Analysis

  • max time kernel
    100s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-11-2022 15:23

General

  • Target

    0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e.exe

  • Size

    346KB

  • MD5

    94cfb05ebec8347824c6a47b1f134cf1

  • SHA1

    be422dfc6d32411c8e28fb83c0d77eb28103dc9a

  • SHA256

    0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e

  • SHA512

    3b7ed9e8cebf8a32180906615d07ed97b16c47aebfd5a18e1778dacbbc8a0889ff0a4a826334e39654e13f6b565340e76dae313aacf1448f9539345a0cb8c130

  • SSDEEP

    6144:BkXvLzTOjlPdnarcQH4nu58vk3m7eQj25En2E1a:Bk/fTOj7arVmZd7fjeUv

Malware Config

Extracted

Family

raccoon

Botnet

dbffbdbc9786a5c270e6dd2d647e18ea

C2

http://79.137.205.87/

rc4.plain

Extracted

Family

redline

Botnet

boy

C2

77.73.134.241:4691

Attributes
  • auth_value

    a91fa8cc2cfaefc42a23c03faef44bd3

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 2 IoCs
  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 6 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e.exe
    "C:\Users\Admin\AppData\Local\Temp\0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3916
    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
      "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3948
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:4060
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4612
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          4⤵
            PID:2304
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "rovwer.exe" /P "Admin:N"
            4⤵
              PID:5052
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "rovwer.exe" /P "Admin:R" /E
              4⤵
                PID:4212
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                4⤵
                  PID:1192
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\99e342142d" /P "Admin:N"
                  4⤵
                    PID:4556
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\99e342142d" /P "Admin:R" /E
                    4⤵
                      PID:3360
                  • C:\Users\Admin\AppData\Roaming\1000075000\Crypted.exe
                    "C:\Users\Admin\AppData\Roaming\1000075000\Crypted.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of WriteProcessMemory
                    PID:5036
                    • C:\Users\Admin\AppData\Roaming\1000075000\Crypted.exe
                      "C:\Users\Admin\AppData\Roaming\1000075000\Crypted.exe"
                      4⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      PID:5056
                  • C:\Users\Admin\AppData\Local\Temp\1000082001\mana.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000082001\mana.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4856
                  • C:\Users\Admin\AppData\Local\Temp\1000085001\linda5.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000085001\linda5.exe"
                    3⤵
                    • Executes dropped EXE
                    • Checks computer location settings
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:1532
                    • C:\Windows\SysWOW64\control.exe
                      "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\3PDMV.Cpl",
                      4⤵
                      • Suspicious use of WriteProcessMemory
                      PID:548
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\3PDMV.Cpl",
                        5⤵
                        • Loads dropped DLL
                        • Suspicious use of WriteProcessMemory
                        PID:4488
                        • C:\Windows\system32\RunDll32.exe
                          C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\3PDMV.Cpl",
                          6⤵
                          • Suspicious use of WriteProcessMemory
                          PID:4836
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\3PDMV.Cpl",
                            7⤵
                            • Loads dropped DLL
                            PID:1708
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                    3⤵
                    • Blocklisted process makes network request
                    • Loads dropped DLL
                    • Accesses Microsoft Outlook profiles
                    • Suspicious behavior: EnumeratesProcesses
                    • outlook_win_path
                    PID:3772
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 1136
                  2⤵
                  • Program crash
                  PID:3380
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3916 -ip 3916
                1⤵
                  PID:3960
                • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                  C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                  1⤵
                  • Executes dropped EXE
                  PID:2240
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 428
                    2⤵
                    • Program crash
                    PID:3392
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2240 -ip 2240
                  1⤵
                    PID:3756
                  • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                    C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                    1⤵
                    • Executes dropped EXE
                    PID:2956
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 236
                      2⤵
                      • Program crash
                      PID:3600
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2956 -ip 2956
                    1⤵
                      PID:4628

