Analysis

  • max time kernel
    155s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-04-2024 05:00

General

  • Target

    f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe

  • Size

    3.1MB

  • MD5

    f05e4420dfc79226b34b0f7e3d1a65f1

  • SHA1

    95c5fc288a628e2fba01879b0dbe0dbbd79ae74f

  • SHA256

    bd887a31360a06cf6094b3b889bf7ec9d835c9642bff6a0ed98bb248f225bf24

  • SHA512

    d427c45f260e9bd38fa5a843c4eeff5482c102ace9b3f083ce015e9ce303dd9c481b70a715764c3cec16c6dc0246ad66f251197945f52a13e4e5eab77542ce38

  • SSDEEP

    98304:qw3BM5HPz7UtPTkJY58taa7RTBQl50HeaCdRd9zojPGuH:qw3EHPzOTkJYla7RTBQl509CdRd9zojH

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

whiteshadows.ddns.net:9731

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    microsoft 2.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

gcleaner

C2

g-prtnrs.top

g-prtrs.top

Extracted

Family

redline

Botnet

UPD

C2

185.215.113.45:41009

Extracted

Family

redline

Botnet

Liez

C2

liezaphare.xyz:80

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • OnlyLogger

    A tiny loader that uses IPLogger to get its payload.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 3 IoCs
  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars payload 1 IoCs
  • Async RAT payload 1 IoCs
  • OnlyLogger payload 2 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 14 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:812
    • C:\Users\Admin\AppData\Local\Temp\3002.exe
      "C:\Users\Admin\AppData\Local\Temp\3002.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4956
      • C:\Users\Admin\AppData\Local\Temp\3002.exe
        "C:\Users\Admin\AppData\Local\Temp\3002.exe" -a
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        PID:4736
    • C:\Users\Admin\AppData\Local\Temp\askinstall54.exe
      "C:\Users\Admin\AppData\Local\Temp\askinstall54.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2460
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c taskkill /f /im chrome.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3296
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im chrome.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4280
    • C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe
      "C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4928
    • C:\Users\Admin\AppData\Local\Temp\Chrome3 2.exe
      "C:\Users\Admin\AppData\Local\Temp\Chrome3 2.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4820
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1412
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
          4⤵
          • Creates scheduled task(s)
          PID:3996
      • C:\Users\Admin\AppData\Roaming\services64.exe
        "C:\Users\Admin\AppData\Roaming\services64.exe"
        3⤵
        • Executes dropped EXE
        PID:3600
    • C:\Users\Admin\AppData\Local\Temp\GLKbrow.exe
      "C:\Users\Admin\AppData\Local\Temp\GLKbrow.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:380
      • C:\Users\Admin\AppData\Local\Temp\GLKbrow.exe
        C:\Users\Admin\AppData\Local\Temp\GLKbrow.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4912
    • C:\Users\Admin\AppData\Local\Temp\jhuuee.exe
      "C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"
      2⤵
      • Executes dropped EXE
      PID:2816
    • C:\Users\Admin\AppData\Local\Temp\microsoft 2.exe
      "C:\Users\Admin\AppData\Local\Temp\microsoft 2.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4260
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "microsoft 2" /tr '"C:\Users\Admin\AppData\Roaming\microsoft 2.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3676
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "microsoft 2" /tr '"C:\Users\Admin\AppData\Roaming\microsoft 2.exe"'
          4⤵
          • Creates scheduled task(s)
          PID:3524
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpDF9D.tmp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2592
        • C:\Windows\SysWOW64\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:1452
        • C:\Users\Admin\AppData\Roaming\microsoft 2.exe
          "C:\Users\Admin\AppData\Roaming\microsoft 2.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4380
    • C:\Users\Admin\AppData\Local\Temp\NGlorySetp.exe
      "C:\Users\Admin\AppData\Local\Temp\NGlorySetp.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1592
    • C:\Users\Admin\AppData\Local\Temp\setup.exe
      "C:\Users\Admin\AppData\Local\Temp\setup.exe"
      2⤵
      • Executes dropped EXE
      PID:3156
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3156 -s 796
        3⤵
        • Program crash
        PID:4944
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3156 -s 804
        3⤵
        • Program crash
        PID:3700
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3156 -s 800
        3⤵
        • Program crash
        PID:4120
    • C:\Users\Admin\AppData\Local\Temp\updatenew.exe
      "C:\Users\Admin\AppData\Local\Temp\updatenew.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2344
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4168 --field-trial-handle=2276,i,5697607538120380977,9987005253899555344,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1436
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3156 -ip 3156
      1⤵
        PID:1796
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3156 -ip 3156
        1⤵
          PID:1872
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3156 -ip 3156
          1⤵
            PID:3508

