Analysis

  • max time kernel
    207s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-12-2022 08:54

General

  • Target

    Eulen.Menu.by.1msorry.rar

  • Size

    2.3MB

  • MD5

    0fb5fbf947ce20a5b1a78327d7b3533b

  • SHA1

    2b988ef70d4b6c2b2c4b22600366d9ce1ce9565c

  • SHA256

    f62e04bed2383a126445fe9cfd4671a649cb162069b712da592a8cb300f7e0fe

  • SHA512

    30256b1aaf06f93bbc80b16559f1ee20c7f47dac0440a90bff8fd4e501366b5d8a712d74858fddb01ced5752ce7a1a285a6c41a7142da1f96412ce99c767f2fa

  • SSDEEP

    49152:ahBpu25Y5Nt7n2nX99a7vUP3MwCc3G4VEfYmqY4pvPqCjtnUlHbDPVBp3fc:y8j57SN9aQBG2hY4p3T5WE

Malware Config

Extracted

Family

redline

Botnet

SPOOFER

C2

20.197.226.40:32619

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 26 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Eulen.Menu.by.1msorry.rar
    1⤵
      PID:4960
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2324
      • C:\Program Files\7-Zip\7z.exe
        "C:\Program Files\7-Zip\7z.exe" "C:\Users\Admin\AppData\Local\Temp\Eulen.Menu.by.1msorry.rar"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:944
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3308
      • C:\Program Files\7-Zip\7zFM.exe
        "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Eulen.Menu.by.1msorry.rar"
        1⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:3384
      • C:\Users\Admin\Desktop\Loader.exe
        "C:\Users\Admin\Desktop\Loader.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4432
        • C:\Windows\system32\cmd.exe
          "cmd.exe" /C "powershell -w Hidden -ep bypass -nop -C Set-MpPreference -ExclusionPath C:\\"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1488
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -w Hidden -ep bypass -nop -C Set-MpPreference -ExclusionPath C:\\
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:552
        • C:\Windows\system32\cmd.exe
          "cmd.exe" /C "powershell.exe -w Hidden -ep Bypass -C Start-Process C:\\ProgramData\\license.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3128
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -w Hidden -ep Bypass -C Start-Process C:\\ProgramData\\license.exe
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1308
            • C:\ProgramData\license.exe
              "C:\ProgramData\license.exe"
              4⤵
              • Executes dropped EXE
              • Checks computer location settings
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3940
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQA1AA==
                5⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4840
              • C:\ProgramData\license.exe
                C:\ProgramData\license.exe
                5⤵
                • Executes dropped EXE
                • Checks computer location settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1988
                • C:\Users\Admin\AppData\Local\Temp\Updater.exe
                  "C:\Users\Admin\AppData\Local\Temp\Updater.exe"
                  6⤵
                  • Executes dropped EXE
                  • Checks computer location settings
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3816
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
                    7⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1512
                  • C:\Users\Admin\AppData\Local\Temp\Updater.exe
                    C:\Users\Admin\AppData\Local\Temp\Updater.exe
                    7⤵
                    • Executes dropped EXE
                    • Checks computer location settings
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2460
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -Seconds 3; Set-MpPreference -ExclusionPath C:\
                      8⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3760
      • C:\Users\Admin\AppData\Roaming\Updater.exe
        C:\Users\Admin\AppData\Roaming\Updater.exe
        1⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1620
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4048
        • C:\Users\Admin\AppData\Roaming\Updater.exe
          C:\Users\Admin\AppData\Roaming\Updater.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3740

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Collection

      Data from Local System

      2
      T1005

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\license.exe
        Filesize

        638KB

        MD5

        fcee7bf402dedeaf3fcf18a52a56d75b

        SHA1

        f99c8a99be241fc82c06c2c0155bee4ce26e2e5e

        SHA256

        55fa30deba49d1278145e3ab083182e50146fdc55643c54d3126a7b8a76c0684

        SHA512

        0bac4d1f9e3c7d6ba58a4370a59a233506a6565debc81148a40a743188902abbc1e6e822c45a1cf5267f3e3227d913689fdd76bc3d812598b928fcd835c84c68