                    Network

                    MITRE ATT&CK Matrix ATT&CK v6

                    Execution

                    Scheduled Task

                    1
                    T1053

                    Persistence

                    Registry Run Keys / Startup Folder

                    1
                    T1060

                    Scheduled Task

                    1
                    T1053

                    Privilege Escalation

                    Scheduled Task

                    1
                    T1053

                    Defense Evasion

                    Modify Registry

                    1
                    T1112

                    Credential Access

                    Credentials in Files

                    3
                    T1081

                    Discovery

                    Query Registry

                    2
                    T1012

                    System Information Discovery

                    2
                    T1082

                    Collection

                    Data from Local System

                    3
                    T1005

                    Email Collection

                    1
                    T1114

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\LocalLow\mozglue.dll
                      Filesize

                      612KB

                      MD5

                      f07d9977430e762b563eaadc2b94bbfa

                      SHA1

                      da0a05b2b8d269fb73558dfcf0ed5c167f6d3877

                      SHA256

                      4191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862

                      SHA512

                      6afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf

                    • C:\Users\Admin\AppData\LocalLow\nss3.dll
                      Filesize

                      1.9MB

                      MD5

                      f67d08e8c02574cbc2f1122c53bfb976

                      SHA1

                      6522992957e7e4d074947cad63189f308a80fcf2

                      SHA256

                      c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e

                      SHA512

                      2e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5

                    • C:\Users\Admin\AppData\LocalLow\sqlite3.dll
                      Filesize

                      1.0MB

                      MD5

                      dbf4f8dcefb8056dc6bae4b67ff810ce

                      SHA1

                      bbac1dd8a07c6069415c04b62747d794736d0689

                      SHA256

                      47b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68

                      SHA512

                      b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1

                    • C:\Users\Admin\AppData\Local\Temp\1000082001\mana.exe
                      Filesize

                      137KB

                      MD5

                      e63d74cec6926b2d04e474b889d08af4

                      SHA1

                      a64a888ccfb4e82ade71f1a00a7ae681d29c7bcb

                      SHA256

                      a9ffffff38aca59d7d2f041fbdb253ca612c7ba2d597782b2e6a59a914f49b33

                      SHA512

                      fd59c0a1c613611002e52a309ee4baad626df8fbbd8c0c230bcb8e6fed4a3059296ab11b88a1d25a0f54c65f730a027f876629298120f7b4c251bf6d2aaed148

                    • C:\Users\Admin\AppData\Local\Temp\1000082001\mana.exe
                      Filesize

                      137KB

                      MD5

                      e63d74cec6926b2d04e474b889d08af4

                      SHA1

                      a64a888ccfb4e82ade71f1a00a7ae681d29c7bcb

                      SHA256

                      a9ffffff38aca59d7d2f041fbdb253ca612c7ba2d597782b2e6a59a914f49b33

                      SHA512

                      fd59c0a1c613611002e52a309ee4baad626df8fbbd8c0c230bcb8e6fed4a3059296ab11b88a1d25a0f54c65f730a027f876629298120f7b4c251bf6d2aaed148

                    • C:\Users\Admin\AppData\Local\Temp\1000085001\linda5.exe
                      Filesize

                      1.8MB

                      MD5

                      bb9de5ac6b7bb827869309712592584d

                      SHA1

                      7b0452e986a8924c89e33434fa1dec79972befcf

                      SHA256

                      efabc240d07c61524416ea3d1458998ffbeb238a3ef4bfae6d4089a9d92f6051

                      SHA512

                      06863e9a7c10f7948e9439d0dbb1db6a2498d550c307a8b050a00fc4f938303c2d996504852e3c25bf606997703ce5ba0930bdd1df3977dfe8878c00575b8208

                    • C:\Users\Admin\AppData\Local\Temp\1000085001\linda5.exe
                      Filesize

                      1.8MB

                      MD5

                      bb9de5ac6b7bb827869309712592584d

                      SHA1

                      7b0452e986a8924c89e33434fa1dec79972befcf

                      SHA256

                      efabc240d07c61524416ea3d1458998ffbeb238a3ef4bfae6d4089a9d92f6051

                      SHA512

                      06863e9a7c10f7948e9439d0dbb1db6a2498d550c307a8b050a00fc4f938303c2d996504852e3c25bf606997703ce5ba0930bdd1df3977dfe8878c00575b8208