          Network

          MITRE ATT&CK Matrix ATT&CK v13

          Execution

          Scheduled Task/Job

          1
          T1053

          Persistence

          Scheduled Task/Job

          1
          T1053

          Privilege Escalation

          Scheduled Task/Job

          1
          T1053

          Defense Evasion

          Subvert Trust Controls

          1
          T1553

          Install Root Certificate

          1
          T1553.004

          Modify Registry

          1
          T1112

          Credential Access

          Unsecured Credentials

          1
          T1552

          Credentials In Files

          1
          T1552.001

          Discovery

          Query Registry

          2
          T1012

          System Information Discovery

          2
          T1082

          Collection

          Data from Local System

          1
          T1005

          Command and Control

          Web Service

          1
          T1102

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\microsoft 2.exe.log
            Filesize

            522B

            MD5

            acc9090417037dfa2a55b46ed86e32b8

            SHA1

            53fa6fb25fb3e88c24d2027aca6ae492b2800a4d

            SHA256

            2412679218bb0a7d05ceee32869bbb223619bde9966c4c460a68304a3367724b

            SHA512

            d51f7085ec147c708f446b9fb6923cd2fb64596d354ed929e125b30ace57c8cb3217589447a36960e5d3aea87a4e48aaa82c7509eced6d6c2cecd71fcfe3697b

          • C:\Users\Admin\AppData\Local\Temp\3002.exe
            Filesize

            56KB

            MD5

            e511bb4cf31a2307b6f3445a869bcf31

            SHA1

            76f5c6e8df733ac13d205d426831ed7672a05349

            SHA256

            56002017746f61eee8d8e9b5ad2f3cbb119dc99300c5b6d32c1be184d3e25137

            SHA512

            9c81de34bf3b0eb75405c726d641ef6090054e9be8e0c0ab1bb2ed095e6477ce2fa8996868bf8a77a720b210a76b5f4e1b3b086d7f40449d79498681b367199c

          • C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe
            Filesize

            6KB

            MD5

            e4ff121d36dff8e94df4e718ecd84aff

            SHA1

            b84af5dae944bbf34d289d7616d2fef09dab26b7

            SHA256

            2a019bc6bace686b08286ee7d8e2e66c18283b162d27774c486037c940dc60cc

            SHA512

            141f12468cfe737b3694a4ece8f17c5d35bbade05ee0538fe4ef4fccf61584374f79a474fd4bf82685a4840afd94e9a9bbd9c9f357cb342dda9f89109c4da5f4

          • C:\Users\Admin\AppData\Local\Temp\Chrome3 2.exe
            Filesize

            43KB

            MD5

            58eea186f52da3256cc01e3856bca5c0

            SHA1

            35e8b3f570d572ea56fdf0dfb480e9cc4a36d986

            SHA256

            26021efed039139a1c40ad7125a380e166321c65bc7354ea45d74ece6b0c692f

            SHA512

            0d69916dde2e6a24a7addb9f1b21b51ff4b9d0b2052a719af431c6a382647bb01fdd96aedf89dc9c531faf3d2849fd2dc505385b929df23d8e7b1c3c5a9d740a

          • C:\Users\Admin\AppData\Local\Temp\GLKbrow.exe
            Filesize

            390KB

            MD5

            a186a0ef26742808b75c2ef534ece63c

            SHA1

            d79062c6c9c039831e54c88fb67cd64e8146048c

            SHA256

            18bc677465a6195706664788be8d88acd5cfd4abdad074aa1e1f0b2fbfed2b76

            SHA512

            f5d2304750011a920bf1c219185bf9963fb47ab52e1fec96ce98cd15853fe6b592356b638f2f3628d3f5a1a45c47e85db1fb2d5a00a85840ad3e296ff130c21b

