Analysis

  • max time kernel
    123s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-01-2023 06:35

General

  • Target

    7e6e883a0e31b907f50dee651a4a9c54516496c85bf86d2b328e033331661bdb.exe

  • Size

    258KB

  • MD5

    9edbea943982f7a94e9fbbeaad334299

  • SHA1

    e671870f03ba365635b07b27f508c96c66de3bc4

  • SHA256

    7e6e883a0e31b907f50dee651a4a9c54516496c85bf86d2b328e033331661bdb

  • SHA512

    3314db9ebdc307e8c5a987d1b2e619ed404a4d59f1e7ffdc97b64c51616782fd3e14b9f74d1154ffd244d6b2c50d1d225a4b0d7be3e998eb4a3bbfd4ef13c687

  • SSDEEP

    6144:77PXfWLqmrvtrVxmhIsLkliDTrrj9U4zqQna:77P+2m7tfmqqkliDTrrxFP

Malware Config

Extracted

Family

lumma

C2

77.73.134.68

Signatures

  • Detects Smokeloader packer 1 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 6 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 41 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 64 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e6e883a0e31b907f50dee651a4a9c54516496c85bf86d2b328e033331661bdb.exe
    "C:\Users\Admin\AppData\Local\Temp\7e6e883a0e31b907f50dee651a4a9c54516496c85bf86d2b328e033331661bdb.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4268
  • C:\Users\Admin\AppData\Local\Temp\EF27.exe
    C:\Users\Admin\AppData\Local\Temp\EF27.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4952
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Sdaaysrpyefiy.tmp",Qowsuiaedfeupa
      2⤵
      • Blocklisted process makes network request
      • Sets DLL path for service in the registry
      • Sets service image path in registry
      • Loads dropped DLL
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:4800
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 18636
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:4448
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:2248
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
          3⤵
            PID:1536
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
            3⤵
              PID:3932
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
              3⤵
                PID:4328
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                3⤵
                  PID:3336
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                  3⤵
                    PID:1852
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                    3⤵
                      PID:3424
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                      3⤵
                        PID:2548
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                        3⤵
                          PID:4764
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                          3⤵
                            PID:4772
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                            3⤵
                              PID:2888
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                              3⤵
                                PID:3324
                              • C:\Windows\SysWOW64\schtasks.exe
                                schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                                3⤵
                                  PID:436
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                                  3⤵
                                    PID:528
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                                    3⤵
                                      PID:1584
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                                      3⤵
                                        PID:2276
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 560
                                      2⤵
                                      • Program crash
                                      PID:1156
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4952 -ip 4952
                                    1⤵
                                      PID:4820
                                    • C:\Windows\SysWOW64\svchost.exe
                                      C:\Windows\SysWOW64\svchost.exe -k LocalService
                                      1⤵
                                      • Loads dropped DLL
                                      • Checks processor information in registry
                                      • Suspicious use of WriteProcessMemory
                                      PID:4972
                                      • C:\Windows\SysWOW64\rundll32.exe
                                        "C:\Windows\system32\rundll32.exe" "c:\program files (x86)\windowspowershell\modules\logsession.dll",VUkMMnFYWlA=
                                        2⤵
                                        • Loads dropped DLL
                                        • Checks processor information in registry
                                        PID:544
                                    • C:\Windows\System32\rundll32.exe
                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                      1⤵
                                        PID:3140
                                      • C:\Users\Admin\AppData\Local\Temp\588C.exe
                                        C:\Users\Admin\AppData\Local\Temp\588C.exe
                                        1⤵
                                        • Executes dropped EXE
                                        PID:912
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 912 -s 1336
                                          2⤵
                                          • Program crash
                                          PID:3208
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 912 -ip 912
                                        1⤵
                                          PID:2472

                                        Network

                                        MITRE ATT&CK Enterprise v6

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Program Files (x86)\WindowsPowerShell\Modules\logsession.dll
                                          Filesize

                                          774KB

                                          MD5

                                          c859371e43b171e58827b8735ddc2051

                                          SHA1

                                          02111009442ac9d2e41e1149af6b8e7a657e961b

                                          SHA256

                                          84e62625a0b5a78af8aa2b1d3ed735bb7cf49882214ef411f8b30bb90caaf4b4

                                          SHA512

                                          ee40a5604fb312db2d239b2758b85d13e49d8750928b1f2a021d805593fbdf76dacc8d4341f5cd7c53439b3765c6bfd79cfd04a462beca2dcb57cb3f0f0f7259

