Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-11-2022 14:10

General

  • Target

    701a17a2c1f352456322e3ee71750d6b8ba489ccfa8473b9a5015d22c655f5e2.exe

  • Size

    270KB

  • MD5

    c3f217c7e28155a109494f7254a2226e

  • SHA1

    44c3a2bf56a3a7915132348d7ccfb88f82cfa699

  • SHA256

    701a17a2c1f352456322e3ee71750d6b8ba489ccfa8473b9a5015d22c655f5e2

  • SHA512

    f0e525ca1ab4d86fe68f9ab9f2a6b53eff2791e20a9ea882e212748350a48c3d93530d25dfa89f17cc3f3e317fb5caa6bd67c7ceec1c5fc280e7077943ab4bd7

  • SSDEEP

    3072:xXOiU9LJtfzg66CV4BhHbZv1K9EQMYz6HD9jxMzt4ZABnIiHKb+JYpLDzHWm73im:VU9LJO66fBBe16hjxMz9BpJcHni5lq

Malware Config

Extracted

Family

raccoon

Botnet

dbffbdbc9786a5c270e6dd2d647e18ea

C2

http://79.137.205.87/

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 2 IoCs
  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 5 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 5 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\701a17a2c1f352456322e3ee71750d6b8ba489ccfa8473b9a5015d22c655f5e2.exe
    "C:\Users\Admin\AppData\Local\Temp\701a17a2c1f352456322e3ee71750d6b8ba489ccfa8473b9a5015d22c655f5e2.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
      "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:4916
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3476
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          4⤵
            PID:4784
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "rovwer.exe" /P "Admin:N"
            4⤵
              PID:2080
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "rovwer.exe" /P "Admin:R" /E
              4⤵
                PID:3556
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                4⤵
                  PID:4104
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\99e342142d" /P "Admin:N"
                  4⤵
                    PID:3904
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\99e342142d" /P "Admin:R" /E
                    4⤵
                      PID:3724
                  • C:\Users\Admin\AppData\Local\Temp\1000104001\linda5.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000104001\linda5.exe"
                    3⤵
                    • Executes dropped EXE
                    • Checks computer location settings
                    • Suspicious use of WriteProcessMemory
                    PID:960
                    • C:\Windows\SysWOW64\msiexec.exe
                      "C:\Windows\System32\msiexec.exe" /y .\MrbWzo.6P
                      4⤵
                      • Loads dropped DLL
                      PID:3804
                  • C:\Users\Admin\AppData\Local\Temp\1000107001\av.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000107001\av.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:3780
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
                      4⤵
                        PID:3680
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
                        4⤵
                        • Loads dropped DLL
                        PID:2112
                    • C:\Users\Admin\AppData\Local\Temp\1000109001\rhe.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000109001\rhe.exe"
                      3⤵
                      • Executes dropped EXE
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      PID:1372
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 672
                        4⤵
                        • Program crash
                        PID:4516
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                      3⤵
                      • Blocklisted process makes network request
                      • Loads dropped DLL
                      • Accesses Microsoft Outlook profiles
                      • Suspicious behavior: EnumeratesProcesses
                      • outlook_win_path
                      PID:1192
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 1284
                    2⤵
                    • Program crash
                    PID:2400
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1056 -ip 1056
                  1⤵
                    PID:3048
                  • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                    C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                    1⤵
                    • Executes dropped EXE
                    PID:1956
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 420
                      2⤵
                      • Program crash
                      PID:1756
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1956 -ip 1956
                    1⤵
                      PID:4120
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1372 -ip 1372
                      1⤵
                        PID:4388
                      • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                        C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                        1⤵
                        • Executes dropped EXE
                        PID:4368
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 416
                          2⤵
                          • Program crash
                          PID:3232
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4368 -ip 4368
                        1⤵
                          PID:1300
                        • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                          C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                          1⤵
                          • Executes dropped EXE
                          PID:1020
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 416
                            2⤵
                            • Program crash
                            PID:4580
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1020 -ip 1020
                          1⤵
                            PID:1328

