Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    17-10-2022 18:15

General

  • Target

    6023d2e3d6ae4901fe997e9133c488dfbd50736e47034a6ee45d4c5952f26ee4.exe

  • Size

    543KB

  • MD5

    86be1fd07bcfd80a12c0bb77b8e6f45d

  • SHA1

    41e7de66d97cda087f4c3ef8920095367c4f9080

  • SHA256

    6023d2e3d6ae4901fe997e9133c488dfbd50736e47034a6ee45d4c5952f26ee4

  • SHA512

    52550fad0f487c5ab4407bdf659dcb53cb7d1d91a89a4adb8899c67d449417e08053853af1c8d0a2f6147478092f5aebcb3316844dddc71d4e94e5ba8af4e840

  • SSDEEP

    1536:jrae78zjORCDGwfdCSog01313/s5g0VclU+jxeTjs7d59QRr32+P8yYiN:JahKyd2n31E5FOxeTwd0RrXUyY0

Malware Config

Extracted

Family

redline

Botnet

Nigh

C2

80.66.87.20:80

Attributes
  • auth_value

    dab8506635d1dc134af4ebaedf4404eb

Signatures

  • Detects Smokeloader packer 3 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6023d2e3d6ae4901fe997e9133c488dfbd50736e47034a6ee45d4c5952f26ee4.exe
    "C:\Users\Admin\AppData\Local\Temp\6023d2e3d6ae4901fe997e9133c488dfbd50736e47034a6ee45d4c5952f26ee4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2424
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2412
      • C:\Users\Admin\AppData\Local\Temp\Ekechvvajumessagecompetitive_1.exe
        "C:\Users\Admin\AppData\Local\Temp\Ekechvvajumessagecompetitive_1.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4304
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:804
        • C:\Users\Admin\AppData\Local\Temp\Ekechvvajumessagecompetitive_1.exe
          C:\Users\Admin\AppData\Local\Temp\Ekechvvajumessagecompetitive_1.exe
          4⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          PID:3880
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exe
        3⤵
        • Executes dropped EXE
        PID:4356
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3932
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exe
        3⤵
        • Executes dropped EXE
        PID:4136

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\perfofov.exe.log
    Filesize

    1KB

    MD5

    94783fcf58c98f5ea0b416f441ad15eb

    SHA1

    979a7c39c6a5dbed314bc41a22c4ccdca6db206b

    SHA256

    117df0a0e80abf166ef148863dd82ba9e75c05b38ed3979d048f5fcc848ef905

    SHA512

    9301306461cb978e91761b24b1d04339c2bff71771431987cd8dc373387c12feb81dbdbf272da1f7c045eade4ffff1976885ca705ca7cf9a40a6c4a7553aa06c

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
    Filesize

    1KB

    MD5

    66382a4ca6c4dcf75ce41417d44be93e

    SHA1

    8132cbef1c12f8a89a68a6153ade4286bf130812

    SHA256

    a70acce0f4c6ab59b88ce79d84c38d4abffe19b72b033250499b17d788a2db56

    SHA512

    2bf66f2850f4a65220085c55a5b3c8866453104d78fe516e5bd6e3e47df783062ce4ea10de580f2eb0274ac8c3ce71965201c49ef55a78f307731ccc8600aadc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
    Filesize

    45KB

    MD5

    5f640bd48e2547b4c1a7421f080f815f

    SHA1

    a8f4a743f5b7da5cba7b8e6fb1d7ad4d67fefc6a

    SHA256

    916c83c7c8d059aea295523b8b3f24e1e2436df894f7fae26c47c9bad04baa9c

    SHA512

    a6ac100a351946b1bbb40c98aeda6e16e12f90f81063aff08c16d4d9afec8ed65c2cbcf25b42946627d67653f75740b1137dab625c99e9492ba35aba68b79a8e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    16KB

    MD5

    cd25dff8cd9b3027f43667c0393bc4ce

    SHA1

    e49d49fd707f3d49848e6e7c670b747e589833bf

    SHA256

    d463a461e37355a8c042583d1c92c2995bcb4915338a5c831675c53d6ef85be1

    SHA512

    e9ec3ccb5d267e9e84432a0fee7f35db0cf08d487b966371c1ce229e712471ef7ab371f72aa800e805d828f2a1a3f7c32aa4d131519cda76a6bc45544d6adb89

  • C:\Users\Admin\AppData\Local\Temp\Ekechvvajumessagecompetitive_1.exe
    Filesize