                                        • C:\Program Files (x86)\WindowsPowerShell\Modules\logsession.dll
                                          Filesize

                                          774KB

                                          MD5

                                          c859371e43b171e58827b8735ddc2051

                                          SHA1

                                          02111009442ac9d2e41e1149af6b8e7a657e961b

                                          SHA256

                                          84e62625a0b5a78af8aa2b1d3ed735bb7cf49882214ef411f8b30bb90caaf4b4

                                          SHA512

                                          ee40a5604fb312db2d239b2758b85d13e49d8750928b1f2a021d805593fbdf76dacc8d4341f5cd7c53439b3765c6bfd79cfd04a462beca2dcb57cb3f0f0f7259

                                        • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\AirSpace.Etw.man
                                          Filesize

                                          412KB

                                          MD5

                                          39e5270caae15015c8203fec413669c7

                                          SHA1

                                          f44f5617f2bc496fb497a1e8ad13997ccecf0f6d

                                          SHA256

                                          2e6cbfc09039d76897eaf701179ba2011d2ea134ca8b6c6e9792a0843006a5f1

                                          SHA512

                                          9bdab6d4cea87cd1172a77554c0059dbd5f7f29ca754e4ed21aa99bc4b16f40fc28e32c81f0ab3ea49158c12cc6c5318a81bd942b916c0b1241b2c6818b2657a

                                        • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\C2RManifest.officemuiset.msi.16.en-us.xml
                                          Filesize

                                          1KB

                                          MD5

                                          576aefa0d5cef530c59ff90625d60e25

                                          SHA1

                                          19be51d3942120e5474e0711592718da525eaa20

                                          SHA256

                                          f5b39bd24efbf27831061a34d1a78cea8f0073bfccade786129495f17cf2f112

                                          SHA512

                                          0d342bb21bb9651c0c36831718d9009af790bf808a9f38ec1788a06428d08d1299f4e215bd08e4912acc25d0f41ae95f3118019aa2811e89f35453b0ef8b32bf

                                        • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\F46D4000-FD22-4DB4-AC8E-4E1DDDE828FE_10.0.19041.1023_neutral_neutral_cw5n1h2txyewy.xml
                                          Filesize

                                          2KB

                                          MD5

                                          db0acdbf49f80d3f3b0fb65a71b39341

                                          SHA1

                                          12c6d86ba5f90a1e1d2b4b4ec3bd94fc9f1296ae

                                          SHA256

                                          f8a8635147117201638a6a4dfa8dcd5b4506cbee07f582001d2a92da434a231f

                                          SHA512

                                          3d4e7547c8186164aa3fb7f08a50e6b065d536ca5ec8bc216c9dfd34c98e7c58c64ebcb39077fbd46370bc42b504acf769c6b3c7387cb98ec209087d4d46d784

                                        • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\Microsoft.GetHelp_10.1706.13331.0_neutral_~_8wekyb3d8bbwe.xml
                                          Filesize

                                          16KB

                                          MD5

                                          4194b927b32c56bb3a5ed72c164c917e

                                          SHA1

                                          ec60c6bb8b2d0181408c65b3456b7b3b92cca134

                                          SHA256

                                          86d065b6d87309122e9fce9b960f5d56a45dfcdd83122a4225ed9fd3136320d8

                                          SHA512

                                          c94baa6f849bb048e572667e19268754efc58bce6673373db9817c729b36acbfd0bb30975a441f2a5cd16e00be97db412dd82f1669c1701004a1e27307f75c1d

                                        • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe.xml
                                          Filesize

                                          5KB

                                          MD5

                                          1944801cae061223e36fcce6aed6bfba

                                          SHA1

                                          b465c53f3e6ae74fac368f36cbfc5842ce085e14

                                          SHA256

                                          b903a7f4408a27d0b7a7c6316d04952508d67058216dffeca4293c9352727959

                                          SHA512

                                          82b0e3b1105a5d802839c3ea78b4e2dd800b819ee678d016b2f47203ceb27a638d195909ec1d0efbf46edbf910409d7ab4a05146fc902ef335b36bf14339498f