                          Network

                          MITRE ATT&CK Matrix ATT&CK v6

                          Execution

                          Scheduled Task

                          1
                          T1053

                          Persistence

                          Registry Run Keys / Startup Folder

                          1
                          T1060

                          Scheduled Task

                          1
                          T1053

                          Privilege Escalation

                          Scheduled Task

                          1
                          T1053

                          Defense Evasion

                          Modify Registry

                          1
                          T1112

                          Credential Access

                          Credentials in Files

                          2
                          T1081

                          Discovery

                          Query Registry

                          1
                          T1012

                          System Information Discovery

                          2
                          T1082

                          Collection

                          Data from Local System

                          2
                          T1005

                          Email Collection

                          1
                          T1114

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\LocalLow\mozglue.dll
                            Filesize

                            612KB

                            MD5

                            f07d9977430e762b563eaadc2b94bbfa

                            SHA1

                            da0a05b2b8d269fb73558dfcf0ed5c167f6d3877

                            SHA256

                            4191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862

                            SHA512

                            6afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf

                          • C:\Users\Admin\AppData\LocalLow\nss3.dll
                            Filesize

                            1.9MB

                            MD5

                            f67d08e8c02574cbc2f1122c53bfb976

                            SHA1

                            6522992957e7e4d074947cad63189f308a80fcf2

                            SHA256

                            c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e

                            SHA512

                            2e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5

                          • C:\Users\Admin\AppData\LocalLow\sqlite3.dll
                            Filesize

                            1.0MB

                            MD5

                            dbf4f8dcefb8056dc6bae4b67ff810ce

                            SHA1

                            bbac1dd8a07c6069415c04b62747d794736d0689

                            SHA256

                            47b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68

                            SHA512

                            b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1

                          • C:\Users\Admin\AppData\Local\Temp\1000104001\linda5.exe
                            Filesize

                            1.8MB

                            MD5

                            096edbd4f3de5242a85c93f84907a61b

                            SHA1

                            561e6f0c8c19086fab69b46940b1a15e9632f03a

                            SHA256

                            070c40e66930feb2f86f4ce4b67751eef03a40fa61a742034dcae55d83879b52

                            SHA512

                            66cf397058424b88cb1ee5f975f6d81406e83cd4e441d979b366cb158cd7a5940eba018a68060ebd1f74a917f458a895ee04720dce1ee207d02938bd8598277f

                          • C:\Users\Admin\AppData\Local\Temp\1000104001\linda5.exe
                            Filesize

                            1.8MB

                            MD5

                            096edbd4f3de5242a85c93f84907a61b

                            SHA1

                            561e6f0c8c19086fab69b46940b1a15e9632f03a

                            SHA256

                            070c40e66930feb2f86f4ce4b67751eef03a40fa61a742034dcae55d83879b52

                            SHA512

                            66cf397058424b88cb1ee5f975f6d81406e83cd4e441d979b366cb158cd7a5940eba018a68060ebd1f74a917f458a895ee04720dce1ee207d02938bd8598277f

                          • C:\Users\Admin\AppData\Local\Temp\1000107001\av.exe
                            Filesize

                            1.3MB

                            MD5

                            e183a2b4a47cd6e1e922b987450216f8

                            SHA1

                            81af106bc20dbff1c3892a88134f52d0a10f5159

                            SHA256

                            77860ceeea9d024405a1ceb41a347159a49c9dcf480bcf7fb1272eda405e52b6

                            SHA512

                            d2220161f3f5ad91729cc075dae7ad0956b04eb4013d47c50a3ff6ca2c2ef5bf2c2f9ff380c7f952c39480d3c667ac3c1f8f3269515d51fc5e589a07f496f0a7

                          • C:\Users\Admin\AppData\Local\Temp\1000107001\av.exe
                            Filesize