          • C:\Users\Admin\AppData\Local\Temp\NGlorySetp.exe
            Filesize

            120KB

            MD5

            bf08a1385317518360e2fd24e25a67e2

            SHA1

            00b5d4aa063217b31755c4a698135915671f231f

            SHA256

            d06d7d96e973671151438fe57a33c2834f7427c6c39501c22e0fbf1bd38de227

            SHA512

            802750549a8302a69255e48ffe9b293babf26693e533484050449993e5c9365bf4b137013cbb7ae75359abe3a557bd4cc67b143be7dccad41b02a3ff5c0af5dc

          • C:\Users\Admin\AppData\Local\Temp\askinstall54.exe
            Filesize

            1.4MB

            MD5

            f15409c47e5eb9ef4b316c3c8d2d3936

            SHA1

            32df482df77e5ef84560ff814a725831acb89b42

            SHA256

            ec860b4ca9a08990622bc7fd0606383c965de9dd58bcf2022de601988fb7e3a4

            SHA512

            2e8ba5d6b6d599f4df23365f0f93eee65f51ad369794b0d43d4e56a9060700a038e7af9dc15bca3034c20cfadc2300dff526ec64fb08c9499cb2fa24943949fc

          • C:\Users\Admin\AppData\Local\Temp\jhuuee.exe
            Filesize

            239KB

            MD5

            1fa531c00decf91ca71f207cac84eaf7

            SHA1

            8131ac8c897ba6f76175cfed34cbd7b1c96d1e19

            SHA256

            81613cf7f25302f85a8f6e80cea1fee589e6b05828ed6b0946b3855f7c70233f

            SHA512

            5b2c27bc949f618dbb8bd94339f35ca5f55c0fd7f347463c79d3d1ec0b033322be65542429397fdbcccf9e92163b82505f5113c48ff111ec08ca050fb9812be7

          • C:\Users\Admin\AppData\Local\Temp\microsoft 2.exe
            Filesize

            45KB

            MD5

            96e4aa05fbaf3ee4aa018be285821cb0

            SHA1

            8152a37db98c8b4cd96e66ae5942a5c0afce2fa1

            SHA256

            b8957cff3e10c9e25e2fb62a044646e153a22d5b1943613270568dccef3a4fcd

            SHA512

            51e8e0e041d8ceb6e889ede1ac2b3a0d4979cc8eff1a1216f5d5caa67cacba7563c3bb8f4c98d5c9b9ef3d95dbd9a839ff532d79109a208ba70e9f61d9d026d8

          • C:\Users\Admin\AppData\Local\Temp\setup.exe
            Filesize

            370KB

            MD5

            9e71e05b637b04dd7ea315b4ac6feb4a

            SHA1

            78dbe6d8fe1af0009fdc803cdf40a7101422fa94

            SHA256

            733693a304149939abc2dba1857e2f37111eba29b3c5d47dc3cf5243dd3dbb1a

            SHA512

            dd31ac2fdfde46b5ade917bf102732bcf5c193de4060a9813b750f907051e822731273a8ab2ea999903354bf434132f6a7176da2ea1988a08c06714ff4a1445b

          • C:\Users\Admin\AppData\Local\Temp\tmpDF9D.tmp.bat
            Filesize

            155B

            MD5

            0f9500a079f9decb60f3b80eb9787530

            SHA1

            0a1610b2ebddde9c0b0d8b291fc43092e041d43d

            SHA256

            1002709415a05dd9acac8cfde30049c34d822fc1349fa64d5b3b9e80d50be546

            SHA512

            bbf40501012d19f9366981d0b7153e224930d6eae331b7375d3197bc9710979aaad967e01bbe11f8993ef710f7ecf825164e4592bbd73d68dd52042b1fff5d0c