                                        • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\Microsoft.NET.Native.Runtime.1.7_1.7.25531.0_x64__8wekyb3d8bbwe.xml
                                          Filesize

                                          1KB

                                          MD5

                                          d8c0aaaa1d4b2386b683f9f0e0150986

                                          SHA1

                                          98aa9efe9aa9e7c9b1c27eb70e1a704a5fc1315d

                                          SHA256

                                          47740c23beeeeccfc9a10b8ffc82c745385403faef48c5f4b9fb7c092f9e6083

                                          SHA512

                                          41c3f40a8ee3f353634fba846938a7aec4bb5b8f6b98f3f108c22c1278b4df4d97b1cf43a096f896b4130249040f5d6931cf1275876ec1ec0fc6a1e1cb99d56c

                                        • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\Uqioyhuair.tmp
                                          Filesize

                                          3.5MB

                                          MD5

                                          e59d2ba83ca6b9e34839eae119976fa2

                                          SHA1

                                          b367f10fa5e69295e1792f0f05f551cfc393113f

                                          SHA256

                                          fec0e40fa0f4810f73283da0806ac370c5b3d7df929289340e675b2c9b301923

                                          SHA512

                                          c4eaf939fb7fd337e4f281dfc7eca82344f3719dad7d307aaf48cd6ba2109cdc5e5a60b47b1f7320c79dd570f126de2a8dc43e81f2a45f872e43bc4c472402f9

                                        • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\guest.png
                                          Filesize

                                          5KB

                                          MD5

                                          d7ee4543371744836d520e0ce24a9ee6

                                          SHA1

                                          a6cda6aac3e480b269b9da2bd616bdb4d6fa87f0

                                          SHA256

                                          98817a572430813ca4ca2787dab20573f7864c5168ac6912f34d14b49e7bd7c9

                                          SHA512

                                          e15b6a50d9d498918a81488bf8d60860027f9a38f4d87e239f1c6e9d20fe4938e75861dad35c69e4087370c18b2cd5b482ab6ca694dfe205d053f1d303d17808

                                        • C:\Users\Admin\AppData\Local\Temp\588C.exe
                                          Filesize

                                          276KB

                                          MD5

                                          930f2ceba3c8821110756aa19b395676

                                          SHA1

                                          d2430e3e8dc6c193a90ef93da218c10f830e4395

                                          SHA256

                                          d21f82a8a0b55f753ba26a19444c5364a2b21d8451fcde32f659f57476fc399d

                                          SHA512

                                          dc6d093585e171ca366863cce09722e71e3718c8bab6d4432f92ccea6c926191bfbf5a0b7eb570189e070c4c8ca962a504e02f04661d6e3703efa642bec980d7

                                        • C:\Users\Admin\AppData\Local\Temp\588C.exe
                                          Filesize

                                          276KB

                                          MD5

                                          930f2ceba3c8821110756aa19b395676

                                          SHA1

                                          d2430e3e8dc6c193a90ef93da218c10f830e4395

                                          SHA256

                                          d21f82a8a0b55f753ba26a19444c5364a2b21d8451fcde32f659f57476fc399d

                                          SHA512

                                          dc6d093585e171ca366863cce09722e71e3718c8bab6d4432f92ccea6c926191bfbf5a0b7eb570189e070c4c8ca962a504e02f04661d6e3703efa642bec980d7

                                        • C:\Users\Admin\AppData\Local\Temp\EF27.exe
                                          Filesize

                                          1.1MB

                                          MD5

                                          6d723f32824837a925f039806621da44

                                          SHA1

                                          4740102a9705fb0d40c9ca8903754e44af3dbfb5

                                          SHA256

                                          953ed537130420cecd387eb127e1e0f87ae296ee8c9d582c5dd9a6959bc5d570

                                          SHA512

                                          f89f24ffe50d7be3718f451a04698e3ea3d04d62b69cdcd3ee4f0c77e90cce971ece7e2e72fa45ee7b8ec94fca6758de4fffc2b089d4ee8648689ee1178a5ab0

                                        • C:\Users\Admin\AppData\Local\Temp\EF27.exe
                                          Filesize

