Analysis

  • max time kernel
    145s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-11-2022 17:14

General

  • Target

    0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e.exe

  • Size

    346KB

  • MD5

    94cfb05ebec8347824c6a47b1f134cf1

  • SHA1

    be422dfc6d32411c8e28fb83c0d77eb28103dc9a

  • SHA256

    0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e

  • SHA512

    3b7ed9e8cebf8a32180906615d07ed97b16c47aebfd5a18e1778dacbbc8a0889ff0a4a826334e39654e13f6b565340e76dae313aacf1448f9539345a0cb8c130

  • SSDEEP

    6144:BkXvLzTOjlPdnarcQH4nu58vk3m7eQj25En2E1a:Bk/fTOj7arVmZd7fjeUv

Malware Config

Extracted

Family

redline

Botnet

boy

C2

77.73.134.241:4691

Attributes
  • auth_value

    a91fa8cc2cfaefc42a23c03faef44bd3

Extracted

Family

redline

Botnet

@REDLINEVIP Cloud (TG: @FATHEROFCARDERS)

C2

151.80.89.233:13553

Attributes
  • auth_value

    fbee175162920530e6bf470c8003fa1a

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 4 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e.exe
    "C:\Users\Admin\AppData\Local\Temp\0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
      "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3840
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:532
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1080
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          4⤵
            PID:1132
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "rovwer.exe" /P "Admin:N"
            4⤵
              PID:4764
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "rovwer.exe" /P "Admin:R" /E
              4⤵
                PID:4672
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                4⤵
                  PID:2880
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\99e342142d" /P "Admin:N"
                  4⤵
                    PID:1144
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\99e342142d" /P "Admin:R" /E
                    4⤵
                      PID:1392
                  • C:\Users\Admin\AppData\Roaming\1000067000\45676.exe
                    "C:\Users\Admin\AppData\Roaming\1000067000\45676.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:3460
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Roaming\1000067000\45676.exe
                      4⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1456
                      • C:\Windows\system32\choice.exe
                        choice /C Y /N /D Y /T 0
                        5⤵
                          PID:2720
                    • C:\Users\Admin\AppData\Local\Temp\1000082001\mana.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000082001\mana.exe"
                      3⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1852
                    • C:\Users\Admin\AppData\Local\Temp\1000085001\linda5.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000085001\linda5.exe"
                      3⤵
                      • Executes dropped EXE
                      • Checks computer location settings
                      • Suspicious use of WriteProcessMemory
                      PID:2704
                      • C:\Windows\SysWOW64\msiexec.exe
                        "C:\Windows\System32\msiexec.exe" /y .\tQQKFDA.D
                        4⤵
                        • Loads dropped DLL
                        PID:3680
                    • C:\Users\Admin\AppData\Local\Temp\1000086001\40K.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000086001\40K.exe"
                      3⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4916
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                      3⤵
                      • Blocklisted process makes network request
                      • Loads dropped DLL
                      • Accesses Microsoft Outlook profiles
                      • Suspicious behavior: EnumeratesProcesses
                      • outlook_win_path
                      PID:4744
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 912
                    2⤵
                    • Program crash
                    PID:4824
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4460 -ip 4460
                  1⤵
                    PID:4908
                  • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                    C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                    1⤵
                    • Executes dropped EXE
                    PID:2860
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2860 -s 420
                      2⤵
                      • Program crash
                      PID:4012
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2860 -ip 2860
                    1⤵
                      PID:1392
                    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                      C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                      1⤵
                      • Executes dropped EXE
                      PID:212
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 212 -s 420
                        2⤵
                        • Program crash
                        PID:3464
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 212 -ip 212
                      1⤵
                        PID:3872
                      • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                        C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                        1⤵
                        • Executes dropped EXE
                        PID:4784
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 420
                          2⤵
                          • Program crash
                          PID:1532
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4784 -ip 4784
                        1⤵
                          PID:3036

