Analysis

  • max time kernel
    105s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-11-2022 16:20

General

  • Target

    dcaf57e3527a5f374f1e4ae9dd5056e74eea93de0c5f5410fd94f5d7e360d3c7.exe

  • Size

    346KB

  • MD5

    853a33c939d6d3640c395dbbc74cfc77

  • SHA1

    49b47939545209d9edcbaf89f7474b028f2d5c39

  • SHA256

    dcaf57e3527a5f374f1e4ae9dd5056e74eea93de0c5f5410fd94f5d7e360d3c7

  • SHA512

    3a2e54b0d26dae78a0a043852cdfca7be42e0783f13545b32d02b395655d823af980828f9c7aaa7212c0dd294e2c533f53d71f542477759cb26b53475cdf64b5

  • SSDEEP

    6144:X5dxLRlOFuYRD6DTLUl5CtWCkGEn2E1a:X571lOFU0jFGUv

Malware Config

Extracted

Family

redline

Botnet

boy

C2

77.73.134.241:4691

Attributes
  • auth_value

    a91fa8cc2cfaefc42a23c03faef44bd3

Extracted

Family

redline

Botnet

@REDLINEVIP Cloud (TG: @FATHEROFCARDERS)

C2

151.80.89.233:13553

Attributes
  • auth_value

    fbee175162920530e6bf470c8003fa1a

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 4 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 6 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcaf57e3527a5f374f1e4ae9dd5056e74eea93de0c5f5410fd94f5d7e360d3c7.exe
    "C:\Users\Admin\AppData\Local\Temp\dcaf57e3527a5f374f1e4ae9dd5056e74eea93de0c5f5410fd94f5d7e360d3c7.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:676
    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
      "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:548
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2112
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          4⤵
            PID:1468
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "rovwer.exe" /P "Admin:N"
            4⤵
              PID:3440
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "rovwer.exe" /P "Admin:R" /E
              4⤵
                PID:176
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                4⤵
                  PID:220
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\99e342142d" /P "Admin:N"
                  4⤵
                    PID:224
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\99e342142d" /P "Admin:R" /E
                    4⤵
                      PID:796
                  • C:\Users\Admin\AppData\Roaming\1000067000\45676.exe
                    "C:\Users\Admin\AppData\Roaming\1000067000\45676.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:4016
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Roaming\1000067000\45676.exe
                      4⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2044
                      • C:\Windows\system32\choice.exe
                        choice /C Y /N /D Y /T 0
                        5⤵
                          PID:3648
                    • C:\Users\Admin\AppData\Local\Temp\1000082001\mana.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000082001\mana.exe"
                      3⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3724
                    • C:\Users\Admin\AppData\Local\Temp\1000085001\linda5.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000085001\linda5.exe"
                      3⤵
                      • Executes dropped EXE
                      • Checks computer location settings
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:1136
                      • C:\Windows\SysWOW64\control.exe
                        "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\K8fL.cpL",
                        4⤵
                        • Suspicious use of WriteProcessMemory
                        PID:4472
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\K8fL.cpL",
                          5⤵
                          • Loads dropped DLL
                          • Suspicious use of WriteProcessMemory
                          PID:380
                          • C:\Windows\system32\RunDll32.exe
                            C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\K8fL.cpL",
                            6⤵
                            • Suspicious use of WriteProcessMemory
                            PID:3224
                            • C:\Windows\SysWOW64\rundll32.exe
                              "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\K8fL.cpL",
                              7⤵
                              • Loads dropped DLL
                              PID:4316
                    • C:\Users\Admin\AppData\Local\Temp\1000086001\40K.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000086001\40K.exe"
                      3⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3216
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                      3⤵
                      • Blocklisted process makes network request
                      • Loads dropped DLL
                      • Accesses Microsoft Outlook profiles
                      • Suspicious behavior: EnumeratesProcesses
                      • outlook_win_path
                      PID:4332
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 676 -s 1252
                    2⤵
                    • Program crash
                    PID:2740
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 676 -ip 676
                  1⤵
                    PID:1448
                  • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                    C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                    1⤵
                    • Executes dropped EXE
                    PID:1120
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 420
                      2⤵
                      • Program crash
                      PID:2132
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1120 -ip 1120
                    1⤵
                      PID:5076
                    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                      C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                      1⤵
                      • Executes dropped EXE
                      PID:4284
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 428
                        2⤵
                        • Program crash
                        PID:3804
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4284 -ip 4284
                      1⤵
                        PID:1108

