Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-11-2022 13:18

General

  • Target

    file.exe

  • Size

    259KB

  • MD5

    c6fbed69bf7f6a50dd27c2e4b5dc3607

  • SHA1

    90e5b712608e74b31b7b99ce9b75465c401f47b6

  • SHA256

    773123f439cd65d61c49f0593f74b94d223013d8d2341674e7ee8a514a5a156b

  • SHA512

    ae455aaa304aa8e8f8bfd4459647f6e6e4875d16ffc80ac8233f5bdf1b763577bc34d6634e7e829ca20a0f2acc3fe216ce1ffec867c59465cf45d03d3424e336

  • SSDEEP

    3072:/88XR1VlLhjtoLnhKr2TU/nR22iZMsnOKRwlpmsXbc2/N6gCzsakhExUVUBzsZi3:/N3LQLhKr8wQ3alpigeRkhExxzsbVmn

Malware Config

Extracted

Family

redline

Botnet

boy

C2

77.73.134.241:4691

Attributes
  • auth_value

    a91fa8cc2cfaefc42a23c03faef44bd3

Extracted

Family

raccoon

Botnet

d8f44b07b06da3a90ad87ebc9249718c

C2

http://79.137.205.87/

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 4 IoCs
  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3172
    • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
      "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2124
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:4132
      • C:\Users\Admin\AppData\Roaming\1000006000\lego.exe
        "C:\Users\Admin\AppData\Roaming\1000006000\lego.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:4348
        • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
          "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:5096
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:1236
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:392
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:4952
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "rovwer.exe" /P "Admin:N"
                6⤵
                  PID:2340
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "rovwer.exe" /P "Admin:R" /E
                  6⤵
                    PID:1084
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:1956
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\99e342142d" /P "Admin:N"
                      6⤵
                        PID:4596
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\99e342142d" /P "Admin:R" /E
                        6⤵
                          PID:2164
                      • C:\Users\Admin\AppData\Local\Temp\1000038001\blockchainlzt_crypted.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000038001\blockchainlzt_crypted.exe"
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious use of WriteProcessMemory
                        PID:1464
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                          6⤵
                            PID:224
                        • C:\Users\Admin\AppData\Local\Temp\1000041001\2.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000041001\2.exe"
                          5⤵
                          • Executes dropped EXE
                          PID:3456
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                          5⤵
                          • Blocklisted process makes network request
                          • Loads dropped DLL
                          • Accesses Microsoft Outlook profiles
                          • Suspicious behavior: EnumeratesProcesses
                          • outlook_win_path
                          PID:4228
                    • C:\Users\Admin\AppData\Local\Temp\1000007001\mana.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000007001\mana.exe"
                      3⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3284
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll, Main
                      3⤵
                      • Blocklisted process makes network request
                      • Loads dropped DLL
                      • Accesses Microsoft Outlook profiles
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2268
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 1136
                    2⤵
                    • Program crash
                    PID:4084
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3172 -ip 3172
                  1⤵
                    PID:628
                  • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                    C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                    1⤵
                    • Executes dropped EXE
                    PID:4828
                  • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                    C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                    1⤵
                    • Executes dropped EXE
                    PID:1604

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Execution

                  Scheduled Task

                  1
                  T1053

                  Persistence

                  Registry Run Keys / Startup Folder

                  1
                  T1060

                  Scheduled Task

                  1
                  T1053

                  Privilege Escalation

                  Scheduled Task

                  1
                  T1053

                  Defense Evasion

                  Modify Registry

                  1
                  T1112

                  Credential Access

                  Credentials in Files

                  3
                  T1081

                  Discovery

                  Query Registry

                  2
                  T1012

                  System Information Discovery

                  2
                  T1082

                  Collection

                  Data from Local System

                  3
                  T1005

                  Email Collection

                  1
                  T1114

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\1000007001\mana.exe
                    Filesize

