Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    07-05-2021 08:55

General

  • Target

    polas.exe

  • Size

    7.4MB

  • MD5

    d15d3eb03c466f207dd401047da792bc

  • SHA1

    cca4dd46f38bfc164a1840907a608fb657d471b0

  • SHA256

    6d0083394a549c135820010343353dcfa2929aeaa83f72a50ec60a7263f4ec90

  • SHA512

    432ff858e048358a323ed9dbbb533a2aad3648b521ffbc0e0d4cf5c02b5c65bd5b6e9f350736d65375a389efd36b4130fc1795a50f7d368a48d87afc50e7fdb4

Malware Config

Extracted

Family

redline

Botnet

@aBigF

C2

ydmau.xyz:80

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus Main Payload 5 IoCs
  • Panda Stealer Payload 1 IoCs
  • PandaStealer

    Panda Stealer is a fork of CollectorProject Stealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Orcurs Rat Executable 5 IoCs
  • Executes dropped EXE 11 IoCs
  • VMProtect packed file 9 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • NSIS installer 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\polas.exe
    "C:\Users\Admin\AppData\Local\Temp\polas.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:740
    • C:\Users\Admin\AppData\Local\Temp\WintWare.exe
      "C:\Users\Admin\AppData\Local\Temp\WintWare.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2952
      • C:\Users\Admin\AppData\Roaming\1.v1mp.exe
        C:\Users\Admin\AppData\Roaming\1.v1mp.exe
        3⤵
        • Executes dropped EXE
        • Drops desktop.ini file(s)
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2388
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zuz0fo_n.cmdline"
          4⤵
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1016
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8BBC.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8BBB.tmp"
            5⤵
              PID:204
          • C:\Windows\SysWOW64\WindowsInput.exe
            "C:\Windows\SysWOW64\WindowsInput.exe" --install
            4⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            PID:4056
          • C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe
            "C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3948
            • C:\Users\Admin\AppData\Roaming\System32.exe
              "C:\Users\Admin\AppData\Roaming\System32.exe" /launchSelfAndExit "C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe" 3948 /protectFile
              5⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2252
              • C:\Users\Admin\AppData\Roaming\System32.exe
                "C:\Users\Admin\AppData\Roaming\System32.exe" /watchProcess "C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe" 3948 "/protectFile"
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3932
        • C:\Users\Admin\AppData\Roaming\build.vmp.sfx.exe
          C:\Users\Admin\AppData\Roaming\build.vmp.sfx.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1840
          • C:\Users\Admin\AppData\Local\Temp\build.vmp.exe
            "C:\Users\Admin\AppData\Local\Temp\build.vmp.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:2124
        • C:\Users\Admin\AppData\Roaming\Hack.exe
          C:\Users\Admin\AppData\Roaming\Hack.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:652
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
            4⤵
              PID:4000
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 160
                5⤵
                • Drops file in Windows directory
                • Program crash
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1728
      • C:\Windows\SysWOW64\WindowsInput.exe
        "C:\Windows\SysWOW64\WindowsInput.exe"
        1⤵
        • Executes dropped EXE
        PID:2544
      • C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe
        C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe
        1⤵
        • Executes dropped EXE
        PID:856

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      System Information Discovery

      1
      T1082

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\System32.exe.log
        MD5

        605f809fab8c19729d39d075f7ffdb53

        SHA1

        c546f877c9bd53563174a90312a8337fdfc5fdd9

        SHA256

        6904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556

        SHA512

        82cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3

      • C:\Users\Admin\AppData\Local\Temp\RES8BBC.tmp
        MD5

        487f27992e59531a9fc1050d9d9c9fa1

        SHA1

        2698f47ddc61acc35ff96c7c412b601ebd80e114

        SHA256

        8481cc33f0dbe5591c1dce63a797513e91e532f2e23b2cb5f1dabade93926e28

        SHA512

        be0ceb5927c09cfb8d8fe965de8b1991fec6b0765ecb7f20265570bc2e439e321b388ad0d5c245ae5baf9df092e89765011bc3724bf1f724152e83e8ed523bfe