                      Network

                      MITRE ATT&CK Matrix ATT&CK v6

                      Execution

                      Scheduled Task

                      1
                      T1053

                      Persistence

                      Registry Run Keys / Startup Folder

                      1
                      T1060

                      Scheduled Task

                      1
                      T1053

                      Privilege Escalation

                      Scheduled Task

                      1
                      T1053

                      Defense Evasion

                      Modify Registry

                      1
                      T1112

                      Credential Access

                      Credentials in Files

                      3
                      T1081

                      Discovery

                      Query Registry

                      2
                      T1012

                      System Information Discovery

                      2
                      T1082

                      Collection

                      Data from Local System

                      3
                      T1005

                      Email Collection

                      1
                      T1114

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\1000082001\mana.exe
                        Filesize

                        137KB

                        MD5

                        e63d74cec6926b2d04e474b889d08af4

                        SHA1

                        a64a888ccfb4e82ade71f1a00a7ae681d29c7bcb

                        SHA256

                        a9ffffff38aca59d7d2f041fbdb253ca612c7ba2d597782b2e6a59a914f49b33

                        SHA512

                        fd59c0a1c613611002e52a309ee4baad626df8fbbd8c0c230bcb8e6fed4a3059296ab11b88a1d25a0f54c65f730a027f876629298120f7b4c251bf6d2aaed148

                      • C:\Users\Admin\AppData\Local\Temp\1000082001\mana.exe
                        Filesize

                        137KB

                        MD5

                        e63d74cec6926b2d04e474b889d08af4

                        SHA1

                        a64a888ccfb4e82ade71f1a00a7ae681d29c7bcb

                        SHA256

                        a9ffffff38aca59d7d2f041fbdb253ca612c7ba2d597782b2e6a59a914f49b33

                        SHA512

                        fd59c0a1c613611002e52a309ee4baad626df8fbbd8c0c230bcb8e6fed4a3059296ab11b88a1d25a0f54c65f730a027f876629298120f7b4c251bf6d2aaed148

                      • C:\Users\Admin\AppData\Local\Temp\1000085001\linda5.exe
                        Filesize

                        1.8MB

                        MD5

                        271edc2204d169adfab73c50feaa124b

                        SHA1

                        ca2a0391fe5044e1050e4a99512d6abaa27071d4

                        SHA256

                        b946b647386e3d596d18dcd6b0ad5cd15071301c751304fa37c96e242d2b3593

                        SHA512

                        fe089f62b3c225a6c6095ed646ed1cf7f12cc3f0fd25e8293ee8d1cb15be1c5be73faf467604827f71f8303138fdaa19dc6e41cd2268c255269581c8477fd4be

                      • C:\Users\Admin\AppData\Local\Temp\1000085001\linda5.exe
                        Filesize

                        1.8MB

                        MD5

                        271edc2204d169adfab73c50feaa124b

                        SHA1

                        ca2a0391fe5044e1050e4a99512d6abaa27071d4

                        SHA256

                        b946b647386e3d596d18dcd6b0ad5cd15071301c751304fa37c96e242d2b3593

                        SHA512

                        fe089f62b3c225a6c6095ed646ed1cf7f12cc3f0fd25e8293ee8d1cb15be1c5be73faf467604827f71f8303138fdaa19dc6e41cd2268c255269581c8477fd4be