                    • C:\Users\Admin\AppData\Local\Temp\3PDMV.Cpl
                      Filesize

                      2.1MB

                      MD5

                      1310beb87e4be056010f860a9c6adbac

                      SHA1

                      faea733366b0f22cb1c55317110ff998b6bcf399

                      SHA256

                      7894db6ae6d787b40099076aa6698e7b40b7aeee360b1eae71ac3b40ed299589

                      SHA512

                      129d4e1684b4adc8ace9097d6bd10a141285a90d61c3bb91b90b993714d1024dea28b195b0f1377ed8384d6f8d2f37cef86e5e4f232793d6f879c1a654b52cff

                    • C:\Users\Admin\AppData\Local\Temp\3PDMV.cpl
                      Filesize

                      2.1MB

                      MD5

                      1310beb87e4be056010f860a9c6adbac

                      SHA1

                      faea733366b0f22cb1c55317110ff998b6bcf399

                      SHA256

                      7894db6ae6d787b40099076aa6698e7b40b7aeee360b1eae71ac3b40ed299589

                      SHA512

                      129d4e1684b4adc8ace9097d6bd10a141285a90d61c3bb91b90b993714d1024dea28b195b0f1377ed8384d6f8d2f37cef86e5e4f232793d6f879c1a654b52cff

                    • C:\Users\Admin\AppData\Local\Temp\3PDMV.cpl
                      Filesize

                      2.1MB

                      MD5

                      1310beb87e4be056010f860a9c6adbac

                      SHA1

                      faea733366b0f22cb1c55317110ff998b6bcf399

                      SHA256

                      7894db6ae6d787b40099076aa6698e7b40b7aeee360b1eae71ac3b40ed299589

                      SHA512

                      129d4e1684b4adc8ace9097d6bd10a141285a90d61c3bb91b90b993714d1024dea28b195b0f1377ed8384d6f8d2f37cef86e5e4f232793d6f879c1a654b52cff

                    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                      Filesize

                      346KB

                      MD5

                      94cfb05ebec8347824c6a47b1f134cf1

                      SHA1

                      be422dfc6d32411c8e28fb83c0d77eb28103dc9a

                      SHA256

                      0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e

                      SHA512

                      3b7ed9e8cebf8a32180906615d07ed97b16c47aebfd5a18e1778dacbbc8a0889ff0a4a826334e39654e13f6b565340e76dae313aacf1448f9539345a0cb8c130

                    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                      Filesize

                      346KB

                      MD5

                      94cfb05ebec8347824c6a47b1f134cf1

                      SHA1

                      be422dfc6d32411c8e28fb83c0d77eb28103dc9a

                      SHA256

                      0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e

                      SHA512

                      3b7ed9e8cebf8a32180906615d07ed97b16c47aebfd5a18e1778dacbbc8a0889ff0a4a826334e39654e13f6b565340e76dae313aacf1448f9539345a0cb8c130

                    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                      Filesize

                      346KB

                      MD5

                      94cfb05ebec8347824c6a47b1f134cf1

                      SHA1

                      be422dfc6d32411c8e28fb83c0d77eb28103dc9a

                      SHA256

                      0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e

                      SHA512

                      3b7ed9e8cebf8a32180906615d07ed97b16c47aebfd5a18e1778dacbbc8a0889ff0a4a826334e39654e13f6b565340e76dae313aacf1448f9539345a0cb8c130

                    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                      Filesize

                      346KB

                      MD5

                      94cfb05ebec8347824c6a47b1f134cf1

                      SHA1

                      be422dfc6d32411c8e28fb83c0d77eb28103dc9a

                      SHA256

                      0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e

                      SHA512

                      3b7ed9e8cebf8a32180906615d07ed97b16c47aebfd5a18e1778dacbbc8a0889ff0a4a826334e39654e13f6b565340e76dae313aacf1448f9539345a0cb8c130

                    • C:\Users\Admin\AppData\Roaming\1000075000\Crypted.exe
                      Filesize

