Analysis

  • max time kernel
    112s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-11-2022 11:22

General

  • Target

    2714d8595163913ef567a599366c1064.exe

  • Size

    335KB

  • MD5

    2714d8595163913ef567a599366c1064

  • SHA1

    c6ba817e47768709242cc4057f372ba50484abf4

  • SHA256

    bfd68b428d7401ece09a3aff4a699f318525c839819f5195f15607e9cb374878

  • SHA512

    33322214caa3ef0bb5c10de71be0bb9f8d3322e128b2930fa1569b4823b87a00302c9efd1b87812e86b3252f53fe2d0b9984889a7e96eb639206300446a79658

  • SSDEEP

    6144:0zlnLS8O4KCkUGPQBrBgp3ACROZa4xwbD/8EndTQ:0zZ28O4Q8rGVACRKa4xgoUdT

Malware Config

Extracted

Family

redline

Botnet

boy

C2

77.73.134.241:4691

Attributes
  • auth_value

    a91fa8cc2cfaefc42a23c03faef44bd3

Extracted

Family

redline

Botnet

@REDLINEVIP Cloud (TG: @FATHEROFCARDERS)

C2

151.80.89.233:13553

Attributes
  • auth_value

    fbee175162920530e6bf470c8003fa1a

Extracted

Family

redline

C2

45.15.156.37:110

Attributes
  • auth_value

    19cd76dae6d01d9649fd29624fa61e51

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2714d8595163913ef567a599366c1064.exe
    "C:\Users\Admin\AppData\Local\Temp\2714d8595163913ef567a599366c1064.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
      "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4688
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:1920
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2392
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          4⤵
            PID:2828
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "rovwer.exe" /P "Admin:N"
            4⤵
              PID:3208
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "rovwer.exe" /P "Admin:R" /E
              4⤵
                PID:2600
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                4⤵
                  PID:3648
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\99e342142d" /P "Admin:N"
                  4⤵
                    PID:1676
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\99e342142d" /P "Admin:R" /E
                    4⤵
                      PID:348
                  • C:\Users\Admin\AppData\Local\Temp\1000082001\mana.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000082001\mana.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4268
                  • C:\Users\Admin\AppData\Local\Temp\1000085001\linda5.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000085001\linda5.exe"
                    3⤵
                    • Executes dropped EXE
                    • Checks computer location settings
                    • Suspicious use of WriteProcessMemory
                    PID:2804
                    • C:\Windows\SysWOW64\control.exe
                      "C:\Windows\System32\control.exe" .\FHTDj.XK
                      4⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4968
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\FHTDj.XK
                        5⤵
                        • Loads dropped DLL
                        • Suspicious use of WriteProcessMemory
                        PID:3616
                        • C:\Windows\system32\RunDll32.exe
                          C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\FHTDj.XK
                          6⤵
                          • Suspicious use of WriteProcessMemory
                          PID:3012
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\FHTDj.XK
                            7⤵
                            • Loads dropped DLL
                            PID:404
                  • C:\Users\Admin\AppData\Local\Temp\1000086001\40K.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000086001\40K.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1744
                  • C:\Users\Admin\AppData\Local\Temp\1000087001\14-11.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000087001\14-11.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:916
                  • C:\Users\Admin\AppData\Roaming\1000088000\14-11.exe
                    "C:\Users\Admin\AppData\Roaming\1000088000\14-11.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4652
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                    3⤵
                    • Blocklisted process makes network request
                    • Loads dropped DLL
                    • Accesses Microsoft Outlook profiles
                    • Suspicious behavior: EnumeratesProcesses
                    • outlook_win_path
                    PID:1936
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 1136
                  2⤵
                  • Program crash
                  PID:2720
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1056 -ip 1056
                1⤵
                  PID:3252
                • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                  C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                  1⤵
                  • Executes dropped EXE
                  PID:2356
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 420
                    2⤵
                    • Program crash
                    PID:2412
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2356 -ip 2356
                  1⤵
                    PID:1716
                  • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                    C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                    1⤵
                    • Executes dropped EXE
                    PID:3328
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 424
                      2⤵
                      • Program crash
                      PID:3144
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3328 -ip 3328
                    1⤵
                      PID:2644