                                          1.1MB

                                          MD5

                                          6d723f32824837a925f039806621da44

                                          SHA1

                                          4740102a9705fb0d40c9ca8903754e44af3dbfb5

                                          SHA256

                                          953ed537130420cecd387eb127e1e0f87ae296ee8c9d582c5dd9a6959bc5d570

                                          SHA512

                                          f89f24ffe50d7be3718f451a04698e3ea3d04d62b69cdcd3ee4f0c77e90cce971ece7e2e72fa45ee7b8ec94fca6758de4fffc2b089d4ee8648689ee1178a5ab0

                                        • C:\Users\Admin\AppData\Local\Temp\Sdaaysrpyefiy.tmp
                                          Filesize

                                          774KB

                                          MD5

                                          e06fb66bfbe1444cc091f0297b8d32db

                                          SHA1

                                          c3e13e3edcbbf30cdc51ce96cc7a802fc88e83af

                                          SHA256

                                          b282eb3f05d375d3487d20596d783fa52aa27013e8b2b407db32d9a3a751319d

                                          SHA512

                                          c639b62f417d46148c3a84ae5ff2cc7018c653424cc1d643a983c41d4a12f6015df0f4359c5e078c2c3e5b1d42de18acfb6aab432266a8c4e37aa5449e961d95

                                        • C:\Users\Admin\AppData\Local\Temp\Sdaaysrpyefiy.tmp
                                          Filesize

                                          774KB

                                          MD5

                                          e06fb66bfbe1444cc091f0297b8d32db

                                          SHA1

                                          c3e13e3edcbbf30cdc51ce96cc7a802fc88e83af

                                          SHA256

                                          b282eb3f05d375d3487d20596d783fa52aa27013e8b2b407db32d9a3a751319d

                                          SHA512

                                          c639b62f417d46148c3a84ae5ff2cc7018c653424cc1d643a983c41d4a12f6015df0f4359c5e078c2c3e5b1d42de18acfb6aab432266a8c4e37aa5449e961d95

                                        • \??\c:\program files (x86)\windowspowershell\modules\logsession.dll
                                          Filesize

                                          774KB

                                          MD5

                                          c859371e43b171e58827b8735ddc2051

                                          SHA1

                                          02111009442ac9d2e41e1149af6b8e7a657e961b

                                          SHA256

                                          84e62625a0b5a78af8aa2b1d3ed735bb7cf49882214ef411f8b30bb90caaf4b4

                                          SHA512

                                          ee40a5604fb312db2d239b2758b85d13e49d8750928b1f2a021d805593fbdf76dacc8d4341f5cd7c53439b3765c6bfd79cfd04a462beca2dcb57cb3f0f0f7259

                                        • memory/436-197-0x0000000000000000-mapping.dmp
                                        • memory/528-198-0x0000000000000000-mapping.dmp
                                        • memory/544-172-0x00000000048D0000-0x0000000005425000-memory.dmp
                                          Filesize

                                          11.3MB

                                        • memory/544-171-0x00000000048D0000-0x0000000005425000-memory.dmp
                                          Filesize

                                          11.3MB

                                        • memory/544-161-0x0000000000000000-mapping.dmp
                                        • memory/912-189-0x0000000000400000-0x000000000044B000-memory.dmp
                                          Filesize

                                          300KB

                                        • memory/912-191-0x000000000058D000-0x00000000005A7000-memory.dmp
                                          Filesize

                                          104KB

                                        • memory/912-182-0x0000000000000000-mapping.dmp
                                        • memory/912-192-0x0000000000400000-0x000000000044B000-memory.dmp
                                          Filesize

                                          300KB

                                        • memory/912-187-0x000000000058D000-0x00000000005A7000-memory.dmp
                                          Filesize

                                          104KB

                                        • memory/912-188-0x0000000001F50000-0x0000000001F7A000-memory.dmp
                                          Filesize