                        Network

                        MITRE ATT&CK Matrix ATT&CK v6

                        Execution

                        Scheduled Task

                        1
                        T1053

                        Persistence

                        Registry Run Keys / Startup Folder

                        1
                        T1060

                        Scheduled Task

                        1
                        T1053

                        Privilege Escalation

                        Scheduled Task

                        1
                        T1053

                        Defense Evasion

                        Modify Registry

                        1
                        T1112

                        Credential Access

                        Credentials in Files

                        3
                        T1081

                        Discovery

                        Query Registry

                        2
                        T1012

                        System Information Discovery

                        2
                        T1082

                        Collection

                        Data from Local System

                        3
                        T1005

                        Email Collection

                        1
                        T1114

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\1000082001\mana.exe
                          Filesize

                          137KB

                          MD5

                          e63d74cec6926b2d04e474b889d08af4

                          SHA1

                          a64a888ccfb4e82ade71f1a00a7ae681d29c7bcb

                          SHA256

                          a9ffffff38aca59d7d2f041fbdb253ca612c7ba2d597782b2e6a59a914f49b33

                          SHA512

                          fd59c0a1c613611002e52a309ee4baad626df8fbbd8c0c230bcb8e6fed4a3059296ab11b88a1d25a0f54c65f730a027f876629298120f7b4c251bf6d2aaed148

                        • C:\Users\Admin\AppData\Local\Temp\1000082001\mana.exe
                          Filesize

                          137KB

                          MD5

                          e63d74cec6926b2d04e474b889d08af4

                          SHA1

                          a64a888ccfb4e82ade71f1a00a7ae681d29c7bcb

                          SHA256

                          a9ffffff38aca59d7d2f041fbdb253ca612c7ba2d597782b2e6a59a914f49b33

                          SHA512

                          fd59c0a1c613611002e52a309ee4baad626df8fbbd8c0c230bcb8e6fed4a3059296ab11b88a1d25a0f54c65f730a027f876629298120f7b4c251bf6d2aaed148

                        • C:\Users\Admin\AppData\Local\Temp\1000085001\linda5.exe
                          Filesize

                          1.8MB

                          MD5

                          9c29c29af5d10bc1614eeebb8cbb835e

                          SHA1

                          b3b999f04d46db6418544f08214bbea38820ed9e

                          SHA256

                          d79b91091de254d75fc4804c761e3d5f6e8da8bc67f5807ce31a04f3976e2cb9

                          SHA512

                          0fea129cc9fc25ee1dfde74432d98e70b76dc14640783de69804c053f66e6b1acba1b84bfe6ffe5437c9618dfff1317ffef69696fc415daec0bf2f8b7777a9e8

                        • C:\Users\Admin\AppData\Local\Temp\1000085001\linda5.exe
                          Filesize

                          1.8MB

                          MD5

                          9c29c29af5d10bc1614eeebb8cbb835e

                          SHA1

                          b3b999f04d46db6418544f08214bbea38820ed9e

                          SHA256

                          d79b91091de254d75fc4804c761e3d5f6e8da8bc67f5807ce31a04f3976e2cb9

                          SHA512

                          0fea129cc9fc25ee1dfde74432d98e70b76dc14640783de69804c053f66e6b1acba1b84bfe6ffe5437c9618dfff1317ffef69696fc415daec0bf2f8b7777a9e8

                        • C:\Users\Admin\AppData\Local\Temp\1000086001\40K.exe
                          Filesize

                          137KB

                          MD5

                          87ef06885fd221a86bba9e5b86a7ea7d

                          SHA1

                          6644db86f2d557167f442a5fe72a82de3fe943ba

                          SHA256

                          ab5026bf6fe5d692faaf86752b4c9fa226ec49ba54cfb625579287b498eab20f

                          SHA512

                          c65b38856d4995b01454754044ae7373363a02b8e228c249fee3c1c2222f2348473f0bba5a5f2e4a280cd183e57dc13423bb09f86919ccb8968c8229310c5ad0