                      • C:\Users\Admin\AppData\Local\Temp\1000086001\40K.exe
                        Filesize

                        137KB

                        MD5

                        87ef06885fd221a86bba9e5b86a7ea7d

                        SHA1

                        6644db86f2d557167f442a5fe72a82de3fe943ba

                        SHA256

                        ab5026bf6fe5d692faaf86752b4c9fa226ec49ba54cfb625579287b498eab20f

                        SHA512

                        c65b38856d4995b01454754044ae7373363a02b8e228c249fee3c1c2222f2348473f0bba5a5f2e4a280cd183e57dc13423bb09f86919ccb8968c8229310c5ad0

                      • C:\Users\Admin\AppData\Local\Temp\1000086001\40K.exe
                        Filesize

                        137KB

                        MD5

                        87ef06885fd221a86bba9e5b86a7ea7d

                        SHA1

                        6644db86f2d557167f442a5fe72a82de3fe943ba

                        SHA256

                        ab5026bf6fe5d692faaf86752b4c9fa226ec49ba54cfb625579287b498eab20f

                        SHA512

                        c65b38856d4995b01454754044ae7373363a02b8e228c249fee3c1c2222f2348473f0bba5a5f2e4a280cd183e57dc13423bb09f86919ccb8968c8229310c5ad0

                      • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                        Filesize

                        346KB

                        MD5

                        853a33c939d6d3640c395dbbc74cfc77

                        SHA1

                        49b47939545209d9edcbaf89f7474b028f2d5c39

                        SHA256

                        dcaf57e3527a5f374f1e4ae9dd5056e74eea93de0c5f5410fd94f5d7e360d3c7

                        SHA512

                        3a2e54b0d26dae78a0a043852cdfca7be42e0783f13545b32d02b395655d823af980828f9c7aaa7212c0dd294e2c533f53d71f542477759cb26b53475cdf64b5

                      • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                        Filesize

                        346KB

                        MD5

                        853a33c939d6d3640c395dbbc74cfc77

                        SHA1

                        49b47939545209d9edcbaf89f7474b028f2d5c39

                        SHA256

                        dcaf57e3527a5f374f1e4ae9dd5056e74eea93de0c5f5410fd94f5d7e360d3c7

                        SHA512

                        3a2e54b0d26dae78a0a043852cdfca7be42e0783f13545b32d02b395655d823af980828f9c7aaa7212c0dd294e2c533f53d71f542477759cb26b53475cdf64b5

                      • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                        Filesize

                        346KB

                        MD5

                        853a33c939d6d3640c395dbbc74cfc77

                        SHA1

                        49b47939545209d9edcbaf89f7474b028f2d5c39

                        SHA256

                        dcaf57e3527a5f374f1e4ae9dd5056e74eea93de0c5f5410fd94f5d7e360d3c7

                        SHA512

                        3a2e54b0d26dae78a0a043852cdfca7be42e0783f13545b32d02b395655d823af980828f9c7aaa7212c0dd294e2c533f53d71f542477759cb26b53475cdf64b5

                      • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                        Filesize

                        346KB

                        MD5

                        853a33c939d6d3640c395dbbc74cfc77

                        SHA1

                        49b47939545209d9edcbaf89f7474b028f2d5c39

                        SHA256

                        dcaf57e3527a5f374f1e4ae9dd5056e74eea93de0c5f5410fd94f5d7e360d3c7

                        SHA512

                        3a2e54b0d26dae78a0a043852cdfca7be42e0783f13545b32d02b395655d823af980828f9c7aaa7212c0dd294e2c533f53d71f542477759cb26b53475cdf64b5