                            1.3MB

                            MD5

                            e183a2b4a47cd6e1e922b987450216f8

                            SHA1

                            81af106bc20dbff1c3892a88134f52d0a10f5159

                            SHA256

                            77860ceeea9d024405a1ceb41a347159a49c9dcf480bcf7fb1272eda405e52b6

                            SHA512

                            d2220161f3f5ad91729cc075dae7ad0956b04eb4013d47c50a3ff6ca2c2ef5bf2c2f9ff380c7f952c39480d3c667ac3c1f8f3269515d51fc5e589a07f496f0a7

                          • C:\Users\Admin\AppData\Local\Temp\1000109001\rhe.exe
                            Filesize

                            311KB

                            MD5

                            60ddb472e3be9361539029a26b8c2f81

                            SHA1

                            b89cba8f1933ae590b59ef7aba8d6d55fca0def6

                            SHA256

                            ebf739266afc974898af811328d93ee1d14e4c214a808383967fcfb4522ff7d7

                            SHA512

                            2796ec78362beb5a2219a1e01dd5e5a87f975b90e009392f742420dba6f6bebc5f6de809006a5b89f30cdba090d306b31c3cf8db06d3597a3f69ec24fac79405

                          • C:\Users\Admin\AppData\Local\Temp\1000109001\rhe.exe
                            Filesize

                            311KB

                            MD5

                            60ddb472e3be9361539029a26b8c2f81

                            SHA1

                            b89cba8f1933ae590b59ef7aba8d6d55fca0def6

                            SHA256

                            ebf739266afc974898af811328d93ee1d14e4c214a808383967fcfb4522ff7d7

                            SHA512

                            2796ec78362beb5a2219a1e01dd5e5a87f975b90e009392f742420dba6f6bebc5f6de809006a5b89f30cdba090d306b31c3cf8db06d3597a3f69ec24fac79405

                          • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                            Filesize

                            270KB

                            MD5

                            c3f217c7e28155a109494f7254a2226e

                            SHA1

                            44c3a2bf56a3a7915132348d7ccfb88f82cfa699

                            SHA256

                            701a17a2c1f352456322e3ee71750d6b8ba489ccfa8473b9a5015d22c655f5e2

                            SHA512

                            f0e525ca1ab4d86fe68f9ab9f2a6b53eff2791e20a9ea882e212748350a48c3d93530d25dfa89f17cc3f3e317fb5caa6bd67c7ceec1c5fc280e7077943ab4bd7

                          • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                            Filesize

                            270KB

                            MD5

                            c3f217c7e28155a109494f7254a2226e

                            SHA1

                            44c3a2bf56a3a7915132348d7ccfb88f82cfa699

                            SHA256

                            701a17a2c1f352456322e3ee71750d6b8ba489ccfa8473b9a5015d22c655f5e2

                            SHA512

                            f0e525ca1ab4d86fe68f9ab9f2a6b53eff2791e20a9ea882e212748350a48c3d93530d25dfa89f17cc3f3e317fb5caa6bd67c7ceec1c5fc280e7077943ab4bd7

                          • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                            Filesize

                            270KB

                            MD5

                            c3f217c7e28155a109494f7254a2226e

                            SHA1

                            44c3a2bf56a3a7915132348d7ccfb88f82cfa699

                            SHA256

                            701a17a2c1f352456322e3ee71750d6b8ba489ccfa8473b9a5015d22c655f5e2

                            SHA512

                            f0e525ca1ab4d86fe68f9ab9f2a6b53eff2791e20a9ea882e212748350a48c3d93530d25dfa89f17cc3f3e317fb5caa6bd67c7ceec1c5fc280e7077943ab4bd7

                          • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                            Filesize

                            270KB

                            MD5

                            c3f217c7e28155a109494f7254a2226e

                            SHA1

                            44c3a2bf56a3a7915132348d7ccfb88f82cfa699

                            SHA256

                            701a17a2c1f352456322e3ee71750d6b8ba489ccfa8473b9a5015d22c655f5e2

                            SHA512

                            f0e525ca1ab4d86fe68f9ab9f2a6b53eff2791e20a9ea882e212748350a48c3d93530d25dfa89f17cc3f3e317fb5caa6bd67c7ceec1c5fc280e7077943ab4bd7

                          • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                            Filesize