                        • C:\Users\Admin\AppData\Local\Temp\1000086001\40K.exe
                          Filesize

                          137KB

                          MD5

                          87ef06885fd221a86bba9e5b86a7ea7d

                          SHA1

                          6644db86f2d557167f442a5fe72a82de3fe943ba

                          SHA256

                          ab5026bf6fe5d692faaf86752b4c9fa226ec49ba54cfb625579287b498eab20f

                          SHA512

                          c65b38856d4995b01454754044ae7373363a02b8e228c249fee3c1c2222f2348473f0bba5a5f2e4a280cd183e57dc13423bb09f86919ccb8968c8229310c5ad0

                        • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                          Filesize

                          346KB

                          MD5

                          94cfb05ebec8347824c6a47b1f134cf1

                          SHA1

                          be422dfc6d32411c8e28fb83c0d77eb28103dc9a

                          SHA256

                          0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e

                          SHA512

                          3b7ed9e8cebf8a32180906615d07ed97b16c47aebfd5a18e1778dacbbc8a0889ff0a4a826334e39654e13f6b565340e76dae313aacf1448f9539345a0cb8c130

                        • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                          Filesize

                          346KB

                          MD5

                          94cfb05ebec8347824c6a47b1f134cf1

                          SHA1

                          be422dfc6d32411c8e28fb83c0d77eb28103dc9a

                          SHA256

                          0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e

                          SHA512

                          3b7ed9e8cebf8a32180906615d07ed97b16c47aebfd5a18e1778dacbbc8a0889ff0a4a826334e39654e13f6b565340e76dae313aacf1448f9539345a0cb8c130

                        • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                          Filesize

                          346KB

                          MD5

                          94cfb05ebec8347824c6a47b1f134cf1

                          SHA1

                          be422dfc6d32411c8e28fb83c0d77eb28103dc9a

                          SHA256

                          0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e

                          SHA512

                          3b7ed9e8cebf8a32180906615d07ed97b16c47aebfd5a18e1778dacbbc8a0889ff0a4a826334e39654e13f6b565340e76dae313aacf1448f9539345a0cb8c130

                        • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                          Filesize

                          346KB

                          MD5

                          94cfb05ebec8347824c6a47b1f134cf1

                          SHA1

                          be422dfc6d32411c8e28fb83c0d77eb28103dc9a

                          SHA256

                          0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e

                          SHA512

                          3b7ed9e8cebf8a32180906615d07ed97b16c47aebfd5a18e1778dacbbc8a0889ff0a4a826334e39654e13f6b565340e76dae313aacf1448f9539345a0cb8c130

                        • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                          Filesize

                          346KB

                          MD5

                          94cfb05ebec8347824c6a47b1f134cf1

                          SHA1

                          be422dfc6d32411c8e28fb83c0d77eb28103dc9a

                          SHA256

                          0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e

                          SHA512

                          3b7ed9e8cebf8a32180906615d07ed97b16c47aebfd5a18e1778dacbbc8a0889ff0a4a826334e39654e13f6b565340e76dae313aacf1448f9539345a0cb8c130

                        • C:\Users\Admin\AppData\Local\Temp\tQQKFDA.D
                          Filesize

                          2.1MB

                          MD5

                          32f3561799feecd25b7ab1f64642679b

                          SHA1

                          f6eaf8d4bb35ca8b70c6fbc4e2f35ad0d639a81b

                          SHA256

                          d991fcee9f732cdca866c6af16414bd6a150434787ab42ffda6361c0181ba362

                          SHA512

                          cbd252662bd865600384524875bdb5acde0489c9eb7de873d65c01e83d807da636831507f44685867c1fe4a7366fd14af1010a000d3e1e330e53507d0644dc4b

