Analysis

  • max time kernel
    135s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2023 18:36

General

  • Target

    e196972679d31597c23fd5d24d6cf341abf8a8c5d3ad5c7b677d81db11f54377.exe

  • Size

    1.1MB

  • MD5

    b36774545a331c697d39ac4b3009caa3

  • SHA1

    d28618e3912abf0ecbec9493d09686e10c12b0f9

  • SHA256

    e196972679d31597c23fd5d24d6cf341abf8a8c5d3ad5c7b677d81db11f54377

  • SHA512

    5354b0d983d7c2fbf58a94808e7af4f99e2412b2596f575a4a9d35ee11fcb9af5327a77c91db0e477f081fa51cd5b7bb1132834544538b40a7a56bb5e1fb6b27

  • SSDEEP

    24576:7ylAYjqgEXyagUO8zpBL1HHZYz732lavJuzBN6giK0VwWmitTRG7a:u85XaU5pxR5YzbgSJudbiK+wU1w

Malware Config

Extracted

Family

redline

Botnet

luka

C2

185.161.248.75:4132

Attributes
  • auth_value

    44560bcd37d6bf076da309730fdb519a

Extracted

Family

redline

Botnet

terra

C2

185.161.248.75:4132

Attributes
  • auth_value

    60df3f535f8aa4e264f78041983592d2

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e196972679d31597c23fd5d24d6cf341abf8a8c5d3ad5c7b677d81db11f54377.exe
    "C:\Users\Admin\AppData\Local\Temp\e196972679d31597c23fd5d24d6cf341abf8a8c5d3ad5c7b677d81db11f54377.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3520
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1978255.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1978255.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0506033.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0506033.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3984
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6531864.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6531864.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:228
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9252775.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9252775.exe
          4⤵
          • Executes dropped EXE
          PID:4020
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 928
            5⤵
            • Program crash
            PID:2972
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6729432.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6729432.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2168
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6729432.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6729432.exe
          4⤵
          • Executes dropped EXE
          PID:3116
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6729432.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6729432.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:532
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5186235.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5186235.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1020
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5186235.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5186235.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1548
        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
          "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:312
          • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            5⤵
            • Executes dropped EXE
            PID:4140
          • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            5⤵
            • Executes dropped EXE
            PID:2816
          • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of UnmapMainImage
            PID:2324
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 12
              6⤵
              • Program crash
              PID:1600
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4020 -ip 4020
    1⤵
      PID:3304
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2324 -ip 2324
      1⤵
        PID:4928

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\r6729432.exe.log
        Filesize

        425B

        MD5

        4eaca4566b22b01cd3bc115b9b0b2196

        SHA1

        e743e0792c19f71740416e7b3c061d9f1336bf94

        SHA256

        34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

        SHA512

        bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
        Filesize

        961KB

        MD5

        9ad39594618e8269b4fd7b468c9dec6d

        SHA1

        7f8e168bdd52ba4b64edf62e4410b7bc5313ed21

        SHA256

        8bd9f464909373ea78c356e666ff466fa127e7152f5ca8c8c4bbd6c7cca2d34c

        SHA512

        21ac5828424732ebd685fdd0eed8a11c92c50afcfe12fb55ff13ffbe851b9766c998523f7bb6dea0610430b9e66e858ef83ad4135cb77f2341c2880bd7477d89

      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
        Filesize

        961KB

        MD5

        9ad39594618e8269b4fd7b468c9dec6d

        SHA1

        7f8e168bdd52ba4b64edf62e4410b7bc5313ed21

        SHA256

        8bd9f464909373ea78c356e666ff466fa127e7152f5ca8c8c4bbd6c7cca2d34c

        SHA512

        21ac5828424732ebd685fdd0eed8a11c92c50afcfe12fb55ff13ffbe851b9766c998523f7bb6dea0610430b9e66e858ef83ad4135cb77f2341c2880bd7477d89