      • C:\Users\Admin\AppData\Local\Temp\WintWare.exe
        MD5

        b545ce3cd596324f4100eab6f6642625

        SHA1

        95f4a545fdaab30cd7ff60ef562a5d07972158ee

        SHA256

        e041ab41f36aba75146b38b2505027efa65bfe3d71c374aa3373b580d766b1e3

        SHA512

        13b604160a6da59dcf9e524685ff66397cef9a4dda7a597eae9143ba42f1223ffae2099c8678945fe52ffa834d6c633ace359574f5cf629cda2eb9bcacb33e5f

      • C:\Users\Admin\AppData\Local\Temp\WintWare.exe
        MD5

        b545ce3cd596324f4100eab6f6642625

        SHA1

        95f4a545fdaab30cd7ff60ef562a5d07972158ee

        SHA256

        e041ab41f36aba75146b38b2505027efa65bfe3d71c374aa3373b580d766b1e3

        SHA512

        13b604160a6da59dcf9e524685ff66397cef9a4dda7a597eae9143ba42f1223ffae2099c8678945fe52ffa834d6c633ace359574f5cf629cda2eb9bcacb33e5f

      • C:\Users\Admin\AppData\Local\Temp\build.vmp.exe
        MD5

        55f1627af32cd2882f9866aa1bf21839

        SHA1

        626af5ffe55f799e14ad9d214fd745885601d2b4

        SHA256

        e2681747279a664c595d720ccf75b699ce456351f8ca4203b498feed105358ec

        SHA512

        47835a3140c71662f5728311c404166765397905a3152701d363725578d1aabfd9d6678a23540a5929363d5aa7d1ded4a1e4da0dfcbd6656c863aebf39f9a4af

      • C:\Users\Admin\AppData\Local\Temp\build.vmp.exe
        MD5

        55f1627af32cd2882f9866aa1bf21839

        SHA1

        626af5ffe55f799e14ad9d214fd745885601d2b4

        SHA256

        e2681747279a664c595d720ccf75b699ce456351f8ca4203b498feed105358ec

        SHA512

        47835a3140c71662f5728311c404166765397905a3152701d363725578d1aabfd9d6678a23540a5929363d5aa7d1ded4a1e4da0dfcbd6656c863aebf39f9a4af

      • C:\Users\Admin\AppData\Local\Temp\zuz0fo_n.dll
        MD5

        a5d9323602ff8b15328d3043fa4f461c

        SHA1

        0b609d6b5d818da56ed722234f340c772c9f1bbf

        SHA256

        30b22954f89f2ac76e65540dffca8c9942af0f893ca8bd3b2332b48478d8588c

        SHA512

        ece40bbf6d62777b02a18de4563702ecbd25f283952959447b00163e64fe894a421a1e22e09d637934cc06579aea4a73e19e3316a12eb68f024853778f687b11

      • C:\Users\Admin\AppData\Roaming\1.v1mp.exe
        MD5

        4aa398cdafba649dbd2b8cc829e711af

        SHA1

        5605c342351a286c7ef0dfa56251cee2f6ac3251

        SHA256

        9ad6f4f2ed127d0d6f32df61fadb21f1f4a74965326a18c4a23c5a11806e0273

        SHA512

        b6e5cfa5513bd04f76aab1f84b539c489967f87187abaf545b1ede13ed60332836efd3fc2760e67ac46035186f8e13765ce7885e81108ab19530ade9875419a6

      • C:\Users\Admin\AppData\Roaming\1.v1mp.exe
        MD5

        4aa398cdafba649dbd2b8cc829e711af

        SHA1

        5605c342351a286c7ef0dfa56251cee2f6ac3251

        SHA256

        9ad6f4f2ed127d0d6f32df61fadb21f1f4a74965326a18c4a23c5a11806e0273

        SHA512

        b6e5cfa5513bd04f76aab1f84b539c489967f87187abaf545b1ede13ed60332836efd3fc2760e67ac46035186f8e13765ce7885e81108ab19530ade9875419a6