      • C:\ProgramData\license.exe
        Filesize

        638KB

        MD5

        fcee7bf402dedeaf3fcf18a52a56d75b

        SHA1

        f99c8a99be241fc82c06c2c0155bee4ce26e2e5e

        SHA256

        55fa30deba49d1278145e3ab083182e50146fdc55643c54d3126a7b8a76c0684

        SHA512

        0bac4d1f9e3c7d6ba58a4370a59a233506a6565debc81148a40a743188902abbc1e6e822c45a1cf5267f3e3227d913689fdd76bc3d812598b928fcd835c84c68

      • C:\ProgramData\license.exe
        Filesize

        638KB

        MD5

        fcee7bf402dedeaf3fcf18a52a56d75b

        SHA1

        f99c8a99be241fc82c06c2c0155bee4ce26e2e5e

        SHA256

        55fa30deba49d1278145e3ab083182e50146fdc55643c54d3126a7b8a76c0684

        SHA512

        0bac4d1f9e3c7d6ba58a4370a59a233506a6565debc81148a40a743188902abbc1e6e822c45a1cf5267f3e3227d913689fdd76bc3d812598b928fcd835c84c68

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Updater.exe.log
        Filesize

        1KB

        MD5

        45e54c812172d4a7b2140b9c47099881

        SHA1

        f921a1c60b7b73d873381a2830ea51e0bca71db5

        SHA256

        2107ccfed0e139683670414c7d74744b43a0b54234b30efa8f8cbb9463e857d2

        SHA512

        497291bfbaa277761ea81e4aafc1cb7600ac759917ee39aaaaaa03c102d1a7828f34d1abe5aeea4d08f83705ccac4691c6b8ecb09282b97d87ef3131191b00d5

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\license.exe.log
        Filesize

        1KB

        MD5

        dc464d62de128521567362201cf8d7b1

        SHA1

        e57a8c8aad4ed18d0138b0dd99f395e97662bff8

        SHA256

        d35faa203ecb0c712dc9bf60e75a18b80423cd3054f28ea9e556339ef30de652

        SHA512

        f6728bbbedde65776479b705e5af49485a1886355e4bfc867531bf7d59f8e7188eff5b193845e3ad6a77aa59518f529fd6e4ace4504a2a153a8cbdb20dfc8005

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db
        Filesize

        28KB

        MD5

        cd0cc05cc65e20b7123c5bd97ab13bee

        SHA1

        7b574d6d23052d42d4057fb8f997ee89db3c7abf

        SHA256

        7ba82cfe1b592af5f5ba96536e3a3c131b17c327bde1565688b7470071c46ac1

        SHA512

        53b6918dccf724c48697141123f222da6d45568645a0a3fe4a8dab63ce1a4e71d4303f5c8f7bbfabd1109e9c2947b21e51305edff8c2e7fe60441bf3be7584d4

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
        Filesize

        53KB

        MD5

        06ad34f9739c5159b4d92d702545bd49

        SHA1

        9152a0d4f153f3f40f7e606be75f81b582ee0c17

        SHA256

        474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba

        SHA512

        c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
        Filesize

        53KB

        MD5

        687ff3bb8a8b15736d686119a681097c

        SHA1

        18f43aa14e56d4fb158a8804f79fc3c604903991

        SHA256

        51fd45579a0bee4beabbf7aa825ccc646f907dfdf27b2fc1791fa47dc90d5aa2

        SHA512

        047b21b92e74c93f264e2547900decd295f3089b22165372c4060b76bb813ffa6f2af924974936e25a2db551ea1eec722329ae78e1fff08f6f104d041090094a

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        944B

        MD5

        cadef9abd087803c630df65264a6c81c

        SHA1

        babbf3636c347c8727c35f3eef2ee643dbcc4bd2

        SHA256

        cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438

        SHA512

        7278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        64B

        MD5

        d88c19790214c97542dc0049a5062dae

        SHA1

        04771bade7a400825c849cf594870614423c58c0

        SHA256

        89921b732601dfe90926bc6df9a6bb2b21284f42f346e6db046d0b64138bf531

        SHA512

        87828475fbda44a2dc58c4921b63171c07f760d6a439c9dbbdf8281f9571ca1792b8d2aef4da2b1e1a7d6cd21ced7819b498f29e97d4a30db9d4de13cd1830c1