      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
        Filesize

        961KB

        MD5

        9ad39594618e8269b4fd7b468c9dec6d

        SHA1

        7f8e168bdd52ba4b64edf62e4410b7bc5313ed21

        SHA256

        8bd9f464909373ea78c356e666ff466fa127e7152f5ca8c8c4bbd6c7cca2d34c

        SHA512

        21ac5828424732ebd685fdd0eed8a11c92c50afcfe12fb55ff13ffbe851b9766c998523f7bb6dea0610430b9e66e858ef83ad4135cb77f2341c2880bd7477d89

      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
        Filesize

        961KB

        MD5

        9ad39594618e8269b4fd7b468c9dec6d

        SHA1

        7f8e168bdd52ba4b64edf62e4410b7bc5313ed21

        SHA256

        8bd9f464909373ea78c356e666ff466fa127e7152f5ca8c8c4bbd6c7cca2d34c

        SHA512

        21ac5828424732ebd685fdd0eed8a11c92c50afcfe12fb55ff13ffbe851b9766c998523f7bb6dea0610430b9e66e858ef83ad4135cb77f2341c2880bd7477d89

      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
        Filesize

        961KB

        MD5

        9ad39594618e8269b4fd7b468c9dec6d

        SHA1

        7f8e168bdd52ba4b64edf62e4410b7bc5313ed21

        SHA256

        8bd9f464909373ea78c356e666ff466fa127e7152f5ca8c8c4bbd6c7cca2d34c

        SHA512

        21ac5828424732ebd685fdd0eed8a11c92c50afcfe12fb55ff13ffbe851b9766c998523f7bb6dea0610430b9e66e858ef83ad4135cb77f2341c2880bd7477d89

      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
        Filesize

        961KB

        MD5

        9ad39594618e8269b4fd7b468c9dec6d

        SHA1

        7f8e168bdd52ba4b64edf62e4410b7bc5313ed21

        SHA256

        8bd9f464909373ea78c356e666ff466fa127e7152f5ca8c8c4bbd6c7cca2d34c

        SHA512

        21ac5828424732ebd685fdd0eed8a11c92c50afcfe12fb55ff13ffbe851b9766c998523f7bb6dea0610430b9e66e858ef83ad4135cb77f2341c2880bd7477d89

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5186235.exe
        Filesize

        961KB

        MD5

        9ad39594618e8269b4fd7b468c9dec6d

        SHA1

        7f8e168bdd52ba4b64edf62e4410b7bc5313ed21

        SHA256

        8bd9f464909373ea78c356e666ff466fa127e7152f5ca8c8c4bbd6c7cca2d34c

        SHA512

        21ac5828424732ebd685fdd0eed8a11c92c50afcfe12fb55ff13ffbe851b9766c998523f7bb6dea0610430b9e66e858ef83ad4135cb77f2341c2880bd7477d89

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5186235.exe
        Filesize

        961KB

        MD5

        9ad39594618e8269b4fd7b468c9dec6d

        SHA1

        7f8e168bdd52ba4b64edf62e4410b7bc5313ed21

        SHA256

        8bd9f464909373ea78c356e666ff466fa127e7152f5ca8c8c4bbd6c7cca2d34c

        SHA512

        21ac5828424732ebd685fdd0eed8a11c92c50afcfe12fb55ff13ffbe851b9766c998523f7bb6dea0610430b9e66e858ef83ad4135cb77f2341c2880bd7477d89

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5186235.exe
        Filesize

        961KB

        MD5

        9ad39594618e8269b4fd7b468c9dec6d

        SHA1

        7f8e168bdd52ba4b64edf62e4410b7bc5313ed21

        SHA256

        8bd9f464909373ea78c356e666ff466fa127e7152f5ca8c8c4bbd6c7cca2d34c

        SHA512

        21ac5828424732ebd685fdd0eed8a11c92c50afcfe12fb55ff13ffbe851b9766c998523f7bb6dea0610430b9e66e858ef83ad4135cb77f2341c2880bd7477d89