      • C:\Users\Admin\AppData\Roaming\Hack.exe
        MD5

        d7520c2adaade897e6e36b078d50ec58

        SHA1

        131661b674c6f9949875db5de666584333e5dea7

        SHA256

        5df871425f33aa4886f316d37ac6ac7a97b9754e2f4925ebf3ce6a93eea86a9b

        SHA512

        b101de26fd786ec0932934edabf5bf53695cd6ae58b2e7c68f0706f9c3fa5824226ebc55c41df939af85f12da81abfdc2afdfd205d79ef11cb71d0c621bd67e3

      • C:\Users\Admin\AppData\Roaming\Hack.exe
        MD5

        d7520c2adaade897e6e36b078d50ec58

        SHA1

        131661b674c6f9949875db5de666584333e5dea7

        SHA256

        5df871425f33aa4886f316d37ac6ac7a97b9754e2f4925ebf3ce6a93eea86a9b

        SHA512

        b101de26fd786ec0932934edabf5bf53695cd6ae58b2e7c68f0706f9c3fa5824226ebc55c41df939af85f12da81abfdc2afdfd205d79ef11cb71d0c621bd67e3

      • C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe
        MD5

        4aa398cdafba649dbd2b8cc829e711af

        SHA1

        5605c342351a286c7ef0dfa56251cee2f6ac3251

        SHA256

        9ad6f4f2ed127d0d6f32df61fadb21f1f4a74965326a18c4a23c5a11806e0273

        SHA512

        b6e5cfa5513bd04f76aab1f84b539c489967f87187abaf545b1ede13ed60332836efd3fc2760e67ac46035186f8e13765ce7885e81108ab19530ade9875419a6

      • C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe
        MD5

        4aa398cdafba649dbd2b8cc829e711af

        SHA1

        5605c342351a286c7ef0dfa56251cee2f6ac3251

        SHA256

        9ad6f4f2ed127d0d6f32df61fadb21f1f4a74965326a18c4a23c5a11806e0273

        SHA512

        b6e5cfa5513bd04f76aab1f84b539c489967f87187abaf545b1ede13ed60332836efd3fc2760e67ac46035186f8e13765ce7885e81108ab19530ade9875419a6

      • C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe
        MD5

        4aa398cdafba649dbd2b8cc829e711af

        SHA1

        5605c342351a286c7ef0dfa56251cee2f6ac3251

        SHA256

        9ad6f4f2ed127d0d6f32df61fadb21f1f4a74965326a18c4a23c5a11806e0273

        SHA512

        b6e5cfa5513bd04f76aab1f84b539c489967f87187abaf545b1ede13ed60332836efd3fc2760e67ac46035186f8e13765ce7885e81108ab19530ade9875419a6

      • C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe.config
        MD5

        a2b76cea3a59fa9af5ea21ff68139c98

        SHA1

        35d76475e6a54c168f536e30206578babff58274

        SHA256

        f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

        SHA512

        b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

      • C:\Users\Admin\AppData\Roaming\System32.exe
        MD5

        913967b216326e36a08010fb70f9dba3

        SHA1

        7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf

        SHA256

        8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a

        SHA512

        c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

      • C:\Users\Admin\AppData\Roaming\System32.exe
        MD5

        913967b216326e36a08010fb70f9dba3

        SHA1

        7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf

        SHA256

        8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a

        SHA512

        c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

      • C:\Users\Admin\AppData\Roaming\System32.exe
        MD5

        913967b216326e36a08010fb70f9dba3

        SHA1

        7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf

        SHA256

        8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a

        SHA512

        c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

      • C:\Users\Admin\AppData\Roaming\System32.exe.config
        MD5

        a2b76cea3a59fa9af5ea21ff68139c98

        SHA1

        35d76475e6a54c168f536e30206578babff58274

        SHA256

        f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

        SHA512

        b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

      • C:\Users\Admin\AppData\Roaming\build.vmp.sfx.exe
        MD5

        7453d935f4be96df9160a2876f7bb404

        SHA1

        6b14dcd4625341e0eba4bca2272afc22635b50c3

        SHA256

        b6a8ef6c65129718e0a06aadec82b3450b5ad1e5af40e205a6d22a3e00e9030c

        SHA512

        4c7be45ce918df0d8c284c16a264c10293ba3991c90026d8578394dcb40e0e1df34845800125430795d52dafce865b9f85ae7226eae0b078ff05b68ee85aa3ef