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        16KB

        MD5

        d8ab91466df8dba1654dad63dbd849fa

        SHA1

        8d97c06e119258f7122640d281e383eb303c07ef

        SHA256

        208b1ea77a2e37a71d973b45bebaaa22be9d613bed1dff00c3384cb139d8d77f

        SHA512

        4bb41cff853d32e7727079c46f9dd20789ad2b98bb0fee4c9d0c3aa37929d9017b2d56568c01956e5b6e43c05eb85686b107f299bc210b205929cfaf98b58179

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        1KB

        MD5

        bb1c33a1a3bbff8ced39d26308f77211

        SHA1

        c59c693e72c74c349b245b33b907dfb4e4ba4c3a

        SHA256

        8685999934d4786f68afbe0f7ceeecd3e308fe8886cd2bc269ba7e3d43bf3c90

        SHA512

        2d07992b52f2826969a4d5549f2812fad0999d9b858ae3e56b3ded04d058dfcada1987ae3b0c2c0cbbfed4a3ac734500a89d8750dd1b85351b6efd05202669b3

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        1KB

        MD5

        e936ffde1732f536cc835ed3e6c83842

        SHA1

        05a7c09e599c32003ea21329932a032ace4f592c

        SHA256

        da9997a3db22d4c3b7900392af3d4a88d09de0df6c4a75d89ea1b271edbb2552

        SHA512

        35d49450a82c671843080c2ff2ff0d33aa5640234958b7e417a9c2f9e20e24b752a4793a99662253e7ad892dcd70904f6524d5e71c0d80333d7d01741c115870

      • C:\Users\Admin\AppData\Local\Temp\Updater.exe
        Filesize

        1.0MB

        MD5

        bb233d4542a170be01c2d14cbb4a1d8a

        SHA1

        3f5b38c62ab67eb8612af6280294b524d94891cd

        SHA256

        5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352

        SHA512

        fac8a98136e7c244d34e2bb8afeb5365597994030ba266f0640808addd990f90395be95a3e518c7406c3872cdf333a054da9537ebd266511918011ce7a747bb3

      • C:\Users\Admin\AppData\Local\Temp\Updater.exe
        Filesize

        1.0MB

        MD5

        bb233d4542a170be01c2d14cbb4a1d8a

        SHA1

        3f5b38c62ab67eb8612af6280294b524d94891cd

        SHA256

        5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352

        SHA512

        fac8a98136e7c244d34e2bb8afeb5365597994030ba266f0640808addd990f90395be95a3e518c7406c3872cdf333a054da9537ebd266511918011ce7a747bb3

      • C:\Users\Admin\AppData\Local\Temp\Updater.exe
        Filesize

        1.0MB

        MD5

        bb233d4542a170be01c2d14cbb4a1d8a

        SHA1

        3f5b38c62ab67eb8612af6280294b524d94891cd

        SHA256

        5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352

        SHA512

        fac8a98136e7c244d34e2bb8afeb5365597994030ba266f0640808addd990f90395be95a3e518c7406c3872cdf333a054da9537ebd266511918011ce7a747bb3

      • C:\Users\Admin\AppData\Roaming\Updater.exe
        Filesize

        1.0MB

        MD5

        bb233d4542a170be01c2d14cbb4a1d8a

        SHA1

        3f5b38c62ab67eb8612af6280294b524d94891cd

        SHA256

        5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352

        SHA512

        fac8a98136e7c244d34e2bb8afeb5365597994030ba266f0640808addd990f90395be95a3e518c7406c3872cdf333a054da9537ebd266511918011ce7a747bb3

      • C:\Users\Admin\AppData\Roaming\Updater.exe
        Filesize

        1.0MB

        MD5

        bb233d4542a170be01c2d14cbb4a1d8a

        SHA1

        3f5b38c62ab67eb8612af6280294b524d94891cd

        SHA256

        5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352

        SHA512

        fac8a98136e7c244d34e2bb8afeb5365597994030ba266f0640808addd990f90395be95a3e518c7406c3872cdf333a054da9537ebd266511918011ce7a747bb3