                            270KB

                            MD5

                            c3f217c7e28155a109494f7254a2226e

                            SHA1

                            44c3a2bf56a3a7915132348d7ccfb88f82cfa699

                            SHA256

                            701a17a2c1f352456322e3ee71750d6b8ba489ccfa8473b9a5015d22c655f5e2

                            SHA512

                            f0e525ca1ab4d86fe68f9ab9f2a6b53eff2791e20a9ea882e212748350a48c3d93530d25dfa89f17cc3f3e317fb5caa6bd67c7ceec1c5fc280e7077943ab4bd7

                          • C:\Users\Admin\AppData\Local\Temp\MrbWzo.6P
                            Filesize

                            2.2MB

                            MD5

                            b03aa16a1eadfa28855477e97c5fa390

                            SHA1

                            358b808811bc65006eb9dd01a1c30328a40da43a

                            SHA256

                            0f5a92cb4b3ec168e1edf57439d7ea424198aaadc306be16d93a3dbca1d11e5c

                            SHA512

                            cbe50f4c134d0995538c7ef660b79677c12f8e4d62707253b8584e2450f2146ef6d00693302db7d90e93197497de302a687a789c68f2507d16afde42b13903cd

                          • C:\Users\Admin\AppData\Local\Temp\MrbWzo.6P
                            Filesize

                            2.2MB

                            MD5

                            b03aa16a1eadfa28855477e97c5fa390

                            SHA1

                            358b808811bc65006eb9dd01a1c30328a40da43a

                            SHA256

                            0f5a92cb4b3ec168e1edf57439d7ea424198aaadc306be16d93a3dbca1d11e5c

                            SHA512

                            cbe50f4c134d0995538c7ef660b79677c12f8e4d62707253b8584e2450f2146ef6d00693302db7d90e93197497de302a687a789c68f2507d16afde42b13903cd

                          • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                            Filesize

                            126KB

                            MD5

                            507e9dc7b9c42f535b6df96d79179835

                            SHA1

                            acf41fb549750023115f060071aa5ca8c33f249e

                            SHA256

                            3b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af

                            SHA512

                            70907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302

                          • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                            Filesize

                            126KB

                            MD5

                            507e9dc7b9c42f535b6df96d79179835

                            SHA1

                            acf41fb549750023115f060071aa5ca8c33f249e

                            SHA256

                            3b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af

                            SHA512

                            70907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302

                          • memory/960-150-0x0000000000000000-mapping.dmp
                          • memory/1020-204-0x000000000088A000-0x00000000008A9000-memory.dmp
                            Filesize

                            124KB

                          • memory/1020-205-0x0000000000400000-0x0000000000846000-memory.dmp
                            Filesize

                            4.3MB

                          • memory/1056-138-0x00000000009C7000-0x00000000009E6000-memory.dmp
                            Filesize

                            124KB

                          • memory/1056-133-0x0000000000890000-0x00000000008CE000-memory.dmp
                            Filesize

                            248KB

                          • memory/1056-132-0x00000000009C7000-0x00000000009E6000-memory.dmp
                            Filesize

                            124KB

                          • memory/1056-134-0x0000000000400000-0x0000000000846000-memory.dmp
                            Filesize

                            4.3MB

                          • memory/1056-139-0x0000000000400000-0x0000000000846000-memory.dmp
                            Filesize

                            4.3MB

                          • memory/1192-189-0x0000000000000000-mapping.dmp
                          • memory/1372-198-0x00000000009B0000-0x00000000009CD000-memory.dmp
                            Filesize

                            116KB

                          • memory/1372-186-0x00000000009FD000-0x0000000000A26000-memory.dmp
                            Filesize

                            164KB

                          • memory/1372-187-0x0000000002480000-0x00000000024B2000-memory.dmp
                            Filesize

                            200KB

                          • memory/1372-188-0x0000000000400000-0x0000000000851000-memory.dmp
                            Filesize

                            4.3MB

                          • memory/1372-193-0x0000000000A27000-0x0000000000A2A000-memory.dmp
                            Filesize