                    137KB

                    MD5

                    e63d74cec6926b2d04e474b889d08af4

                    SHA1

                    a64a888ccfb4e82ade71f1a00a7ae681d29c7bcb

                    SHA256

                    a9ffffff38aca59d7d2f041fbdb253ca612c7ba2d597782b2e6a59a914f49b33

                    SHA512

                    fd59c0a1c613611002e52a309ee4baad626df8fbbd8c0c230bcb8e6fed4a3059296ab11b88a1d25a0f54c65f730a027f876629298120f7b4c251bf6d2aaed148

                  • C:\Users\Admin\AppData\Local\Temp\1000007001\mana.exe
                    Filesize

                    137KB

                    MD5

                    e63d74cec6926b2d04e474b889d08af4

                    SHA1

                    a64a888ccfb4e82ade71f1a00a7ae681d29c7bcb

                    SHA256

                    a9ffffff38aca59d7d2f041fbdb253ca612c7ba2d597782b2e6a59a914f49b33

                    SHA512

                    fd59c0a1c613611002e52a309ee4baad626df8fbbd8c0c230bcb8e6fed4a3059296ab11b88a1d25a0f54c65f730a027f876629298120f7b4c251bf6d2aaed148

                  • C:\Users\Admin\AppData\Local\Temp\1000038001\blockchainlzt_crypted.exe
                    Filesize

                    2.7MB

                    MD5

                    e7f46144892fe5bdef99bdf819d1b9a6

                    SHA1

                    763ac1ea8c3de617457f64a8ce4eabe7ab8a3abb

                    SHA256

                    e252a54e441ea88aafa694259386afd002153481af25a5b7b2df46d17ac53fcc

                    SHA512

                    0165fe66620ef9c621b1f3b37e5ef69d636f4f6ec341011d9d6b45fdf9b634151937c139e928b8641183ff2f469844a1370a4ac0253d84ec81992cd9c67b963f

                  • C:\Users\Admin\AppData\Local\Temp\1000038001\blockchainlzt_crypted.exe
                    Filesize

                    2.7MB

                    MD5

                    e7f46144892fe5bdef99bdf819d1b9a6

                    SHA1

                    763ac1ea8c3de617457f64a8ce4eabe7ab8a3abb

                    SHA256

                    e252a54e441ea88aafa694259386afd002153481af25a5b7b2df46d17ac53fcc

                    SHA512

                    0165fe66620ef9c621b1f3b37e5ef69d636f4f6ec341011d9d6b45fdf9b634151937c139e928b8641183ff2f469844a1370a4ac0253d84ec81992cd9c67b963f

                  • C:\Users\Admin\AppData\Local\Temp\1000041001\2.exe
                    Filesize

                    57KB

                    MD5

                    5cef736542d8707af28a2927bb0a09c2

                    SHA1

                    415816c04d498480ef350db4d77651dc17791897

                    SHA256

                    c73eef378eb054a400fb8163dd3141feaffea91eeb6a1363a41e7e7a88222f53

                    SHA512

                    9cc502bbe2ffaadc7de2f2ac6aaaadbd1911de0ab6c02420c029041001aa3e649592b0b61e825eb9033147bb47424374181a341586b96128aa1307214a6a3f38

                  • C:\Users\Admin\AppData\Local\Temp\1000041001\2.exe
                    Filesize

                    57KB

                    MD5

                    5cef736542d8707af28a2927bb0a09c2

                    SHA1

                    415816c04d498480ef350db4d77651dc17791897

                    SHA256

                    c73eef378eb054a400fb8163dd3141feaffea91eeb6a1363a41e7e7a88222f53

                    SHA512

                    9cc502bbe2ffaadc7de2f2ac6aaaadbd1911de0ab6c02420c029041001aa3e649592b0b61e825eb9033147bb47424374181a341586b96128aa1307214a6a3f38

                  • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
                    Filesize

                    259KB

                    MD5

                    c6fbed69bf7f6a50dd27c2e4b5dc3607

                    SHA1

                    90e5b712608e74b31b7b99ce9b75465c401f47b6

                    SHA256

                    773123f439cd65d61c49f0593f74b94d223013d8d2341674e7ee8a514a5a156b

                    SHA512

                    ae455aaa304aa8e8f8bfd4459647f6e6e4875d16ffc80ac8233f5bdf1b763577bc34d6634e7e829ca20a0f2acc3fe216ce1ffec867c59465cf45d03d3424e336