    12KB

    MD5

    8204d86f385e7648f7f3e4858aedb950

    SHA1

    82f837ad3dcde3f91d9ab7c3d6932b9dd0e3b1b2

    SHA256

    ca2ba3661add947970864563544c38b2a1248ed28e29cfd52a78fec54ca7e5ef

    SHA512

    4852fb6e36c8f603745d11675e2990d27f92840d0d854548829940112d284e823ba924c56b7d85008ef90c6b3e90ebe981622b8f8f1754abc91ce535658f6bdd

  • C:\Users\Admin\AppData\Local\Temp\Ekechvvajumessagecompetitive_1.exe
    Filesize

    12KB

    MD5

    8204d86f385e7648f7f3e4858aedb950

    SHA1

    82f837ad3dcde3f91d9ab7c3d6932b9dd0e3b1b2

    SHA256

    ca2ba3661add947970864563544c38b2a1248ed28e29cfd52a78fec54ca7e5ef

    SHA512

    4852fb6e36c8f603745d11675e2990d27f92840d0d854548829940112d284e823ba924c56b7d85008ef90c6b3e90ebe981622b8f8f1754abc91ce535658f6bdd

  • C:\Users\Admin\AppData\Local\Temp\Ekechvvajumessagecompetitive_1.exe
    Filesize

    12KB

    MD5

    8204d86f385e7648f7f3e4858aedb950

    SHA1

    82f837ad3dcde3f91d9ab7c3d6932b9dd0e3b1b2

    SHA256

    ca2ba3661add947970864563544c38b2a1248ed28e29cfd52a78fec54ca7e5ef

    SHA512

    4852fb6e36c8f603745d11675e2990d27f92840d0d854548829940112d284e823ba924c56b7d85008ef90c6b3e90ebe981622b8f8f1754abc91ce535658f6bdd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exe
    Filesize

    333.8MB

    MD5

    6b8a6884f6a5d48e27b7606839ab2043

    SHA1

    a736eb7309ef918e7f6eed05cf6f1e460756c8bc

    SHA256

    3c54e4d2985f2ae91573359ac969ffa32a5cf989b6b6648d279cc96e97ae1087

    SHA512

    4108d1e23833b72816afd7aec6e526c585a08f6e32dfa7904d126476091feafefffbc0406f32ba7d28f07ce10b8a237fc2ae13490f024cdd4d3798a1a5e5a309

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exe
    Filesize

    333.8MB

    MD5

    6b8a6884f6a5d48e27b7606839ab2043

    SHA1

    a736eb7309ef918e7f6eed05cf6f1e460756c8bc

    SHA256

    3c54e4d2985f2ae91573359ac969ffa32a5cf989b6b6648d279cc96e97ae1087

    SHA512

    4108d1e23833b72816afd7aec6e526c585a08f6e32dfa7904d126476091feafefffbc0406f32ba7d28f07ce10b8a237fc2ae13490f024cdd4d3798a1a5e5a309

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exe
    Filesize

    333.8MB

    MD5

    6b8a6884f6a5d48e27b7606839ab2043

    SHA1

    a736eb7309ef918e7f6eed05cf6f1e460756c8bc

    SHA256

    3c54e4d2985f2ae91573359ac969ffa32a5cf989b6b6648d279cc96e97ae1087

    SHA512

    4108d1e23833b72816afd7aec6e526c585a08f6e32dfa7904d126476091feafefffbc0406f32ba7d28f07ce10b8a237fc2ae13490f024cdd4d3798a1a5e5a309

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exe
    Filesize

    333.8MB

    MD5

    6b8a6884f6a5d48e27b7606839ab2043

    SHA1

    a736eb7309ef918e7f6eed05cf6f1e460756c8bc

    SHA256

    3c54e4d2985f2ae91573359ac969ffa32a5cf989b6b6648d279cc96e97ae1087

    SHA512

    4108d1e23833b72816afd7aec6e526c585a08f6e32dfa7904d126476091feafefffbc0406f32ba7d28f07ce10b8a237fc2ae13490f024cdd4d3798a1a5e5a309

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exe
    Filesize

    333.8MB

    MD5

    6b8a6884f6a5d48e27b7606839ab2043

    SHA1

    a736eb7309ef918e7f6eed05cf6f1e460756c8bc

    SHA256

    3c54e4d2985f2ae91573359ac969ffa32a5cf989b6b6648d279cc96e97ae1087

    SHA512

    4108d1e23833b72816afd7aec6e526c585a08f6e32dfa7904d126476091feafefffbc0406f32ba7d28f07ce10b8a237fc2ae13490f024cdd4d3798a1a5e5a309