                      • C:\Users\Admin\AppData\Local\Temp\K8fL.cpL
                        Filesize

                        2.1MB

                        MD5

                        1310beb87e4be056010f860a9c6adbac

                        SHA1

                        faea733366b0f22cb1c55317110ff998b6bcf399

                        SHA256

                        7894db6ae6d787b40099076aa6698e7b40b7aeee360b1eae71ac3b40ed299589

                        SHA512

                        129d4e1684b4adc8ace9097d6bd10a141285a90d61c3bb91b90b993714d1024dea28b195b0f1377ed8384d6f8d2f37cef86e5e4f232793d6f879c1a654b52cff

                      • C:\Users\Admin\AppData\Local\Temp\k8fL.cpl
                        Filesize

                        2.1MB

                        MD5

                        1310beb87e4be056010f860a9c6adbac

                        SHA1

                        faea733366b0f22cb1c55317110ff998b6bcf399

                        SHA256

                        7894db6ae6d787b40099076aa6698e7b40b7aeee360b1eae71ac3b40ed299589

                        SHA512

                        129d4e1684b4adc8ace9097d6bd10a141285a90d61c3bb91b90b993714d1024dea28b195b0f1377ed8384d6f8d2f37cef86e5e4f232793d6f879c1a654b52cff

                      • C:\Users\Admin\AppData\Local\Temp\k8fL.cpl
                        Filesize

                        2.1MB

                        MD5

                        1310beb87e4be056010f860a9c6adbac

                        SHA1

                        faea733366b0f22cb1c55317110ff998b6bcf399

                        SHA256

                        7894db6ae6d787b40099076aa6698e7b40b7aeee360b1eae71ac3b40ed299589

                        SHA512

                        129d4e1684b4adc8ace9097d6bd10a141285a90d61c3bb91b90b993714d1024dea28b195b0f1377ed8384d6f8d2f37cef86e5e4f232793d6f879c1a654b52cff

                      • C:\Users\Admin\AppData\Local\Temp\k8fL.cpl
                        Filesize

                        2.1MB

                        MD5

                        1310beb87e4be056010f860a9c6adbac

                        SHA1

                        faea733366b0f22cb1c55317110ff998b6bcf399

                        SHA256

                        7894db6ae6d787b40099076aa6698e7b40b7aeee360b1eae71ac3b40ed299589

                        SHA512

                        129d4e1684b4adc8ace9097d6bd10a141285a90d61c3bb91b90b993714d1024dea28b195b0f1377ed8384d6f8d2f37cef86e5e4f232793d6f879c1a654b52cff

                      • C:\Users\Admin\AppData\Local\Temp\k8fL.cpl
                        Filesize

                        2.1MB

                        MD5

                        1310beb87e4be056010f860a9c6adbac

                        SHA1

                        faea733366b0f22cb1c55317110ff998b6bcf399

                        SHA256

                        7894db6ae6d787b40099076aa6698e7b40b7aeee360b1eae71ac3b40ed299589

                        SHA512

                        129d4e1684b4adc8ace9097d6bd10a141285a90d61c3bb91b90b993714d1024dea28b195b0f1377ed8384d6f8d2f37cef86e5e4f232793d6f879c1a654b52cff

                      • C:\Users\Admin\AppData\Roaming\1000067000\45676.exe
                        Filesize

                        4.3MB

                        MD5

                        30be8d7ef914a7baf9a3796cb892aa02

                        SHA1

                        ee79a60ddf9f578404e697564e694fe5d09706d9

                        SHA256

                        a2385d07f033b36d08d4ceb976820d2db8ca7b29339cb72ff3f74a4a90806c54

                        SHA512

                        985c3a3c404c590403cd0c46f88b912bb9d4994ae0f7c921176a1b3180d8f96e3be86f74e1cc672a6598fc6ccbbce6ece5e8567635f594f173bce8f968cf56f9

                      • C:\Users\Admin\AppData\Roaming\1000067000\45676.exe
                        Filesize