      • C:\Users\Admin\AppData\Roaming\Updater.exe
        Filesize

        1.0MB

        MD5

        bb233d4542a170be01c2d14cbb4a1d8a

        SHA1

        3f5b38c62ab67eb8612af6280294b524d94891cd

        SHA256

        5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352

        SHA512

        fac8a98136e7c244d34e2bb8afeb5365597994030ba266f0640808addd990f90395be95a3e518c7406c3872cdf333a054da9537ebd266511918011ce7a747bb3

      • C:\Users\Admin\Desktop\Loader.exe
        Filesize

        5.9MB

        MD5

        9f893501b787cfdffdd9a98dc5b489e9

        SHA1

        8767c07438ca5816cd76789d4accd2a2e894acb8

        SHA256

        1c7f6002ff994762d284f7b4e6b7c4f87fc368775179715f58d698a804df9e2e

        SHA512

        179d13f1561f7d688f32cb53e030fff691ad50dd75d0f23b634f01d54de8bade6a2d01b4ca0c4e0e581755971b4d815c56b74476a856d00b92ed5149681b8bfd

      • C:\Users\Admin\Desktop\Loader.exe
        Filesize

        5.9MB

        MD5

        9f893501b787cfdffdd9a98dc5b489e9

        SHA1

        8767c07438ca5816cd76789d4accd2a2e894acb8

        SHA256

        1c7f6002ff994762d284f7b4e6b7c4f87fc368775179715f58d698a804df9e2e

        SHA512

        179d13f1561f7d688f32cb53e030fff691ad50dd75d0f23b634f01d54de8bade6a2d01b4ca0c4e0e581755971b4d815c56b74476a856d00b92ed5149681b8bfd

      • memory/552-139-0x00007FFC44B20000-0x00007FFC455E1000-memory.dmp
        Filesize

        10.8MB

      • memory/552-138-0x0000021BDFD60000-0x0000021BDFD82000-memory.dmp
        Filesize

        136KB

      • memory/552-137-0x0000000000000000-mapping.dmp
      • memory/944-132-0x0000000000000000-mapping.dmp
      • memory/1308-147-0x00007FFC44B20000-0x00007FFC455E1000-memory.dmp
        Filesize

        10.8MB

      • memory/1308-143-0x00007FFC44B20000-0x00007FFC455E1000-memory.dmp
        Filesize

        10.8MB

      • memory/1308-141-0x0000000000000000-mapping.dmp
      • memory/1488-136-0x0000000000000000-mapping.dmp
      • memory/1512-183-0x00007FFC44B20000-0x00007FFC455E1000-memory.dmp
        Filesize

        10.8MB

      • memory/1512-181-0x00007FFC44B20000-0x00007FFC455E1000-memory.dmp
        Filesize

        10.8MB

      • memory/1512-184-0x00007FFC44B20000-0x00007FFC455E1000-memory.dmp
        Filesize

        10.8MB

      • memory/1512-178-0x0000000000000000-mapping.dmp
      • memory/1620-197-0x00007FFC44B20000-0x00007FFC455E1000-memory.dmp
        Filesize

        10.8MB

      • memory/1620-206-0x00007FFC44B20000-0x00007FFC455E1000-memory.dmp
        Filesize

        10.8MB

      • memory/1620-213-0x00007FFC44B20000-0x00007FFC455E1000-memory.dmp
        Filesize

        10.8MB

      • memory/1988-172-0x00000000072B0000-0x00000000072CE000-memory.dmp
        Filesize

        120KB

      • memory/1988-166-0x00000000056D0000-0x00000000056E2000-memory.dmp
        Filesize

        72KB

      • memory/1988-170-0x00000000073C0000-0x00000000078EC000-memory.dmp
        Filesize

        5.2MB

      • memory/1988-171-0x00000000071B0000-0x0000000007226000-memory.dmp
        Filesize

        472KB

      • memory/1988-168-0x00000000059E0000-0x0000000005AEA000-memory.dmp
        Filesize

        1.0MB

      • memory/1988-161-0x0000000000000000-mapping.dmp
      • memory/1988-167-0x0000000005730000-0x000000000576C000-memory.dmp
        Filesize

        240KB

      • memory/1988-169-0x0000000006CC0000-0x0000000006E82000-memory.dmp
        Filesize

        1.8MB

      • memory/1988-162-0x0000000000400000-0x000000000041E000-memory.dmp
        Filesize

        120KB

      • memory/1988-165-0x0000000005DA0000-0x00000000063B8000-memory.dmp
        Filesize