  • memory/804-464-0x0000000000000000-mapping.dmp
  • memory/2412-293-0x00000000096C0000-0x0000000009D38000-memory.dmp
    Filesize

    6.5MB

  • memory/2412-294-0x0000000008C70000-0x0000000008C8A000-memory.dmp
    Filesize

    104KB

  • memory/2412-213-0x0000000000000000-mapping.dmp
  • memory/2412-282-0x0000000007E40000-0x0000000007EB6000-memory.dmp
    Filesize

    472KB

  • memory/2412-278-0x00000000075B0000-0x00000000075FB000-memory.dmp
    Filesize

    300KB

  • memory/2412-277-0x0000000007590000-0x00000000075AC000-memory.dmp
    Filesize

    112KB

  • memory/2412-274-0x00000000074A0000-0x0000000007506000-memory.dmp
    Filesize

    408KB

  • memory/2412-272-0x0000000007300000-0x0000000007366000-memory.dmp
    Filesize

    408KB

  • memory/2412-254-0x0000000006CD0000-0x00000000072F8000-memory.dmp
    Filesize

    6.2MB

  • memory/2412-249-0x0000000006660000-0x0000000006696000-memory.dmp
    Filesize

    216KB

  • memory/2424-144-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-197-0x00000000060E0000-0x00000000061BA000-memory.dmp
    Filesize

    872KB

  • memory/2424-135-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-142-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-143-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-116-0x0000000000000000-mapping.dmp
  • memory/2424-146-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-145-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-148-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-147-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-149-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-150-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-151-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-152-0x0000000000FA0000-0x0000000000FA8000-memory.dmp
    Filesize

    32KB

  • memory/2424-153-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-154-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-155-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-156-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-157-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-158-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-159-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-160-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-162-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-161-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-163-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-164-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-165-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-167-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-166-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-168-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-170-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-169-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-171-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-173-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-172-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-177-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-179-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-180-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-178-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-176-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-181-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-182-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-175-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-183-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-174-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-141-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-198-0x00000000062E0000-0x0000000006372000-memory.dmp
    Filesize

    584KB

  • memory/2424-199-0x00000000063A0000-0x00000000063C2000-memory.dmp
    Filesize

    136KB

  • memory/2424-201-0x0000000006690000-0x00000000069E0000-memory.dmp
    Filesize

    3.3MB

  • memory/2424-140-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-137-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-139-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-138-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-136-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-134-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-133-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-132-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-131-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-130-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-118-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-129-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-128-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-127-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-119-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-125-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-124-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-121-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-123-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-120-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2424-122-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/3880-620-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB

  • memory/3880-600-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB

  • memory/3880-587-0x0000000000402E87-mapping.dmp
  • memory/3932-429-0x0000000005A60000-0x0000000006066000-memory.dmp
    Filesize

    6.0MB

  • memory/3932-431-0x0000000005580000-0x000000000568A000-memory.dmp
    Filesize

    1.0MB

  • memory/3932-444-0x0000000005690000-0x00000000056DB000-memory.dmp
    Filesize

    300KB

  • memory/3932-439-0x0000000005510000-0x000000000554E000-memory.dmp
    Filesize

    248KB

  • memory/3932-376-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/3932-436-0x00000000054B0000-0x00000000054C2000-memory.dmp
    Filesize

    72KB

  • memory/3932-309-0x000000000042210E-mapping.dmp
  • memory/3932-563-0x0000000006920000-0x00000000069B2000-memory.dmp
    Filesize

    584KB

  • memory/3932-564-0x0000000006EC0000-0x00000000073BE000-memory.dmp
    Filesize

    5.0MB

  • memory/3932-573-0x00000000073C0000-0x0000000007582000-memory.dmp
    Filesize

    1.8MB

  • memory/3932-574-0x0000000007AC0000-0x0000000007FEC000-memory.dmp
    Filesize

    5.2MB

  • memory/3932-577-0x0000000007690000-0x00000000076E0000-memory.dmp
    Filesize

    320KB

  • memory/4304-448-0x0000000005910000-0x00000000059D4000-memory.dmp
    Filesize

    784KB

  • memory/4304-299-0x0000000000000000-mapping.dmp
  • memory/4304-368-0x00000000007C0000-0x00000000007C8000-memory.dmp
    Filesize

    32KB

  • memory/4304-450-0x0000000005E20000-0x0000000006170000-memory.dmp
    Filesize

    3.3MB