                    Network

                    MITRE ATT&CK Matrix ATT&CK v6

                    Execution

                    Scheduled Task

                    1
                    T1053

                    Persistence

                    Registry Run Keys / Startup Folder

                    1
                    T1060

                    Scheduled Task

                    1
                    T1053

                    Privilege Escalation

                    Scheduled Task

                    1
                    T1053

                    Defense Evasion

                    Modify Registry

                    1
                    T1112

                    Credential Access

                    Credentials in Files

                    3
                    T1081

                    Discovery

                    Query Registry

                    2
                    T1012

                    System Information Discovery

                    2
                    T1082

                    Collection

                    Data from Local System

                    3
                    T1005

                    Email Collection

                    1
                    T1114

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\14-11.exe.log
                      Filesize

                      2KB

                      MD5

                      77ebd97c8e771dfffce8578c2d7f70aa

                      SHA1

                      84d4cd2dbfc9e75f9f87b86b5344ee45933c84cb

                      SHA256

                      8ec275b90f44565b76fa60183be706890d291add3cfea01b05a2d7c89689e9bb

                      SHA512

                      0d97e2820d31447cacdbece7bf59af3959787e458a56a0fb958908aa3d2ee3a5e7c0d514f77749ed78f6fda9f6f0053e4c64d56b80081f7d6f1f8e8d30033919

                    • C:\Users\Admin\AppData\Local\Temp\1000082001\mana.exe
                      Filesize

                      137KB

                      MD5

                      e63d74cec6926b2d04e474b889d08af4

                      SHA1

                      a64a888ccfb4e82ade71f1a00a7ae681d29c7bcb

                      SHA256

                      a9ffffff38aca59d7d2f041fbdb253ca612c7ba2d597782b2e6a59a914f49b33

                      SHA512

                      fd59c0a1c613611002e52a309ee4baad626df8fbbd8c0c230bcb8e6fed4a3059296ab11b88a1d25a0f54c65f730a027f876629298120f7b4c251bf6d2aaed148

                    • C:\Users\Admin\AppData\Local\Temp\1000082001\mana.exe
                      Filesize

                      137KB

                      MD5

                      e63d74cec6926b2d04e474b889d08af4

                      SHA1

                      a64a888ccfb4e82ade71f1a00a7ae681d29c7bcb

                      SHA256

                      a9ffffff38aca59d7d2f041fbdb253ca612c7ba2d597782b2e6a59a914f49b33

                      SHA512

                      fd59c0a1c613611002e52a309ee4baad626df8fbbd8c0c230bcb8e6fed4a3059296ab11b88a1d25a0f54c65f730a027f876629298120f7b4c251bf6d2aaed148

                    • C:\Users\Admin\AppData\Local\Temp\1000085001\linda5.exe
                      Filesize

                      1.9MB

                      MD5

                      aea445008004679d802beeb062c4df5c

                      SHA1

                      1f50e7b321f6e8979bd809bd3d2c24ec8a111e71

                      SHA256

                      e8b2ab27e857117c64c72cc15c3a905764a162afcc99c8c2bda944f7c22441c0

                      SHA512

                      86fa51425e8cc9d404d6e5b830e1e073cce75dc7f9aafef0cbc18da2dfac20959c51d77f4685a84fa6d85811d7c69fe860e504bcc1c864518a44f50b387f97b3

                    • C:\Users\Admin\AppData\Local\Temp\1000085001\linda5.exe
                      Filesize

                      1.9MB

                      MD5

                      aea445008004679d802beeb062c4df5c

                      SHA1

                      1f50e7b321f6e8979bd809bd3d2c24ec8a111e71

                      SHA256

                      e8b2ab27e857117c64c72cc15c3a905764a162afcc99c8c2bda944f7c22441c0

                      SHA512

                      86fa51425e8cc9d404d6e5b830e1e073cce75dc7f9aafef0cbc18da2dfac20959c51d77f4685a84fa6d85811d7c69fe860e504bcc1c864518a44f50b387f97b3

                    • C:\Users\Admin\AppData\Local\Temp\1000086001\40K.exe
                      Filesize

                      137KB

                      MD5

                      87ef06885fd221a86bba9e5b86a7ea7d

                      SHA1

                      6644db86f2d557167f442a5fe72a82de3fe943ba

                      SHA256

                      ab5026bf6fe5d692faaf86752b4c9fa226ec49ba54cfb625579287b498eab20f

                      SHA512

                      c65b38856d4995b01454754044ae7373363a02b8e228c249fee3c1c2222f2348473f0bba5a5f2e4a280cd183e57dc13423bb09f86919ccb8968c8229310c5ad0

                    • C:\Users\Admin\AppData\Local\Temp\1000086001\40K.exe
                      Filesize