          • C:\Users\Admin\AppData\Local\Temp\updatenew.exe
            Filesize

            394KB

            MD5

            f0524f49b7826d4a1ec521784e18a159

            SHA1

            a9a60c3e40fe80153091a51c182bb80134eaadaf

            SHA256

            30eaf7331e0e7e4323f35fb5c6b0744aec2dc0f18d1eb9a1f842b006926c1a83

            SHA512

            7cad9f36d3564b7e673738251322ae8888cba17e324c7c34e312b0550e5549b257aaa1b3c9cb947b013f5ac0d21019ef1bf20421a851787a65ab97cac5711472

          • memory/380-106-0x0000000005190000-0x0000000005206000-memory.dmp
            Filesize

            472KB

          • memory/380-126-0x0000000005150000-0x0000000005160000-memory.dmp
            Filesize

            64KB

          • memory/380-85-0x0000000074FE0000-0x0000000075790000-memory.dmp
            Filesize

            7.7MB

          • memory/380-144-0x00000000058A0000-0x0000000005E44000-memory.dmp
            Filesize

            5.6MB

          • memory/380-75-0x0000000000920000-0x0000000000988000-memory.dmp
            Filesize

            416KB

          • memory/380-160-0x0000000074FE0000-0x0000000075790000-memory.dmp
            Filesize

            7.7MB

          • memory/380-131-0x0000000005210000-0x000000000522E000-memory.dmp
            Filesize

            120KB

          • memory/812-3-0x0000000074FE0000-0x0000000075790000-memory.dmp
            Filesize

            7.7MB

          • memory/812-1-0x0000000000430000-0x0000000000744000-memory.dmp
            Filesize

            3.1MB

          • memory/812-0-0x0000000074FE0000-0x0000000075790000-memory.dmp
            Filesize

            7.7MB

          • memory/812-124-0x0000000074FE0000-0x0000000075790000-memory.dmp
            Filesize

            7.7MB

          • memory/1592-105-0x0000000000460000-0x0000000000488000-memory.dmp
            Filesize

            160KB

          • memory/1592-108-0x0000000002600000-0x000000000261E000-memory.dmp
            Filesize

            120KB

          • memory/1592-107-0x00007FF9703D0000-0x00007FF970E91000-memory.dmp
            Filesize

            10.8MB

          • memory/1592-123-0x000000001AFD0000-0x000000001AFE0000-memory.dmp
            Filesize

            64KB

          • memory/1592-133-0x00007FF9703D0000-0x00007FF970E91000-memory.dmp
            Filesize

            10.8MB

          • memory/2344-146-0x0000000004C10000-0x0000000004C20000-memory.dmp
            Filesize

            64KB

          • memory/2344-158-0x0000000000400000-0x000000000047D000-memory.dmp
            Filesize

            500KB

          • memory/2344-207-0x0000000004C10000-0x0000000004C20000-memory.dmp
            Filesize

            64KB

          • memory/2344-205-0x0000000004C10000-0x0000000004C20000-memory.dmp
            Filesize

            64KB

          • memory/2344-206-0x0000000004C10000-0x0000000004C20000-memory.dmp
            Filesize

            64KB

          • memory/2344-136-0x0000000000650000-0x0000000000750000-memory.dmp
            Filesize

            1024KB

          • memory/2344-137-0x00000000005E0000-0x000000000060F000-memory.dmp
            Filesize

            188KB

          • memory/2344-138-0x0000000000400000-0x000000000047D000-memory.dmp
            Filesize

            500KB

          • memory/2344-139-0x0000000002430000-0x0000000002450000-memory.dmp
            Filesize

            128KB

          • memory/2344-204-0x0000000074FE0000-0x0000000075790000-memory.dmp
            Filesize

            7.7MB

          • memory/2344-145-0x0000000004C10000-0x0000000004C20000-memory.dmp
            Filesize

            64KB

          • memory/2344-202-0x0000000000650000-0x0000000000750000-memory.dmp
            Filesize

            1024KB

          • memory/2344-199-0x00000000058C0000-0x00000000059CA000-memory.dmp
            Filesize

            1.0MB

          • memory/2344-197-0x00000000005E0000-0x000000000060F000-memory.dmp
            Filesize

            188KB

          • memory/2344-173-0x0000000004B60000-0x0000000004BAC000-memory.dmp
            Filesize