                        • C:\Users\Admin\AppData\Local\Temp\tQQKfDa.D
                          Filesize

                          2.1MB

                          MD5

                          32f3561799feecd25b7ab1f64642679b

                          SHA1

                          f6eaf8d4bb35ca8b70c6fbc4e2f35ad0d639a81b

                          SHA256

                          d991fcee9f732cdca866c6af16414bd6a150434787ab42ffda6361c0181ba362

                          SHA512

                          cbd252662bd865600384524875bdb5acde0489c9eb7de873d65c01e83d807da636831507f44685867c1fe4a7366fd14af1010a000d3e1e330e53507d0644dc4b

                        • C:\Users\Admin\AppData\Roaming\1000067000\45676.exe
                          Filesize

                          4.3MB

                          MD5

                          30be8d7ef914a7baf9a3796cb892aa02

                          SHA1

                          ee79a60ddf9f578404e697564e694fe5d09706d9

                          SHA256

                          a2385d07f033b36d08d4ceb976820d2db8ca7b29339cb72ff3f74a4a90806c54

                          SHA512

                          985c3a3c404c590403cd0c46f88b912bb9d4994ae0f7c921176a1b3180d8f96e3be86f74e1cc672a6598fc6ccbbce6ece5e8567635f594f173bce8f968cf56f9

                        • C:\Users\Admin\AppData\Roaming\1000067000\45676.exe
                          Filesize

                          4.3MB

                          MD5

                          30be8d7ef914a7baf9a3796cb892aa02

                          SHA1

                          ee79a60ddf9f578404e697564e694fe5d09706d9

                          SHA256

                          a2385d07f033b36d08d4ceb976820d2db8ca7b29339cb72ff3f74a4a90806c54

                          SHA512

                          985c3a3c404c590403cd0c46f88b912bb9d4994ae0f7c921176a1b3180d8f96e3be86f74e1cc672a6598fc6ccbbce6ece5e8567635f594f173bce8f968cf56f9

                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                          Filesize

                          126KB

                          MD5

                          507e9dc7b9c42f535b6df96d79179835

                          SHA1

                          acf41fb549750023115f060071aa5ca8c33f249e

                          SHA256

                          3b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af

                          SHA512

                          70907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302

                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                          Filesize

                          126KB

                          MD5

                          507e9dc7b9c42f535b6df96d79179835

                          SHA1

                          acf41fb549750023115f060071aa5ca8c33f249e

                          SHA256

                          3b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af

                          SHA512

                          70907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302

                        • memory/212-200-0x0000000000400000-0x0000000000859000-memory.dmp
                          Filesize

                          4.3MB

                        • memory/532-140-0x0000000000000000-mapping.dmp
                        • memory/1080-141-0x0000000000000000-mapping.dmp
                        • memory/1132-143-0x0000000000000000-mapping.dmp
                        • memory/1144-148-0x0000000000000000-mapping.dmp
                        • memory/1392-149-0x0000000000000000-mapping.dmp
                        • memory/1456-153-0x0000000000000000-mapping.dmp
                        • memory/1852-162-0x0000000004AB0000-0x0000000004AC2000-memory.dmp
                          Filesize

                          72KB

                        • memory/1852-180-0x0000000005D90000-0x0000000005DE0000-memory.dmp
                          Filesize

                          320KB

                        • memory/1852-156-0x0000000000000000-mapping.dmp
                        • memory/1852-159-0x0000000000100000-0x0000000000128000-memory.dmp
                          Filesize

                          160KB

                        • memory/1852-160-0x00000000050B0000-0x00000000056C8000-memory.dmp
                          Filesize

                          6.1MB

                        • memory/1852-161-0x0000000004BA0000-0x0000000004CAA000-memory.dmp
                          Filesize

                          1.0MB

                        • memory/1852-173-0x0000000005EE0000-0x0000000006484000-memory.dmp
                          Filesize

                          5.6MB

                        • memory/1852-163-0x0000000004B10000-0x0000000004B4C000-memory.dmp
                          Filesize

                          240KB

                        • memory/1852-172-0x0000000004E20000-0x0000000004E86000-memory.dmp
                          Filesize

                          408KB

                        • memory/1852-174-0x0000000005A10000-0x0000000005AA2000-memory.dmp
                          Filesize