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1978255.exe
        Filesize

        702KB

        MD5

        c83d3cb881477d38dfa78e7089355e60

        SHA1

        f92c5cc1a9497a0bc7df4d51b716e0a6da49977f

        SHA256

        849ece0aae8631364523f5fd8fa0044f226a97d4943395e7b07c1c3823b244e5

        SHA512

        f65ac4f6e40d4d62beef61252752444185b5f47373518da996a328d140dff3b3c4ba9a95adfa12fd7ff6d551d007d6c142dc5b305a8aa4ed93a3ad38b8c39d0f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1978255.exe
        Filesize

        702KB

        MD5

        c83d3cb881477d38dfa78e7089355e60

        SHA1

        f92c5cc1a9497a0bc7df4d51b716e0a6da49977f

        SHA256

        849ece0aae8631364523f5fd8fa0044f226a97d4943395e7b07c1c3823b244e5

        SHA512

        f65ac4f6e40d4d62beef61252752444185b5f47373518da996a328d140dff3b3c4ba9a95adfa12fd7ff6d551d007d6c142dc5b305a8aa4ed93a3ad38b8c39d0f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6729432.exe
        Filesize

        905KB

        MD5

        81aa78d963e432dc74d42d4f943197f2

        SHA1

        f81fe2ee46f5271524e8089fc82e5d455a379c95

        SHA256

        490a15311f18414473dee4453a919ab77faed547ef0f269e9d164f2687925cf9

        SHA512

        2039409d0e47881877bf92e2a4a44b913b38e3add603457116536eb4a6506e9c26513573abde87c48a1b2b2c075f324fa8ce98f8301126703c8e2d2a305c4f80

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6729432.exe
        Filesize

        905KB

        MD5

        81aa78d963e432dc74d42d4f943197f2

        SHA1

        f81fe2ee46f5271524e8089fc82e5d455a379c95

        SHA256

        490a15311f18414473dee4453a919ab77faed547ef0f269e9d164f2687925cf9

        SHA512

        2039409d0e47881877bf92e2a4a44b913b38e3add603457116536eb4a6506e9c26513573abde87c48a1b2b2c075f324fa8ce98f8301126703c8e2d2a305c4f80

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6729432.exe
        Filesize

        905KB

        MD5

        81aa78d963e432dc74d42d4f943197f2

        SHA1

        f81fe2ee46f5271524e8089fc82e5d455a379c95

        SHA256

        490a15311f18414473dee4453a919ab77faed547ef0f269e9d164f2687925cf9

        SHA512

        2039409d0e47881877bf92e2a4a44b913b38e3add603457116536eb4a6506e9c26513573abde87c48a1b2b2c075f324fa8ce98f8301126703c8e2d2a305c4f80

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6729432.exe
        Filesize

        905KB

        MD5

        81aa78d963e432dc74d42d4f943197f2

        SHA1

        f81fe2ee46f5271524e8089fc82e5d455a379c95

        SHA256

        490a15311f18414473dee4453a919ab77faed547ef0f269e9d164f2687925cf9

        SHA512

        2039409d0e47881877bf92e2a4a44b913b38e3add603457116536eb4a6506e9c26513573abde87c48a1b2b2c075f324fa8ce98f8301126703c8e2d2a305c4f80

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0506033.exe
        Filesize

        306KB

        MD5

        1ec48ec0f8c040d9fef20d22bd8e8811

        SHA1

        6417b9eab3af3b7efe5378bbfb2c02fda16aae47

        SHA256

        abac89672306ce61d85251b88324cd2aa8cbb572f53bb0612b2f24b788b0ee21

        SHA512

        66f50850a3181f8bcec9d677939046385b63f4a9612c50172bfbd49515db40a4e3f7cd0dd06b643ad0045b8a13bd4c38ceda990ad23deb2ff4d64ca9ea74893a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0506033.exe
        Filesize