        6.1MB

      • memory/2460-185-0x0000000140000000-0x0000000140078000-memory.dmp
        Filesize

        480KB

      • memory/2460-186-0x0000000140000000-mapping.dmp
      • memory/2460-190-0x00007FFC44B20000-0x00007FFC455E1000-memory.dmp
        Filesize

        10.8MB

      • memory/2460-194-0x00007FFC44B20000-0x00007FFC455E1000-memory.dmp
        Filesize

        10.8MB

      • memory/3128-140-0x0000000000000000-mapping.dmp
      • memory/3740-215-0x00007FFC44B20000-0x00007FFC455E1000-memory.dmp
        Filesize

        10.8MB

      • memory/3740-211-0x0000000140000000-mapping.dmp
      • memory/3740-214-0x00007FFC44B20000-0x00007FFC455E1000-memory.dmp
        Filesize

        10.8MB

      • memory/3760-191-0x0000000000000000-mapping.dmp
      • memory/3760-198-0x00007FFC44B20000-0x00007FFC455E1000-memory.dmp
        Filesize

        10.8MB

      • memory/3760-205-0x00007FFC44B20000-0x00007FFC455E1000-memory.dmp
        Filesize

        10.8MB

      • memory/3760-203-0x00000277711B0000-0x00000277711B8000-memory.dmp
        Filesize

        32KB

      • memory/3760-204-0x00000277711C0000-0x00000277711CA000-memory.dmp
        Filesize

        40KB

      • memory/3760-202-0x00000277711A0000-0x00000277711AA000-memory.dmp
        Filesize

        40KB

      • memory/3760-201-0x0000027757430000-0x000002775744C000-memory.dmp
        Filesize

        112KB

      • memory/3816-182-0x00007FFC44B20000-0x00007FFC455E1000-memory.dmp
        Filesize

        10.8MB

      • memory/3816-189-0x00007FFC44B20000-0x00007FFC455E1000-memory.dmp
        Filesize

        10.8MB

      • memory/3816-173-0x0000000000000000-mapping.dmp
      • memory/3816-176-0x000002F083BF0000-0x000002F083CF4000-memory.dmp
        Filesize

        1.0MB

      • memory/3816-177-0x00007FFC44B20000-0x00007FFC455E1000-memory.dmp
        Filesize

        10.8MB

      • memory/3940-151-0x0000000005320000-0x0000000005342000-memory.dmp
        Filesize

        136KB

      • memory/3940-150-0x0000000005270000-0x0000000005302000-memory.dmp
        Filesize

        584KB

      • memory/3940-145-0x0000000000000000-mapping.dmp
      • memory/3940-148-0x0000000000730000-0x00000000007D6000-memory.dmp
        Filesize

        664KB

      • memory/3940-149-0x0000000005780000-0x0000000005D24000-memory.dmp
        Filesize

        5.6MB

      • memory/4048-199-0x0000000000000000-mapping.dmp
      • memory/4048-207-0x00007FFC44B20000-0x00007FFC455E1000-memory.dmp
        Filesize

        10.8MB

      • memory/4048-209-0x00007FFC44B20000-0x00007FFC455E1000-memory.dmp
        Filesize

        10.8MB

      • memory/4048-200-0x00007FFC44B20000-0x00007FFC455E1000-memory.dmp
        Filesize

        10.8MB

      • memory/4840-158-0x0000000005F10000-0x0000000005F2E000-memory.dmp
        Filesize

        120KB

      • memory/4840-155-0x00000000050D0000-0x0000000005136000-memory.dmp
        Filesize

        408KB

      • memory/4840-159-0x0000000007580000-0x0000000007BFA000-memory.dmp
        Filesize

        6.5MB

      • memory/4840-154-0x0000000005210000-0x0000000005838000-memory.dmp
        Filesize

        6.2MB

      • memory/4840-160-0x0000000006410000-0x000000000642A000-memory.dmp
        Filesize

        104KB

      • memory/4840-156-0x0000000005840000-0x00000000058A6000-memory.dmp
        Filesize

        408KB

      • memory/4840-153-0x0000000002620000-0x0000000002656000-memory.dmp
        Filesize

        216KB

      • memory/4840-152-0x0000000000000000-mapping.dmp