                            12KB

                          • memory/1372-176-0x0000000000000000-mapping.dmp
                          • memory/1372-197-0x0000000000400000-0x0000000000851000-memory.dmp
                            Filesize

                            4.3MB

                          • memory/1372-196-0x00000000009FD000-0x0000000000A26000-memory.dmp
                            Filesize

                            164KB

                          • memory/1956-167-0x0000000000400000-0x0000000000846000-memory.dmp
                            Filesize

                            4.3MB

                          • memory/1956-166-0x0000000000A6A000-0x0000000000A89000-memory.dmp
                            Filesize

                            124KB

                          • memory/2052-145-0x0000000000400000-0x0000000000846000-memory.dmp
                            Filesize

                            4.3MB

                          • memory/2052-143-0x0000000000A36000-0x0000000000A55000-memory.dmp
                            Filesize

                            124KB

                          • memory/2052-135-0x0000000000000000-mapping.dmp
                          • memory/2052-163-0x0000000000A36000-0x0000000000A55000-memory.dmp
                            Filesize

                            124KB

                          • memory/2052-164-0x0000000000400000-0x0000000000846000-memory.dmp
                            Filesize

                            4.3MB

                          • memory/2080-144-0x0000000000000000-mapping.dmp
                          • memory/2112-199-0x0000000000400000-0x0000000000412000-memory.dmp
                            Filesize

                            72KB

                          • memory/2112-180-0x0000000000400000-0x0000000000412000-memory.dmp
                            Filesize

                            72KB

                          • memory/2112-182-0x0000000000400000-0x0000000000412000-memory.dmp
                            Filesize

                            72KB

                          • memory/2112-184-0x0000000000400000-0x0000000000412000-memory.dmp
                            Filesize

                            72KB

                          • memory/2112-179-0x0000000000000000-mapping.dmp
                          • memory/3476-141-0x0000000000000000-mapping.dmp
                          • memory/3556-146-0x0000000000000000-mapping.dmp
                          • memory/3680-175-0x0000000000000000-mapping.dmp
                          • memory/3724-149-0x0000000000000000-mapping.dmp
                          • memory/3780-172-0x000000000FFF0000-0x00000000100E0000-memory.dmp
                            Filesize

                            960KB

                          • memory/3780-168-0x0000000000000000-mapping.dmp
                          • memory/3780-174-0x000000000FFF0000-0x00000000100E0000-memory.dmp
                            Filesize

                            960KB

                          • memory/3780-171-0x000000000204F000-0x0000000002572000-memory.dmp
                            Filesize

                            5.1MB

                          • memory/3780-173-0x00000000026CD000-0x00000000027D0000-memory.dmp
                            Filesize

                            1.0MB

                          • memory/3780-185-0x00000000026CD000-0x00000000027D0000-memory.dmp
                            Filesize

                            1.0MB

                          • memory/3804-159-0x00000000031A0000-0x0000000003256000-memory.dmp
                            Filesize

                            728KB

                          • memory/3804-153-0x0000000000000000-mapping.dmp
                          • memory/3804-162-0x0000000002FB0000-0x00000000030CD000-memory.dmp
                            Filesize

                            1.1MB

                          • memory/3804-156-0x0000000002D00000-0x0000000002E83000-memory.dmp
                            Filesize

                            1.5MB

                          • memory/3804-158-0x00000000030D0000-0x000000000319A000-memory.dmp
                            Filesize

                            808KB

                          • memory/3804-157-0x0000000002FB0000-0x00000000030CD000-memory.dmp
                            Filesize

                            1.1MB

                          • memory/3904-148-0x0000000000000000-mapping.dmp
                          • memory/4104-147-0x0000000000000000-mapping.dmp
                          • memory/4368-201-0x00000000009CA000-0x00000000009E9000-memory.dmp
                            Filesize

                            124KB

                          • memory/4368-202-0x0000000000400000-0x0000000000846000-memory.dmp
                            Filesize

                            4.3MB

                          • memory/4784-142-0x0000000000000000-mapping.dmp
                          • memory/4916-140-0x0000000000000000-mapping.dmp