                      137KB

                      MD5

                      87ef06885fd221a86bba9e5b86a7ea7d

                      SHA1

                      6644db86f2d557167f442a5fe72a82de3fe943ba

                      SHA256

                      ab5026bf6fe5d692faaf86752b4c9fa226ec49ba54cfb625579287b498eab20f

                      SHA512

                      c65b38856d4995b01454754044ae7373363a02b8e228c249fee3c1c2222f2348473f0bba5a5f2e4a280cd183e57dc13423bb09f86919ccb8968c8229310c5ad0

                    • C:\Users\Admin\AppData\Local\Temp\1000087001\14-11.exe
                      Filesize

                      199KB

                      MD5

                      0385f088162ba40f42567b2547a50b2f

                      SHA1

                      253097adc89941518d5d40dc5ea0e2f954a323e2

                      SHA256

                      9959b77737dd53be31eabcb7333bde782dc4a53496d4e5c448b5aafdca4dce56

                      SHA512

                      89f39cb1919f070282a00c128a908c425d37e0c4c10757e65836189f1b215f6859bab6513d4aaac75119bb5d863e5a22c1fba622898c451bde5479449edc57eb

                    • C:\Users\Admin\AppData\Local\Temp\1000087001\14-11.exe
                      Filesize

                      199KB

                      MD5

                      0385f088162ba40f42567b2547a50b2f

                      SHA1

                      253097adc89941518d5d40dc5ea0e2f954a323e2

                      SHA256

                      9959b77737dd53be31eabcb7333bde782dc4a53496d4e5c448b5aafdca4dce56

                      SHA512

                      89f39cb1919f070282a00c128a908c425d37e0c4c10757e65836189f1b215f6859bab6513d4aaac75119bb5d863e5a22c1fba622898c451bde5479449edc57eb

                    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                      Filesize

                      335KB

                      MD5

                      2714d8595163913ef567a599366c1064

                      SHA1

                      c6ba817e47768709242cc4057f372ba50484abf4

                      SHA256

                      bfd68b428d7401ece09a3aff4a699f318525c839819f5195f15607e9cb374878

                      SHA512

                      33322214caa3ef0bb5c10de71be0bb9f8d3322e128b2930fa1569b4823b87a00302c9efd1b87812e86b3252f53fe2d0b9984889a7e96eb639206300446a79658

                    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                      Filesize

                      335KB

                      MD5

                      2714d8595163913ef567a599366c1064

                      SHA1

                      c6ba817e47768709242cc4057f372ba50484abf4

                      SHA256

                      bfd68b428d7401ece09a3aff4a699f318525c839819f5195f15607e9cb374878

                      SHA512

                      33322214caa3ef0bb5c10de71be0bb9f8d3322e128b2930fa1569b4823b87a00302c9efd1b87812e86b3252f53fe2d0b9984889a7e96eb639206300446a79658

                    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                      Filesize

                      335KB

                      MD5

                      2714d8595163913ef567a599366c1064

                      SHA1

                      c6ba817e47768709242cc4057f372ba50484abf4

                      SHA256

                      bfd68b428d7401ece09a3aff4a699f318525c839819f5195f15607e9cb374878

                      SHA512

                      33322214caa3ef0bb5c10de71be0bb9f8d3322e128b2930fa1569b4823b87a00302c9efd1b87812e86b3252f53fe2d0b9984889a7e96eb639206300446a79658

                    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                      Filesize

                      335KB

                      MD5

                      2714d8595163913ef567a599366c1064

                      SHA1

                      c6ba817e47768709242cc4057f372ba50484abf4

                      SHA256

                      bfd68b428d7401ece09a3aff4a699f318525c839819f5195f15607e9cb374878

                      SHA512

                      33322214caa3ef0bb5c10de71be0bb9f8d3322e128b2930fa1569b4823b87a00302c9efd1b87812e86b3252f53fe2d0b9984889a7e96eb639206300446a79658

                    • C:\Users\Admin\AppData\Local\Temp\FHTDj.XK
                      Filesize

                      2.4MB

                      MD5

                      7a53121583fca065e2289562dac96e05

                      SHA1

                      dc8a04f96b39c50162e45e01636b5a22528974e2

                      SHA256

                      ea6fc278ca6be26a01456c2326ab6cc31aa48a9e4613a672f325477349780919

                      SHA512

                      dd7bfe194c35b66626724fc664cbdfb4b48923622cd6c43427b5a17ef9abd689ee35ddcebb3fe0aa37b846f8fcdf35b14459bdf577be20a7a9b4d5855295f587