        306KB

        MD5

        1ec48ec0f8c040d9fef20d22bd8e8811

        SHA1

        6417b9eab3af3b7efe5378bbfb2c02fda16aae47

        SHA256

        abac89672306ce61d85251b88324cd2aa8cbb572f53bb0612b2f24b788b0ee21

        SHA512

        66f50850a3181f8bcec9d677939046385b63f4a9612c50172bfbd49515db40a4e3f7cd0dd06b643ad0045b8a13bd4c38ceda990ad23deb2ff4d64ca9ea74893a

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6531864.exe
        Filesize

        185KB

        MD5

        ede7be3f26a1f46d85a8dc4437e74335

        SHA1

        1cbdbb5519c516fb4235873038c4467b44e33eb8

        SHA256

        423898b6a481f9a73e12eb46b46b667deb778c205e1515c4ef475c63e9e8fbbc

        SHA512

        261e42d4781f59910423ffd7778f64174613041bd202c13aa9fff5750e3be0ac8a84a1233550e54c0f5cc5cc45656f605087e266d4a0f0a36b0fae1357125a45

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6531864.exe
        Filesize

        185KB

        MD5

        ede7be3f26a1f46d85a8dc4437e74335

        SHA1

        1cbdbb5519c516fb4235873038c4467b44e33eb8

        SHA256

        423898b6a481f9a73e12eb46b46b667deb778c205e1515c4ef475c63e9e8fbbc

        SHA512

        261e42d4781f59910423ffd7778f64174613041bd202c13aa9fff5750e3be0ac8a84a1233550e54c0f5cc5cc45656f605087e266d4a0f0a36b0fae1357125a45

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9252775.exe
        Filesize

        145KB

        MD5

        246e4740e208c1c6d131fc5112f86b4c

        SHA1

        988c8aa61f61209e351794eee17d791e2da8a9e6

        SHA256

        ed2d081914a4c1216a9861e73fc98056d1262e78cf826d3cea71090af71ae0b3

        SHA512

        6dde7618b9ce4836c9f3ad580faba7e03aa5e34a95b9404f5ae79d31e25af25e1d2404027b13e9a9ad0c1bdc41fa2d7083b8ddbf039e686755705bd776d003c6

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9252775.exe
        Filesize

        145KB

        MD5

        246e4740e208c1c6d131fc5112f86b4c

        SHA1

        988c8aa61f61209e351794eee17d791e2da8a9e6

        SHA256

        ed2d081914a4c1216a9861e73fc98056d1262e78cf826d3cea71090af71ae0b3

        SHA512

        6dde7618b9ce4836c9f3ad580faba7e03aa5e34a95b9404f5ae79d31e25af25e1d2404027b13e9a9ad0c1bdc41fa2d7083b8ddbf039e686755705bd776d003c6

      • memory/228-160-0x0000000002230000-0x0000000002246000-memory.dmp
        Filesize

        88KB

      • memory/228-174-0x0000000002230000-0x0000000002246000-memory.dmp
        Filesize

        88KB

      • memory/228-185-0x0000000002220000-0x0000000002230000-memory.dmp
        Filesize

        64KB

      • memory/228-184-0x0000000002220000-0x0000000002230000-memory.dmp
        Filesize

        64KB

      • memory/228-180-0x0000000002230000-0x0000000002246000-memory.dmp
        Filesize

        88KB

      • memory/228-182-0x0000000002230000-0x0000000002246000-memory.dmp
        Filesize

        88KB

      • memory/228-178-0x0000000002230000-0x0000000002246000-memory.dmp
        Filesize

        88KB

      • memory/228-172-0x0000000002230000-0x0000000002246000-memory.dmp
        Filesize

        88KB

      • memory/228-176-0x0000000002230000-0x0000000002246000-memory.dmp
        Filesize

        88KB

      • memory/228-183-0x0000000002220000-0x0000000002230000-memory.dmp
        Filesize