            304KB

          • memory/2344-167-0x0000000004C10000-0x0000000004C20000-memory.dmp
            Filesize

            64KB

          • memory/2344-150-0x00000000024B0000-0x00000000024CE000-memory.dmp
            Filesize

            120KB

          • memory/2344-143-0x0000000074FE0000-0x0000000075790000-memory.dmp
            Filesize

            7.7MB

          • memory/2344-152-0x00000000051D0000-0x00000000057E8000-memory.dmp
            Filesize

            6.1MB

          • memory/2344-153-0x0000000004B00000-0x0000000004B12000-memory.dmp
            Filesize

            72KB

          • memory/3156-148-0x0000000000550000-0x000000000057E000-memory.dmp
            Filesize

            184KB

          • memory/3156-151-0x00000000007B0000-0x00000000008B0000-memory.dmp
            Filesize

            1024KB

          • memory/3156-149-0x0000000000400000-0x0000000000477000-memory.dmp
            Filesize

            476KB

          • memory/3600-192-0x00007FF9703D0000-0x00007FF970E91000-memory.dmp
            Filesize

            10.8MB

          • memory/4260-154-0x0000000004F00000-0x0000000004F9C000-memory.dmp
            Filesize

            624KB

          • memory/4260-100-0x0000000074FE0000-0x0000000075790000-memory.dmp
            Filesize

            7.7MB

          • memory/4260-97-0x0000000000530000-0x0000000000542000-memory.dmp
            Filesize

            72KB

          • memory/4260-127-0x0000000004DF0000-0x0000000004E00000-memory.dmp
            Filesize

            64KB

          • memory/4260-164-0x0000000074FE0000-0x0000000075790000-memory.dmp
            Filesize

            7.7MB

          • memory/4260-174-0x0000000074FE0000-0x0000000075790000-memory.dmp
            Filesize

            7.7MB

          • memory/4380-203-0x0000000004E60000-0x0000000004E70000-memory.dmp
            Filesize

            64KB

          • memory/4380-198-0x0000000074FE0000-0x0000000075790000-memory.dmp
            Filesize

            7.7MB

          • memory/4380-209-0x0000000004E60000-0x0000000004E70000-memory.dmp
            Filesize

            64KB

          • memory/4820-163-0x0000000001480000-0x000000000148E000-memory.dmp
            Filesize

            56KB

          • memory/4820-142-0x00007FF9703D0000-0x00007FF970E91000-memory.dmp
            Filesize

            10.8MB

          • memory/4820-166-0x00000000014B0000-0x00000000014C2000-memory.dmp
            Filesize

            72KB

          • memory/4820-191-0x00007FF9703D0000-0x00007FF970E91000-memory.dmp
            Filesize

            10.8MB

          • memory/4820-52-0x0000000000A50000-0x0000000000A60000-memory.dmp
            Filesize

            64KB

          • memory/4820-74-0x00007FF9703D0000-0x00007FF970E91000-memory.dmp
            Filesize

            10.8MB

          • memory/4820-165-0x000000001C5C0000-0x000000001C5D0000-memory.dmp
            Filesize

            64KB

          • memory/4912-161-0x00000000056D0000-0x000000000570C000-memory.dmp
            Filesize

            240KB

          • memory/4912-155-0x0000000000400000-0x000000000041E000-memory.dmp
            Filesize

            120KB

          • memory/4912-162-0x0000000074FE0000-0x0000000075790000-memory.dmp
            Filesize

            7.7MB

          • memory/4912-208-0x0000000005880000-0x0000000005890000-memory.dmp
            Filesize

            64KB

          • memory/4912-168-0x0000000005880000-0x0000000005890000-memory.dmp
            Filesize

            64KB

          • memory/4928-48-0x0000000000D10000-0x0000000000D18000-memory.dmp
            Filesize

            32KB

          • memory/4928-135-0x0000000074FE0000-0x0000000075790000-memory.dmp
            Filesize

            7.7MB

          • memory/4928-53-0x0000000074FE0000-0x0000000075790000-memory.dmp
            Filesize

            7.7MB

          • memory/4928-122-0x0000000005500000-0x0000000005510000-memory.dmp
            Filesize

            64KB