                    • C:\Users\Admin\AppData\Local\Temp\FHtDj.xK
                      Filesize

                      2.4MB

                      MD5

                      7a53121583fca065e2289562dac96e05

                      SHA1

                      dc8a04f96b39c50162e45e01636b5a22528974e2

                      SHA256

                      ea6fc278ca6be26a01456c2326ab6cc31aa48a9e4613a672f325477349780919

                      SHA512

                      dd7bfe194c35b66626724fc664cbdfb4b48923622cd6c43427b5a17ef9abd689ee35ddcebb3fe0aa37b846f8fcdf35b14459bdf577be20a7a9b4d5855295f587

                    • C:\Users\Admin\AppData\Local\Temp\FHtDj.xK
                      Filesize

                      2.4MB

                      MD5

                      7a53121583fca065e2289562dac96e05

                      SHA1

                      dc8a04f96b39c50162e45e01636b5a22528974e2

                      SHA256

                      ea6fc278ca6be26a01456c2326ab6cc31aa48a9e4613a672f325477349780919

                      SHA512

                      dd7bfe194c35b66626724fc664cbdfb4b48923622cd6c43427b5a17ef9abd689ee35ddcebb3fe0aa37b846f8fcdf35b14459bdf577be20a7a9b4d5855295f587

                    • C:\Users\Admin\AppData\Roaming\1000088000\14-11.exe
                      Filesize

                      199KB

                      MD5

                      0385f088162ba40f42567b2547a50b2f

                      SHA1

                      253097adc89941518d5d40dc5ea0e2f954a323e2

                      SHA256

                      9959b77737dd53be31eabcb7333bde782dc4a53496d4e5c448b5aafdca4dce56

                      SHA512

                      89f39cb1919f070282a00c128a908c425d37e0c4c10757e65836189f1b215f6859bab6513d4aaac75119bb5d863e5a22c1fba622898c451bde5479449edc57eb

                    • C:\Users\Admin\AppData\Roaming\1000088000\14-11.exe
                      Filesize

                      199KB

                      MD5

                      0385f088162ba40f42567b2547a50b2f

                      SHA1

                      253097adc89941518d5d40dc5ea0e2f954a323e2

                      SHA256

                      9959b77737dd53be31eabcb7333bde782dc4a53496d4e5c448b5aafdca4dce56

                      SHA512

                      89f39cb1919f070282a00c128a908c425d37e0c4c10757e65836189f1b215f6859bab6513d4aaac75119bb5d863e5a22c1fba622898c451bde5479449edc57eb

                    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                      Filesize

                      126KB

                      MD5

                      507e9dc7b9c42f535b6df96d79179835

                      SHA1

                      acf41fb549750023115f060071aa5ca8c33f249e

                      SHA256

                      3b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af

                      SHA512

                      70907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302

                    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                      Filesize

                      126KB

                      MD5

                      507e9dc7b9c42f535b6df96d79179835

                      SHA1

                      acf41fb549750023115f060071aa5ca8c33f249e

                      SHA256

                      3b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af

                      SHA512

                      70907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302

                    • memory/348-149-0x0000000000000000-mapping.dmp
                    • memory/404-194-0x00000000034A0000-0x0000000003557000-memory.dmp
                      Filesize

                      732KB

                    • memory/404-187-0x0000000003280000-0x00000000033C1000-memory.dmp
                      Filesize

                      1.3MB

                    • memory/404-185-0x0000000002F80000-0x0000000003133000-memory.dmp
                      Filesize

                      1.7MB

                    • memory/404-182-0x0000000000000000-mapping.dmp
                    • memory/404-192-0x00000000033D0000-0x000000000349B000-memory.dmp
                      Filesize

                      812KB

                    • memory/404-196-0x0000000003280000-0x00000000033C1000-memory.dmp
                      Filesize

                      1.3MB

                    • memory/916-188-0x0000000000000000-mapping.dmp
                    • memory/916-191-0x0000000000370000-0x00000000003A8000-memory.dmp
                      Filesize

                      224KB

                    • memory/916-198-0x0000000005EF0000-0x0000000005F0E000-memory.dmp
                      Filesize

                      120KB

                    • memory/1056-133-0x0000000002460000-0x000000000249E000-memory.dmp
                      Filesize

                      248KB

                    • memory/1056-139-0x0000000000400000-0x0000000000856000-memory.dmp
                      Filesize

                      4.3MB

                    • memory/1056-132-0x0000000000992000-0x00000000009B1000-memory.dmp
                      Filesize

                      124KB

                    • memory/1056-134-0x0000000000400000-0x0000000000856000-memory.dmp
                      Filesize

                      4.3MB

                    • memory/1056-138-0x0000000000992000-0x00000000009B1000-memory.dmp
                      Filesize