        64KB

      • memory/228-168-0x0000000002230000-0x0000000002246000-memory.dmp
        Filesize

        88KB

      • memory/228-170-0x0000000002230000-0x0000000002246000-memory.dmp
        Filesize

        88KB

      • memory/228-166-0x0000000002230000-0x0000000002246000-memory.dmp
        Filesize

        88KB

      • memory/228-164-0x0000000002230000-0x0000000002246000-memory.dmp
        Filesize

        88KB

      • memory/228-162-0x0000000002230000-0x0000000002246000-memory.dmp
        Filesize

        88KB

      • memory/228-158-0x0000000002230000-0x0000000002246000-memory.dmp
        Filesize

        88KB

      • memory/228-154-0x0000000004980000-0x0000000004F24000-memory.dmp
        Filesize

        5.6MB

      • memory/228-155-0x0000000002230000-0x0000000002246000-memory.dmp
        Filesize

        88KB

      • memory/228-156-0x0000000002230000-0x0000000002246000-memory.dmp
        Filesize

        88KB

      • memory/312-232-0x0000000007180000-0x0000000007190000-memory.dmp
        Filesize

        64KB

      • memory/532-197-0x0000000000400000-0x000000000042A000-memory.dmp
        Filesize

        168KB

      • memory/532-236-0x0000000006DF0000-0x000000000731C000-memory.dmp
        Filesize

        5.2MB

      • memory/532-210-0x0000000004E50000-0x0000000004E60000-memory.dmp
        Filesize

        64KB

      • memory/532-240-0x0000000004E50000-0x0000000004E60000-memory.dmp
        Filesize

        64KB

      • memory/532-208-0x0000000004E80000-0x0000000004EBC000-memory.dmp
        Filesize

        240KB

      • memory/532-239-0x0000000006670000-0x00000000066C0000-memory.dmp
        Filesize

        320KB

      • memory/532-238-0x00000000068C0000-0x0000000006936000-memory.dmp
        Filesize

        472KB

      • memory/532-235-0x00000000066F0000-0x00000000068B2000-memory.dmp
        Filesize

        1.8MB

      • memory/532-207-0x0000000004E60000-0x0000000004E72000-memory.dmp
        Filesize

        72KB

      • memory/532-206-0x0000000004F10000-0x000000000501A000-memory.dmp
        Filesize

        1.0MB

      • memory/532-234-0x0000000005280000-0x00000000052E6000-memory.dmp
        Filesize

        408KB

      • memory/532-205-0x00000000053A0000-0x00000000059B8000-memory.dmp
        Filesize

        6.1MB

      • memory/532-233-0x00000000051E0000-0x0000000005272000-memory.dmp
        Filesize

        584KB

      • memory/1020-204-0x0000000000EE0000-0x0000000000FD6000-memory.dmp
        Filesize

        984KB

      • memory/1020-209-0x0000000007C80000-0x0000000007C90000-memory.dmp
        Filesize

        64KB

      • memory/1548-230-0x0000000000400000-0x0000000000438000-memory.dmp
        Filesize

        224KB

      • memory/1548-217-0x0000000000400000-0x0000000000438000-memory.dmp
        Filesize

        224KB

      • memory/1548-215-0x0000000000400000-0x0000000000438000-memory.dmp
        Filesize

        224KB

      • memory/1548-214-0x0000000000400000-0x0000000000438000-memory.dmp
        Filesize

        224KB

      • memory/1548-211-0x0000000000400000-0x0000000000438000-memory.dmp
        Filesize

        224KB

      • memory/2168-195-0x0000000007020000-0x0000000007030000-memory.dmp
        Filesize

        64KB

      • memory/2168-194-0x00000000001C0000-0x00000000002A8000-memory.dmp
        Filesize

        928KB

      • memory/2324-245-0x0000000000380000-0x0000000000380000-memory.dmp
      • memory/4020-190-0x0000000000FC0000-0x0000000000FEA000-memory.dmp
        Filesize

        168KB