                        4.3MB

                        MD5

                        30be8d7ef914a7baf9a3796cb892aa02

                        SHA1

                        ee79a60ddf9f578404e697564e694fe5d09706d9

                        SHA256

                        a2385d07f033b36d08d4ceb976820d2db8ca7b29339cb72ff3f74a4a90806c54

                        SHA512

                        985c3a3c404c590403cd0c46f88b912bb9d4994ae0f7c921176a1b3180d8f96e3be86f74e1cc672a6598fc6ccbbce6ece5e8567635f594f173bce8f968cf56f9

                      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                        Filesize

                        126KB

                        MD5

                        507e9dc7b9c42f535b6df96d79179835

                        SHA1

                        acf41fb549750023115f060071aa5ca8c33f249e

                        SHA256

                        3b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af

                        SHA512

                        70907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302

                      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                        Filesize

                        126KB

                        MD5

                        507e9dc7b9c42f535b6df96d79179835

                        SHA1

                        acf41fb549750023115f060071aa5ca8c33f249e

                        SHA256

                        3b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af

                        SHA512

                        70907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302

                      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                        Filesize

                        126KB

                        MD5

                        507e9dc7b9c42f535b6df96d79179835

                        SHA1

                        acf41fb549750023115f060071aa5ca8c33f249e

                        SHA256

                        3b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af

                        SHA512

                        70907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302

                      • memory/176-144-0x0000000000000000-mapping.dmp
                      • memory/220-145-0x0000000000000000-mapping.dmp
                      • memory/224-146-0x0000000000000000-mapping.dmp
                      • memory/380-171-0x0000000000000000-mapping.dmp
                      • memory/380-182-0x0000000002FF0000-0x0000000003115000-memory.dmp
                        Filesize

                        1.1MB

                      • memory/380-200-0x0000000002FF0000-0x0000000003115000-memory.dmp
                        Filesize

                        1.1MB

                      • memory/380-175-0x00000000027D0000-0x00000000029F4000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/380-181-0x0000000002D30000-0x0000000002EBD000-memory.dmp
                        Filesize

                        1.6MB

                      • memory/380-190-0x0000000003120000-0x00000000031D2000-memory.dmp
                        Filesize

                        712KB

                      • memory/380-189-0x0000000002390000-0x0000000002457000-memory.dmp
                        Filesize

                        796KB

                      • memory/548-140-0x0000000000000000-mapping.dmp
                      • memory/676-139-0x0000000000400000-0x0000000000859000-memory.dmp
                        Filesize

                        4.3MB

                      • memory/676-138-0x0000000000902000-0x0000000000921000-memory.dmp
                        Filesize

                        124KB

                      • memory/676-134-0x0000000000400000-0x0000000000859000-memory.dmp
                        Filesize

                        4.3MB

                      • memory/676-132-0x0000000000902000-0x0000000000921000-memory.dmp
                        Filesize

                        124KB

                      • memory/676-133-0x0000000000B00000-0x0000000000B3E000-memory.dmp
                        Filesize

                        248KB

                      • memory/796-147-0x0000000000000000-mapping.dmp
                      • memory/1120-202-0x0000000000B34000-0x0000000000B53000-memory.dmp
                        Filesize

                        124KB

                      • memory/1120-203-0x0000000000400000-0x0000000000859000-memory.dmp
                        Filesize

                        4.3MB

                      • memory/1136-166-0x0000000000000000-mapping.dmp
                      • memory/1468-142-0x0000000000000000-mapping.dmp
                      • memory/2032-149-0x0000000000400000-0x0000000000859000-memory.dmp
                        Filesize

                        4.3MB

                      • memory/2032-148-0x0000000000B93000-0x0000000000BB2000-memory.dmp
                        Filesize

                        124KB

                      • memory/2032-165-0x0000000000400000-0x0000000000859000-memory.dmp
                        Filesize

                        4.3MB

                      • memory/2032-164-0x0000000000B93000-0x0000000000BB2000-memory.dmp
                        Filesize