      • C:\Users\Admin\AppData\Roaming\build.vmp.sfx.exe
        MD5

        7453d935f4be96df9160a2876f7bb404

        SHA1

        6b14dcd4625341e0eba4bca2272afc22635b50c3

        SHA256

        b6a8ef6c65129718e0a06aadec82b3450b5ad1e5af40e205a6d22a3e00e9030c

        SHA512

        4c7be45ce918df0d8c284c16a264c10293ba3991c90026d8578394dcb40e0e1df34845800125430795d52dafce865b9f85ae7226eae0b078ff05b68ee85aa3ef

      • C:\Windows\SysWOW64\WindowsInput.exe
        MD5

        e6fcf516d8ed8d0d4427f86e08d0d435

        SHA1

        c7691731583ab7890086635cb7f3e4c22ca5e409

        SHA256

        8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

        SHA512

        c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

      • C:\Windows\SysWOW64\WindowsInput.exe
        MD5

        e6fcf516d8ed8d0d4427f86e08d0d435

        SHA1

        c7691731583ab7890086635cb7f3e4c22ca5e409

        SHA256

        8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

        SHA512

        c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

      • C:\Windows\SysWOW64\WindowsInput.exe
        MD5

        e6fcf516d8ed8d0d4427f86e08d0d435

        SHA1

        c7691731583ab7890086635cb7f3e4c22ca5e409

        SHA256

        8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

        SHA512

        c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

      • C:\Windows\SysWOW64\WindowsInput.exe.config
        MD5

        a2b76cea3a59fa9af5ea21ff68139c98

        SHA1

        35d76475e6a54c168f536e30206578babff58274

        SHA256

        f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

        SHA512

        b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

      • \??\c:\Users\Admin\AppData\Local\Temp\CSC8BBB.tmp
        MD5

        3dd26811c57cda167b93036b6d2579e0

        SHA1

        35914834dca4dc2e4967f41e334703e35597baaa

        SHA256

        41614133b6e217c42092edf5c744a3e69fa5dbc5f8092aa5f74c738ef72f46af

        SHA512

        149053c4e6fdabdacf895b9f25fb67cc85804cf35ef68edee8137c4d5542c49ab663b37e4dc980f2a91c6d575d1a6c7adab44de0ab6b37aa0a8c74a47c8df0e0

      • \??\c:\Users\Admin\AppData\Local\Temp\zuz0fo_n.0.cs
        MD5

        71032d4a42aab5fe9b168249ef815831

        SHA1

        78d44a50b2177a88a4eda3ddc119bab505093fa1

        SHA256

        efbfab02219cb880218f36b2db72115535d92c6099bc07dd7cf5df19a9cc1541

        SHA512

        989c3203911ab4c97d468f290db26233dc0ffb2556a3ae7dfb5387dbf328369ccef8dc64dc4f2e5be8e446c8392fb3cbf3cdf679d64aeb369a3234def2492287

      • \??\c:\Users\Admin\AppData\Local\Temp\zuz0fo_n.cmdline
        MD5

        496c1e5dcd5062a602bf077e8ee7d507

        SHA1

        54e7e173be49e23dc60e2fb5b6585f6818ab5308

        SHA256

        10bbf0398ceb103bdbaa1bec46d299fcb98fc3c37f6de6af6440c0c1b0b77275

        SHA512

        5cc331bfe8ed5132c86e574bf025926d027bb0206054942f94a2ee619693b8af3645ece84c88dd9b6e9c051e52f52f161a58fecaa65341876c8386b865d599ab