                      976KB

                      MD5

                      ac039cca27fd7d9b40dea205b4527a79

                      SHA1

                      d36779a4613a108ffa5bc1e1e0fa80ba4b6f9130

                      SHA256

                      8afe2857096c348a787abff7ba7739fdb8f4c82bf0fae6c14a80204e69df1788

                      SHA512

                      6f8cf94d4df8b15300444622dea0537270062e3d64ee505b3ea4e51b492c9610495c0bf3ae9ece5d0b300265cc81123f4750c4ee98e55b5db38618857f3cb6de

                    • C:\Users\Admin\AppData\Roaming\1000075000\Crypted.exe
                      Filesize

                      976KB

                      MD5

                      ac039cca27fd7d9b40dea205b4527a79

                      SHA1

                      d36779a4613a108ffa5bc1e1e0fa80ba4b6f9130

                      SHA256

                      8afe2857096c348a787abff7ba7739fdb8f4c82bf0fae6c14a80204e69df1788

                      SHA512

                      6f8cf94d4df8b15300444622dea0537270062e3d64ee505b3ea4e51b492c9610495c0bf3ae9ece5d0b300265cc81123f4750c4ee98e55b5db38618857f3cb6de

                    • C:\Users\Admin\AppData\Roaming\1000075000\Crypted.exe
                      Filesize

                      976KB

                      MD5

                      ac039cca27fd7d9b40dea205b4527a79

                      SHA1

                      d36779a4613a108ffa5bc1e1e0fa80ba4b6f9130

                      SHA256

                      8afe2857096c348a787abff7ba7739fdb8f4c82bf0fae6c14a80204e69df1788

                      SHA512

                      6f8cf94d4df8b15300444622dea0537270062e3d64ee505b3ea4e51b492c9610495c0bf3ae9ece5d0b300265cc81123f4750c4ee98e55b5db38618857f3cb6de

                    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                      Filesize

                      126KB

                      MD5

                      507e9dc7b9c42f535b6df96d79179835

                      SHA1

                      acf41fb549750023115f060071aa5ca8c33f249e

                      SHA256

                      3b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af

                      SHA512

                      70907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302

                    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                      Filesize

                      126KB

                      MD5

                      507e9dc7b9c42f535b6df96d79179835

                      SHA1

                      acf41fb549750023115f060071aa5ca8c33f249e

                      SHA256

                      3b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af

                      SHA512

                      70907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302

                    • memory/548-174-0x0000000000000000-mapping.dmp
                    • memory/1192-143-0x0000000000000000-mapping.dmp
                    • memory/1532-171-0x0000000000000000-mapping.dmp
                    • memory/1708-206-0x0000000003540000-0x0000000003665000-memory.dmp
                      Filesize

                      1.1MB

                    • memory/1708-203-0x0000000003670000-0x0000000003722000-memory.dmp
                      Filesize

                      712KB

                    • memory/1708-195-0x0000000003540000-0x0000000003665000-memory.dmp
                      Filesize

                      1.1MB

                    • memory/1708-194-0x0000000003280000-0x000000000340D000-memory.dmp
                      Filesize

                      1.6MB

                    • memory/1708-192-0x0000000000000000-mapping.dmp
                    • memory/1708-202-0x0000000002EF0000-0x0000000002FB7000-memory.dmp
                      Filesize

                      796KB

                    • memory/2240-197-0x0000000000884000-0x00000000008A2000-memory.dmp
                      Filesize

                      120KB

                    • memory/2240-198-0x0000000000400000-0x0000000000859000-memory.dmp
                      Filesize

                      4.3MB

                    • memory/2304-140-0x0000000000000000-mapping.dmp
                    • memory/2956-209-0x0000000000A74000-0x0000000000A92000-memory.dmp
                      Filesize

                      120KB

                    • memory/2956-210-0x0000000000400000-0x0000000000859000-memory.dmp
                      Filesize

                      4.3MB

                    • memory/3360-145-0x0000000000000000-mapping.dmp
                    • memory/3772-199-0x0000000000000000-mapping.dmp
                    • memory/3916-137-0x0000000000400000-0x0000000000859000-memory.dmp
                      Filesize

                      4.3MB

                    • memory/3916-136-0x00000000009C0000-0x00000000009FE000-memory.dmp
                      Filesize