                                          168KB

                                        • memory/1536-176-0x0000000000000000-mapping.dmp
                                        • memory/1584-199-0x0000000000000000-mapping.dmp
                                        • memory/1852-185-0x0000000000000000-mapping.dmp
                                        • memory/2248-175-0x0000000000000000-mapping.dmp
                                        • memory/2276-200-0x0000000000000000-mapping.dmp
                                        • memory/2548-190-0x0000000000000000-mapping.dmp
                                        • memory/2888-195-0x0000000000000000-mapping.dmp
                                        • memory/3324-196-0x0000000000000000-mapping.dmp
                                        • memory/3336-181-0x0000000000000000-mapping.dmp
                                        • memory/3424-186-0x0000000000000000-mapping.dmp
                                        • memory/3932-177-0x0000000000000000-mapping.dmp
                                        • memory/4268-135-0x0000000000400000-0x0000000000446000-memory.dmp
                                          Filesize

                                          280KB

                                        • memory/4268-133-0x00000000005E0000-0x00000000005E9000-memory.dmp
                                          Filesize

                                          36KB

                                        • memory/4268-132-0x000000000062E000-0x0000000000644000-memory.dmp
                                          Filesize

                                          88KB

                                        • memory/4268-134-0x0000000000400000-0x0000000000446000-memory.dmp
                                          Filesize

                                          280KB

                                        • memory/4328-179-0x0000000000000000-mapping.dmp
                                        • memory/4448-169-0x000002AD07A50000-0x000002AD07B90000-memory.dmp
                                          Filesize

                                          1.2MB

                                        • memory/4448-174-0x000002AD05FD0000-0x000002AD06285000-memory.dmp
                                          Filesize

                                          2.7MB

                                        • memory/4448-180-0x000002AD05FD0000-0x000002AD06285000-memory.dmp
                                          Filesize

                                          2.7MB

                                        • memory/4448-173-0x0000000000D40000-0x0000000000FE4000-memory.dmp
                                          Filesize

                                          2.6MB

                                        • memory/4448-170-0x000002AD07A50000-0x000002AD07B90000-memory.dmp
                                          Filesize

                                          1.2MB

                                        • memory/4448-167-0x00007FF724BB6890-mapping.dmp
                                        • memory/4764-193-0x0000000000000000-mapping.dmp
                                        • memory/4772-194-0x0000000000000000-mapping.dmp
                                        • memory/4800-148-0x0000000004B10000-0x0000000004C50000-memory.dmp
                                          Filesize

                                          1.2MB

                                        • memory/4800-147-0x0000000005440000-0x0000000005F95000-memory.dmp
                                          Filesize

                                          11.3MB

                                        • memory/4800-139-0x0000000000000000-mapping.dmp
                                        • memory/4800-166-0x0000000004B10000-0x0000000004C50000-memory.dmp
                                          Filesize

                                          1.2MB

                                        • memory/4800-165-0x0000000004B10000-0x0000000004C50000-memory.dmp
                                          Filesize

                                          1.2MB

                                        • memory/4800-164-0x0000000004B10000-0x0000000004C50000-memory.dmp
                                          Filesize

                                          1.2MB

                                        • memory/4800-163-0x0000000004B10000-0x0000000004C50000-memory.dmp
                                          Filesize

                                          1.2MB

                                        • memory/4800-145-0x0000000005440000-0x0000000005F95000-memory.dmp
                                          Filesize

                                          11.3MB

                                        • memory/4800-149-0x0000000004B10000-0x0000000004C50000-memory.dmp
                                          Filesize

                                          1.2MB

                                        • memory/4800-146-0x0000000005440000-0x0000000005F95000-memory.dmp
                                          Filesize

                                          11.3MB

                                        • memory/4952-144-0x0000000000400000-0x0000000000530000-memory.dmp
                                          Filesize

                                          1.2MB

                                        • memory/4952-143-0x0000000002320000-0x000000000244E000-memory.dmp
                                          Filesize

                                          1.2MB

                                        • memory/4952-142-0x000000000212F000-0x0000000002218000-memory.dmp
                                          Filesize

                                          932KB

                                        • memory/4952-136-0x0000000000000000-mapping.dmp
                                        • memory/4972-178-0x0000000004550000-0x00000000050A5000-memory.dmp
                                          Filesize

                                          11.3MB

                                        • memory/4972-153-0x0000000004550000-0x00000000050A5000-memory.dmp
                                          Filesize

                                          11.3MB

                                        • memory/4972-168-0x0000000004550000-0x00000000050A5000-memory.dmp
                                          Filesize

                                          11.3MB