                  • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
                    Filesize

                    259KB

                    MD5

                    c6fbed69bf7f6a50dd27c2e4b5dc3607

                    SHA1

                    90e5b712608e74b31b7b99ce9b75465c401f47b6

                    SHA256

                    773123f439cd65d61c49f0593f74b94d223013d8d2341674e7ee8a514a5a156b

                    SHA512

                    ae455aaa304aa8e8f8bfd4459647f6e6e4875d16ffc80ac8233f5bdf1b763577bc34d6634e7e829ca20a0f2acc3fe216ce1ffec867c59465cf45d03d3424e336

                  • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                    Filesize

                    241KB

                    MD5

                    b466f58861bb4069db99312de146a2e8

                    SHA1

                    295f06794b26ba5ac7c73fbf636c581624f897cd

                    SHA256

                    6cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420

                    SHA512

                    8693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d

                  • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                    Filesize

                    241KB

                    MD5

                    b466f58861bb4069db99312de146a2e8

                    SHA1

                    295f06794b26ba5ac7c73fbf636c581624f897cd

                    SHA256

                    6cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420

                    SHA512

                    8693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d

                  • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                    Filesize

                    241KB

                    MD5

                    b466f58861bb4069db99312de146a2e8

                    SHA1

                    295f06794b26ba5ac7c73fbf636c581624f897cd

                    SHA256

                    6cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420

                    SHA512

                    8693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d

                  • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                    Filesize

                    241KB

                    MD5

                    b466f58861bb4069db99312de146a2e8

                    SHA1

                    295f06794b26ba5ac7c73fbf636c581624f897cd

                    SHA256

                    6cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420

                    SHA512

                    8693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d

                  • C:\Users\Admin\AppData\Roaming\1000006000\lego.exe
                    Filesize

                    241KB

                    MD5

                    b466f58861bb4069db99312de146a2e8

                    SHA1

                    295f06794b26ba5ac7c73fbf636c581624f897cd

                    SHA256

                    6cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420

                    SHA512

                    8693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d

                  • C:\Users\Admin\AppData\Roaming\1000006000\lego.exe
                    Filesize

                    241KB

                    MD5

                    b466f58861bb4069db99312de146a2e8

                    SHA1

                    295f06794b26ba5ac7c73fbf636c581624f897cd

                    SHA256

                    6cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420

                    SHA512

                    8693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d

                  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                    Filesize

                    126KB

                    MD5

                    507e9dc7b9c42f535b6df96d79179835

                    SHA1

                    acf41fb549750023115f060071aa5ca8c33f249e

                    SHA256

                    3b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af

                    SHA512

                    70907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302

                  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                    Filesize

                    126KB

                    MD5

                    507e9dc7b9c42f535b6df96d79179835

                    SHA1

                    acf41fb549750023115f060071aa5ca8c33f249e

                    SHA256

                    3b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af

                    SHA512

                    70907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302

                  • C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll
                    Filesize

                    126KB

                    MD5

                    b8d80046e28849a320a3dcd868b73d7c

                    SHA1

                    f15bc4a4c5189e7aa845213469c6def5afd68186

                    SHA256

                    d23147a448d24f81d81d4bb226f3fc968386792c0987dda75917104b5ecd9d5a

                    SHA512

                    b7f6d59ee55d2b579c2185560d2e660c1952f9214f3db3096b1358af3559fd985859aa3389be333c826f35b85cd63c6f65a03e65a7ad57c7834bb09abd1d853e

                  • C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll
                    Filesize

                    126KB

                    MD5

                    b8d80046e28849a320a3dcd868b73d7c

                    SHA1

                    f15bc4a4c5189e7aa845213469c6def5afd68186

                    SHA256

                    d23147a448d24f81d81d4bb226f3fc968386792c0987dda75917104b5ecd9d5a

                    SHA512

                    b7f6d59ee55d2b579c2185560d2e660c1952f9214f3db3096b1358af3559fd985859aa3389be333c826f35b85cd63c6f65a03e65a7ad57c7834bb09abd1d853e