                      124KB

                    • memory/1676-148-0x0000000000000000-mapping.dmp
                    • memory/1744-176-0x0000000000760000-0x0000000000788000-memory.dmp
                      Filesize

                      160KB

                    • memory/1744-173-0x0000000000000000-mapping.dmp
                    • memory/1920-140-0x0000000000000000-mapping.dmp
                    • memory/1936-205-0x0000000000000000-mapping.dmp
                    • memory/2356-204-0x0000000000400000-0x0000000000856000-memory.dmp
                      Filesize

                      4.3MB

                    • memory/2356-203-0x0000000000A44000-0x0000000000A63000-memory.dmp
                      Filesize

                      124KB

                    • memory/2392-141-0x0000000000000000-mapping.dmp
                    • memory/2600-146-0x0000000000000000-mapping.dmp
                    • memory/2804-158-0x0000000000000000-mapping.dmp
                    • memory/2828-143-0x0000000000000000-mapping.dmp
                    • memory/3012-181-0x0000000000000000-mapping.dmp
                    • memory/3208-145-0x0000000000000000-mapping.dmp
                    • memory/3328-211-0x0000000000400000-0x0000000000856000-memory.dmp
                      Filesize

                      4.3MB

                    • memory/3328-210-0x0000000000BB4000-0x0000000000BD3000-memory.dmp
                      Filesize

                      124KB

                    • memory/3616-177-0x00000000034C0000-0x000000000358B000-memory.dmp
                      Filesize

                      812KB

                    • memory/3616-170-0x0000000003360000-0x00000000034A1000-memory.dmp
                      Filesize

                      1.3MB

                    • memory/3616-169-0x0000000003060000-0x0000000003213000-memory.dmp
                      Filesize

                      1.7MB

                    • memory/3616-162-0x0000000000000000-mapping.dmp
                    • memory/3616-197-0x0000000003360000-0x00000000034A1000-memory.dmp
                      Filesize

                      1.3MB

                    • memory/3616-179-0x00000000035A0000-0x0000000003657000-memory.dmp
                      Filesize

                      732KB

                    • memory/3616-178-0x00000000035A0000-0x0000000003657000-memory.dmp
                      Filesize

                      732KB

                    • memory/3648-147-0x0000000000000000-mapping.dmp
                    • memory/4268-156-0x0000000004BB0000-0x0000000004BC2000-memory.dmp
                      Filesize

                      72KB

                    • memory/4268-172-0x0000000005C70000-0x0000000005CC0000-memory.dmp
                      Filesize

                      320KB

                    • memory/4268-150-0x0000000000000000-mapping.dmp
                    • memory/4268-154-0x0000000005100000-0x0000000005718000-memory.dmp
                      Filesize

                      6.1MB

                    • memory/4268-155-0x0000000004C80000-0x0000000004D8A000-memory.dmp
                      Filesize

                      1.0MB

                    • memory/4268-186-0x0000000006E60000-0x000000000738C000-memory.dmp
                      Filesize

                      5.2MB

                    • memory/4268-165-0x0000000004F60000-0x0000000004FC6000-memory.dmp
                      Filesize

                      408KB

                    • memory/4268-184-0x0000000006760000-0x0000000006922000-memory.dmp
                      Filesize

                      1.8MB

                    • memory/4268-157-0x0000000004C10000-0x0000000004C4C000-memory.dmp
                      Filesize

                      240KB

                    • memory/4268-153-0x0000000000200000-0x0000000000228000-memory.dmp
                      Filesize

                      160KB

                    • memory/4268-171-0x0000000005BB0000-0x0000000005C26000-memory.dmp
                      Filesize

                      472KB

                    • memory/4268-166-0x0000000005FE0000-0x0000000006584000-memory.dmp
                      Filesize

                      5.6MB

                    • memory/4268-167-0x0000000005B10000-0x0000000005BA2000-memory.dmp
                      Filesize

                      584KB

                    • memory/4652-199-0x0000000000000000-mapping.dmp
                    • memory/4688-135-0x0000000000000000-mapping.dmp
                    • memory/4688-144-0x0000000000400000-0x0000000000856000-memory.dmp
                      Filesize

                      4.3MB

                    • memory/4688-168-0x0000000000400000-0x0000000000856000-memory.dmp
                      Filesize

                      4.3MB

                    • memory/4688-142-0x00000000009C3000-0x00000000009E2000-memory.dmp
                      Filesize

                      124KB

                    • memory/4968-161-0x0000000000000000-mapping.dmp