                          584KB

                        • memory/1852-179-0x0000000005D10000-0x0000000005D86000-memory.dmp
                          Filesize

                          472KB

                        • memory/1852-178-0x0000000006B90000-0x00000000070BC000-memory.dmp
                          Filesize

                          5.2MB

                        • memory/1852-177-0x0000000006490000-0x0000000006652000-memory.dmp
                          Filesize

                          1.8MB

                        • memory/2704-165-0x0000000000000000-mapping.dmp
                        • memory/2720-155-0x0000000000000000-mapping.dmp
                        • memory/2860-191-0x00000000008F4000-0x0000000000912000-memory.dmp
                          Filesize

                          120KB

                        • memory/2860-194-0x0000000000400000-0x0000000000859000-memory.dmp
                          Filesize

                          4.3MB

                        • memory/2860-193-0x00000000008F4000-0x0000000000912000-memory.dmp
                          Filesize

                          120KB

                        • memory/2860-192-0x0000000000C00000-0x0000000000C3E000-memory.dmp
                          Filesize

                          248KB

                        • memory/2880-147-0x0000000000000000-mapping.dmp
                        • memory/3460-154-0x00000000000C0000-0x0000000000ED9000-memory.dmp
                          Filesize

                          14.1MB

                        • memory/3460-169-0x00000000000C0000-0x0000000000ED9000-memory.dmp
                          Filesize

                          14.1MB

                        • memory/3460-150-0x0000000000000000-mapping.dmp
                        • memory/3680-186-0x00000000030B0000-0x0000000003177000-memory.dmp
                          Filesize

                          796KB

                        • memory/3680-168-0x0000000000000000-mapping.dmp
                        • memory/3680-175-0x0000000002CC0000-0x0000000002E4D000-memory.dmp
                          Filesize

                          1.6MB

                        • memory/3680-176-0x0000000002F80000-0x00000000030A5000-memory.dmp
                          Filesize

                          1.1MB

                        • memory/3680-187-0x0000000003180000-0x0000000003232000-memory.dmp
                          Filesize

                          712KB

                        • memory/3680-190-0x0000000002F80000-0x00000000030A5000-memory.dmp
                          Filesize

                          1.1MB

                        • memory/3840-135-0x0000000000000000-mapping.dmp
                        • memory/3840-142-0x0000000000B43000-0x0000000000B62000-memory.dmp
                          Filesize

                          124KB

                        • memory/3840-144-0x0000000000400000-0x0000000000859000-memory.dmp
                          Filesize

                          4.3MB

                        • memory/3840-164-0x0000000000400000-0x0000000000859000-memory.dmp
                          Filesize

                          4.3MB

                        • memory/4460-139-0x0000000000400000-0x0000000000859000-memory.dmp
                          Filesize

                          4.3MB

                        • memory/4460-133-0x0000000000BF0000-0x0000000000C2E000-memory.dmp
                          Filesize

                          248KB

                        • memory/4460-132-0x00000000008A2000-0x00000000008C1000-memory.dmp
                          Filesize

                          124KB

                        • memory/4460-138-0x00000000008A2000-0x00000000008C1000-memory.dmp
                          Filesize

                          124KB

                        • memory/4460-134-0x0000000000400000-0x0000000000859000-memory.dmp
                          Filesize

                          4.3MB

                        • memory/4672-146-0x0000000000000000-mapping.dmp
                        • memory/4744-195-0x0000000000000000-mapping.dmp
                        • memory/4764-145-0x0000000000000000-mapping.dmp
                        • memory/4784-202-0x0000000000904000-0x0000000000922000-memory.dmp
                          Filesize

                          120KB

                        • memory/4784-203-0x0000000000400000-0x0000000000859000-memory.dmp
                          Filesize

                          4.3MB

                        • memory/4916-184-0x00000000001A0000-0x00000000001C8000-memory.dmp
                          Filesize

                          160KB

                        • memory/4916-181-0x0000000000000000-mapping.dmp