      • memory/204-147-0x0000000000000000-mapping.dmp
      • memory/652-136-0x0000000005790000-0x0000000005791000-memory.dmp
        Filesize

        4KB

      • memory/652-130-0x0000000000D60000-0x0000000000D61000-memory.dmp
        Filesize

        4KB

      • memory/652-137-0x0000000002F60000-0x0000000002F62000-memory.dmp
        Filesize

        8KB

      • memory/652-127-0x0000000000000000-mapping.dmp
      • memory/856-196-0x000000001C9D0000-0x000000001C9D2000-memory.dmp
        Filesize

        8KB

      • memory/1016-151-0x00000000009C0000-0x00000000009C2000-memory.dmp
        Filesize

        8KB

      • memory/1016-144-0x0000000000000000-mapping.dmp
      • memory/1840-122-0x0000000000000000-mapping.dmp
      • memory/2124-133-0x0000000000000000-mapping.dmp
      • memory/2124-140-0x0000000000850000-0x00000000011F0000-memory.dmp
        Filesize

        9.6MB

      • memory/2124-139-0x0000000001600000-0x0000000001601000-memory.dmp
        Filesize

        4KB

      • memory/2252-190-0x0000000000000000-mapping.dmp
      • memory/2252-197-0x0000000000B20000-0x0000000000B21000-memory.dmp
        Filesize

        4KB

      • memory/2388-119-0x0000000000000000-mapping.dmp
      • memory/2388-132-0x0000000002D10000-0x0000000002D12000-memory.dmp
        Filesize

        8KB

      • memory/2544-167-0x000000001A8D0000-0x000000001A8D2000-memory.dmp
        Filesize

        8KB

      • memory/2544-168-0x000000001AD70000-0x000000001AD71000-memory.dmp
        Filesize

        4KB

      • memory/2952-116-0x0000000000000000-mapping.dmp
      • memory/3932-199-0x0000000000000000-mapping.dmp
      • memory/3948-195-0x000000001C214000-0x000000001C216000-memory.dmp
        Filesize

        8KB

      • memory/3948-173-0x00000000004D0000-0x00000000004D1000-memory.dmp
        Filesize

        4KB

      • memory/3948-179-0x0000000002940000-0x0000000002988000-memory.dmp
        Filesize

        288KB

      • memory/3948-180-0x000000001C210000-0x000000001C212000-memory.dmp
        Filesize

        8KB

      • memory/3948-177-0x0000000000B60000-0x0000000000B6C000-memory.dmp
        Filesize

        48KB

      • memory/3948-182-0x00000000029B0000-0x00000000029C5000-memory.dmp
        Filesize

        84KB

      • memory/3948-185-0x000000001C920000-0x000000001C921000-memory.dmp
        Filesize

        4KB

      • memory/3948-186-0x00000000029D0000-0x00000000029DC000-memory.dmp
        Filesize

        48KB

      • memory/3948-176-0x0000000000E50000-0x0000000000EAA000-memory.dmp
        Filesize

        360KB

      • memory/3948-178-0x00000000010F0000-0x0000000001100000-memory.dmp
        Filesize

        64KB

      • memory/3948-169-0x0000000000000000-mapping.dmp
      • memory/3948-191-0x000000001C212000-0x000000001C214000-memory.dmp
        Filesize

        8KB

      • memory/4000-143-0x00000000004163C2-mapping.dmp
      • memory/4000-142-0x0000000000400000-0x000000000041C000-memory.dmp
        Filesize

        112KB

      • memory/4056-161-0x000000001BE20000-0x000000001BE22000-memory.dmp
        Filesize

        8KB

      • memory/4056-160-0x00000000026E0000-0x00000000026E1000-memory.dmp
        Filesize

        4KB

      • memory/4056-159-0x0000000000F20000-0x0000000000F21000-memory.dmp
        Filesize

        4KB

      • memory/4056-156-0x0000000000550000-0x0000000000551000-memory.dmp
        Filesize

        4KB

      • memory/4056-152-0x0000000000000000-mapping.dmp