

    • C:\Users\Admin\AppData\Local\Temp\snQv6i.A
      Filesize

      1.5MB

      MD5

      3ac5152f21419d9cb4313faec3be0213

      SHA1

      d1e5d6b375cb78cfc5cf20d465d634cf6c0719a2

      SHA256

      18d80d5e998a6b988e959190f36beb454da7c371a6aa044760cb13cea911c3c2

      SHA512

      7f797be36ec6fc913b96f53d5a165778250a1a068e295d9332ccb02d5322618335d2993e51dafc7f67f56234a360d34a8651bec430b8c57ad3e8e0c5b69d4aa7

    • C:\Users\Admin\AppData\Local\Temp\snQv6i.A
      Filesize

      1.5MB

      MD5

      3ac5152f21419d9cb4313faec3be0213

      SHA1

      d1e5d6b375cb78cfc5cf20d465d634cf6c0719a2

      SHA256

      18d80d5e998a6b988e959190f36beb454da7c371a6aa044760cb13cea911c3c2

      SHA512

      7f797be36ec6fc913b96f53d5a165778250a1a068e295d9332ccb02d5322618335d2993e51dafc7f67f56234a360d34a8651bec430b8c57ad3e8e0c5b69d4aa7

    • C:\Windows\Temp\xsv.exe
      Filesize

      91KB

      MD5

      f590338220ffbb5c8a39be984d7bde91

      SHA1

      1c64d067e2c4e935763bc039b1112bb81b35caa8

      SHA256

      c25e688a05e1ca37ff52fea542e2ab003759cf1618c9f8d7c98ec289aa850d7c

      SHA512

      98c0e6b443cd58992fa1179c5580479c97c10b2314c1020c4b2717453fb96114687d4080d556de985a93dc3247e3f7b600d05496f59cb397f6d606b56f8b70a4

    • C:\Windows\Temp\xsv.exe
      Filesize

      91KB

      MD5

      f590338220ffbb5c8a39be984d7bde91

      SHA1

      1c64d067e2c4e935763bc039b1112bb81b35caa8

      SHA256

      c25e688a05e1ca37ff52fea542e2ab003759cf1618c9f8d7c98ec289aa850d7c

      SHA512

      98c0e6b443cd58992fa1179c5580479c97c10b2314c1020c4b2717453fb96114687d4080d556de985a93dc3247e3f7b600d05496f59cb397f6d606b56f8b70a4

    • memory/68-229-0x0000000000000000-mapping.dmp
    • memory/840-230-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-212-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-235-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-233-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-208-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-206-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-227-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-204-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-202-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-225-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-223-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-220-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-174-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-172-0x0000000000000000-mapping.dmp
    • memory/840-200-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-218-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-215-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-210-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-180-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-182-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-184-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-186-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-188-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-190-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-192-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-194-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-196-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/840-198-0x0000000000C80000-0x0000000000CD4000-memory.dmp
      Filesize

      336KB

    • memory/884-153-0x0000000000000000-mapping.dmp
    • memory/884-156-0x0000000005D60000-0x0000000006378000-memory.dmp
      Filesize

      6.1MB

    • memory/884-157-0x00000000058B0000-0x00000000059BA000-memory.dmp
      Filesize

      1.0MB

    • memory/884-158-0x00000000057E0000-0x00000000057F2000-memory.dmp
      Filesize

      72KB

    • memory/884-159-0x0000000005840000-0x000000000587C000-memory.dmp
      Filesize

      240KB

    • memory/1288-270-0x0000000000000000-mapping.dmp
    • memory/1288-612-0x0000000003230000-0x0000000003330000-memory.dmp
      Filesize

      1024KB

    • memory/1288-382-0x0000000003030000-0x0000000003130000-memory.dmp
      Filesize

      1024KB

    • memory/1288-384-0x0000000003230000-0x0000000003330000-memory.dmp
      Filesize

      1024KB

    • memory/1360-147-0x0000000000D00000-0x0000000000D28000-memory.dmp
      Filesize

      160KB

    • memory/1360-146-0x0000000000000000-mapping.dmp
    • memory/1368-164-0x0000000000000000-mapping.dmp
    • memory/1368-316-0x0000000006420000-0x0000000006470000-memory.dmp
      Filesize

      320KB

    • memory/1368-176-0x0000000005E20000-0x00000000063C4000-memory.dmp
      Filesize

      5.6MB

    • memory/1368-173-0x00000000050C0000-0x0000000005152000-memory.dmp
      Filesize

      584KB

    • memory/1368-303-0x0000000005D20000-0x0000000005D96000-memory.dmp
      Filesize

      472KB

    • memory/1368-308-0x0000000005D00000-0x0000000005D1E000-memory.dmp
      Filesize

      120KB

    • memory/1368-165-0x0000000000640000-0x000000000065C000-memory.dmp
      Filesize

      112KB

    • memory/1368-177-0x0000000005160000-0x00000000051C6000-memory.dmp
      Filesize

      408KB

    • memory/1368-328-0x0000000007D30000-0x000000000825C000-memory.dmp
      Filesize

      5.2MB

    • memory/1368-325-0x0000000007630000-0x00000000077F2000-memory.dmp
      Filesize

      1.8MB

    • memory/1868-152-0x0000000000F00000-0x0000000000F37000-memory.dmp
      Filesize

      220KB

    • memory/1868-150-0x0000000000000000-mapping.dmp
    • memory/2588-132-0x0000000000020000-0x0000000000066000-memory.dmp
      Filesize

      280KB

    • memory/3296-142-0x0000000000000000-mapping.dmp
    • memory/3296-145-0x0000000000F00000-0x0000000000F37000-memory.dmp
      Filesize

      220KB

    • memory/3756-168-0x0000000000000000-mapping.dmp
    • memory/3756-171-0x0000000000DE0000-0x0000000000E41000-memory.dmp
      Filesize

      388KB

    • memory/3764-160-0x0000000000000000-mapping.dmp
    • memory/3764-163-0x0000000000790000-0x00000000007B9000-memory.dmp
      Filesize

      164KB

    • memory/3848-869-0x0000000000000000-mapping.dmp
    • memory/4152-272-0x0000000000000000-mapping.dmp
    • memory/4152-386-0x0000000003030000-0x0000000003130000-memory.dmp
      Filesize

      1024KB

    • memory/4336-214-0x0000000000000000-mapping.dmp
    • memory/4768-868-0x0000000000000000-mapping.dmp
    • memory/4948-138-0x0000000001310000-0x0000000001342000-memory.dmp
      Filesize

      200KB

    • memory/4948-141-0x0000000001310000-0x0000000001342000-memory.dmp
      Filesize

      200KB

    • memory/4948-134-0x0000000001310000-0x0000000001342000-memory.dmp
      Filesize

      200KB

    • memory/4948-133-0x0000000000000000-mapping.dmp