                  • memory/224-170-0x00000000005A0000-0x0000000000799000-memory.dmp
                    Filesize

                    2.0MB

                  • memory/224-158-0x0000000000000000-mapping.dmp
                  • memory/224-161-0x00000000005A0000-0x0000000000799000-memory.dmp
                    Filesize

                    2.0MB

                  • memory/224-160-0x00000000005A1000-0x0000000000684000-memory.dmp
                    Filesize

                    908KB

                  • memory/392-148-0x0000000000000000-mapping.dmp
                  • memory/1084-151-0x0000000000000000-mapping.dmp
                  • memory/1236-147-0x0000000000000000-mapping.dmp
                  • memory/1464-155-0x0000000000000000-mapping.dmp
                  • memory/1956-152-0x0000000000000000-mapping.dmp
                  • memory/2124-139-0x0000000000608000-0x0000000000627000-memory.dmp
                    Filesize

                    124KB

                  • memory/2124-140-0x0000000000400000-0x000000000059C000-memory.dmp
                    Filesize

                    1.6MB

                  • memory/2124-177-0x0000000000608000-0x0000000000627000-memory.dmp
                    Filesize

                    124KB

                  • memory/2124-132-0x0000000000000000-mapping.dmp
                  • memory/2124-178-0x0000000000400000-0x000000000059C000-memory.dmp
                    Filesize

                    1.6MB

                  • memory/2164-154-0x0000000000000000-mapping.dmp
                  • memory/2268-190-0x0000000000000000-mapping.dmp
                  • memory/2340-150-0x0000000000000000-mapping.dmp
                  • memory/3172-137-0x0000000000400000-0x000000000059C000-memory.dmp
                    Filesize

                    1.6MB

                  • memory/3172-135-0x0000000000609000-0x0000000000628000-memory.dmp
                    Filesize

                    124KB

                  • memory/3172-136-0x0000000000710000-0x000000000074E000-memory.dmp
                    Filesize

                    248KB

                  • memory/3284-173-0x00000000059A0000-0x0000000005FB8000-memory.dmp
                    Filesize

                    6.1MB

                  • memory/3284-186-0x0000000006620000-0x0000000006670000-memory.dmp
                    Filesize

                    320KB

                  • memory/3284-163-0x0000000000000000-mapping.dmp
                  • memory/3284-175-0x0000000005430000-0x0000000005442000-memory.dmp
                    Filesize

                    72KB

                  • memory/3284-174-0x0000000005500000-0x000000000560A000-memory.dmp
                    Filesize

                    1.0MB

                  • memory/3284-182-0x00000000058C0000-0x0000000005926000-memory.dmp
                    Filesize

                    408KB

                  • memory/3284-183-0x0000000006360000-0x00000000063F2000-memory.dmp
                    Filesize

                    584KB

                  • memory/3284-184-0x00000000069B0000-0x0000000006F54000-memory.dmp
                    Filesize

                    5.6MB

                  • memory/3284-185-0x00000000065A0000-0x0000000006616000-memory.dmp
                    Filesize

                    472KB

                  • memory/3284-176-0x0000000005490000-0x00000000054CC000-memory.dmp
                    Filesize

                    240KB

                  • memory/3284-187-0x0000000006F60000-0x0000000007122000-memory.dmp
                    Filesize

                    1.8MB

                  • memory/3284-188-0x0000000007660000-0x0000000007B8C000-memory.dmp
                    Filesize

                    5.2MB

                  • memory/3284-172-0x0000000000A80000-0x0000000000AA8000-memory.dmp
                    Filesize

                    160KB

                  • memory/3456-179-0x0000000000000000-mapping.dmp
                  • memory/4132-138-0x0000000000000000-mapping.dmp
                  • memory/4228-193-0x0000000000000000-mapping.dmp
                  • memory/4348-141-0x0000000000000000-mapping.dmp
                  • memory/4596-153-0x0000000000000000-mapping.dmp
                  • memory/4952-149-0x0000000000000000-mapping.dmp
                  • memory/5096-144-0x0000000000000000-mapping.dmp