                        124KB

                      • memory/2032-135-0x0000000000000000-mapping.dmp
                      • memory/2044-153-0x0000000000000000-mapping.dmp
                      • memory/2112-141-0x0000000000000000-mapping.dmp
                      • memory/3216-187-0x0000000000E50000-0x0000000000E78000-memory.dmp
                        Filesize

                        160KB

                      • memory/3216-183-0x0000000000000000-mapping.dmp
                      • memory/3224-193-0x0000000000000000-mapping.dmp
                      • memory/3440-143-0x0000000000000000-mapping.dmp
                      • memory/3648-155-0x0000000000000000-mapping.dmp
                      • memory/3724-159-0x0000000000540000-0x0000000000568000-memory.dmp
                        Filesize

                        160KB

                      • memory/3724-178-0x0000000005E60000-0x0000000005EF2000-memory.dmp
                        Filesize

                        584KB

                      • memory/3724-186-0x0000000006160000-0x00000000061D6000-memory.dmp
                        Filesize

                        472KB

                      • memory/3724-188-0x00000000061E0000-0x0000000006230000-memory.dmp
                        Filesize

                        320KB

                      • memory/3724-177-0x0000000006330000-0x00000000068D4000-memory.dmp
                        Filesize

                        5.6MB

                      • memory/3724-176-0x00000000052A0000-0x0000000005306000-memory.dmp
                        Filesize

                        408KB

                      • memory/3724-156-0x0000000000000000-mapping.dmp
                      • memory/3724-179-0x00000000068E0000-0x0000000006AA2000-memory.dmp
                        Filesize

                        1.8MB

                      • memory/3724-180-0x0000000006FE0000-0x000000000750C000-memory.dmp
                        Filesize

                        5.2MB

                      • memory/3724-160-0x0000000005460000-0x0000000005A78000-memory.dmp
                        Filesize

                        6.1MB

                      • memory/3724-161-0x0000000004FC0000-0x00000000050CA000-memory.dmp
                        Filesize

                        1.0MB

                      • memory/3724-162-0x0000000004EF0000-0x0000000004F02000-memory.dmp
                        Filesize

                        72KB

                      • memory/3724-163-0x0000000004F50000-0x0000000004F8C000-memory.dmp
                        Filesize

                        240KB

                      • memory/4016-150-0x0000000000000000-mapping.dmp
                      • memory/4016-169-0x0000000000BF0000-0x0000000001A09000-memory.dmp
                        Filesize

                        14.1MB

                      • memory/4016-154-0x0000000000BF0000-0x0000000001A09000-memory.dmp
                        Filesize

                        14.1MB

                      • memory/4284-216-0x0000000000400000-0x0000000000859000-memory.dmp
                        Filesize

                        4.3MB

                      • memory/4284-215-0x0000000000B24000-0x0000000000B43000-memory.dmp
                        Filesize

                        124KB

                      • memory/4316-210-0x0000000002D00000-0x0000000002DB2000-memory.dmp
                        Filesize

                        712KB

                      • memory/4316-204-0x0000000000BE0000-0x0000000000CA7000-memory.dmp
                        Filesize

                        796KB

                      • memory/4316-199-0x0000000002BD0000-0x0000000002CF5000-memory.dmp
                        Filesize

                        1.1MB

                      • memory/4316-213-0x0000000002BD0000-0x0000000002CF5000-memory.dmp
                        Filesize

                        1.1MB

                      • memory/4316-194-0x0000000000000000-mapping.dmp
                      • memory/4316-197-0x0000000002450000-0x0000000002674000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/4316-198-0x0000000002910000-0x0000000002A9D000-memory.dmp
                        Filesize

                        1.6MB

                      • memory/4332-205-0x0000000000000000-mapping.dmp
                      • memory/4332-209-0x0000000000790000-0x00000000007B4000-memory.dmp
                        Filesize

                        144KB

                      • memory/4472-170-0x0000000000000000-mapping.dmp