                      248KB

                    • memory/3916-135-0x0000000000A32000-0x0000000000A51000-memory.dmp
                      Filesize

                      124KB

                    • memory/3948-170-0x0000000000400000-0x0000000000859000-memory.dmp
                      Filesize

                      4.3MB

                    • memory/3948-169-0x0000000000A43000-0x0000000000A62000-memory.dmp
                      Filesize

                      124KB

                    • memory/3948-132-0x0000000000000000-mapping.dmp
                    • memory/3948-147-0x0000000000400000-0x0000000000859000-memory.dmp
                      Filesize

                      4.3MB

                    • memory/3948-146-0x0000000000A43000-0x0000000000A62000-memory.dmp
                      Filesize

                      124KB

                    • memory/4060-138-0x0000000000000000-mapping.dmp
                    • memory/4212-142-0x0000000000000000-mapping.dmp
                    • memory/4488-175-0x0000000000000000-mapping.dmp
                    • memory/4488-178-0x0000000003180000-0x000000000330D000-memory.dmp
                      Filesize

                      1.6MB

                    • memory/4488-179-0x0000000003440000-0x0000000003565000-memory.dmp
                      Filesize

                      1.1MB

                    • memory/4488-207-0x0000000003440000-0x0000000003565000-memory.dmp
                      Filesize

                      1.1MB

                    • memory/4488-187-0x0000000003570000-0x0000000003637000-memory.dmp
                      Filesize

                      796KB

                    • memory/4488-188-0x0000000003640000-0x00000000036F2000-memory.dmp
                      Filesize

                      712KB

                    • memory/4556-144-0x0000000000000000-mapping.dmp
                    • memory/4612-139-0x0000000000000000-mapping.dmp
                    • memory/4836-191-0x0000000000000000-mapping.dmp
                    • memory/4856-180-0x0000000005B70000-0x0000000006114000-memory.dmp
                      Filesize

                      5.6MB

                    • memory/4856-182-0x0000000004E90000-0x0000000004EF6000-memory.dmp
                      Filesize

                      408KB

                    • memory/4856-185-0x0000000007440000-0x00000000074B6000-memory.dmp
                      Filesize

                      472KB

                    • memory/4856-164-0x0000000004FA0000-0x00000000055B8000-memory.dmp
                      Filesize

                      6.1MB

                    • memory/4856-163-0x0000000000030000-0x0000000000058000-memory.dmp
                      Filesize

                      160KB

                    • memory/4856-160-0x0000000000000000-mapping.dmp
                    • memory/4856-167-0x0000000004A40000-0x0000000004A7C000-memory.dmp
                      Filesize

                      240KB

                    • memory/4856-166-0x00000000049E0000-0x00000000049F2000-memory.dmp
                      Filesize

                      72KB

                    • memory/4856-165-0x0000000004AB0000-0x0000000004BBA000-memory.dmp
                      Filesize

                      1.0MB

                    • memory/4856-181-0x00000000055C0000-0x0000000005652000-memory.dmp
                      Filesize

                      584KB

                    • memory/4856-186-0x00000000074C0000-0x0000000007510000-memory.dmp
                      Filesize

                      320KB

                    • memory/4856-184-0x0000000007C50000-0x000000000817C000-memory.dmp
                      Filesize

                      5.2MB

                    • memory/4856-183-0x0000000007550000-0x0000000007712000-memory.dmp
                      Filesize

                      1.8MB

                    • memory/5036-148-0x0000000000000000-mapping.dmp
                    • memory/5052-141-0x0000000000000000-mapping.dmp
                    • memory/5056-151-0x0000000000000000-mapping.dmp
                    • memory/5056-152-0x0000000000400000-0x0000000000412000-memory.dmp
                      Filesize

                      72KB

                    • memory/5056-155-0x0000000000400000-0x0000000000412000-memory.dmp
                      Filesize

                      72KB

                    • memory/5056-156-0x0000000000400000-0x0000000000412000-memory.dmp
                      Filesize

                      72KB

                    • memory/5056-168-0x0000000000400000-0x0000000000412000-memory.dmp
                      Filesize

                      72KB