Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-09-2022 18:29

General

  • Target

    275deddef0f33683c99390656e658a121d4d630a130e3f45411594de37ae4498.exe

  • Size

    3.2MB

  • MD5

    e18a73b3a82a22a768614d041fe91bb8

  • SHA1

    c16f522cd61c303b00be391b2f00a872e6307c10

  • SHA256

    275deddef0f33683c99390656e658a121d4d630a130e3f45411594de37ae4498

  • SHA512

    0236cf0e85af6b75e086aeb4de415fb019c76894acf2f08bd019e3b3bebf6a25aa46535037393a3ce35b3e20c0cb8279d277f35429f65fffdee9619506ee141a

  • SSDEEP

    12288:TsDhIWUJVhCO357lNT0eFbW1n6bZMuRg/cQ8HRL/:4DhvUJVhCO3VlmeFbWZ6bZMuRg/cQi

Malware Config

Extracted

Family

vidar

Version

54.6

Botnet

1680

C2

https://t.me/huobiinside

https://mas.to/@kyriazhs1975

Attributes
  • profile_id

    1680

Extracted

Family

redline

Botnet

Lyla.22.09

C2

185.215.113.216:21921

Attributes
  • auth_value

    2f19888cb6bad7fdc46df91dc06aacc5

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\275deddef0f33683c99390656e658a121d4d630a130e3f45411594de37ae4498.exe
    "C:\Users\Admin\AppData\Local\Temp\275deddef0f33683c99390656e658a121d4d630a130e3f45411594de37ae4498.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2772
    • C:\Users\Admin\AppData\Local\Temp\275deddef0f33683c99390656e658a121d4d630a130e3f45411594de37ae4498.exe
      "C:\Users\Admin\AppData\Local\Temp\275deddef0f33683c99390656e658a121d4d630a130e3f45411594de37ae4498.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:368
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1952
        • C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
          C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
          4⤵
          • Executes dropped EXE
          PID:2228
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 2228 -s 196
            5⤵
            • Program crash
            PID:4056
      • C:\Users\Admin\AppData\Local\Temp\1K8L0178F32B3H0.exe
        "C:\Users\Admin\AppData\Local\Temp\1K8L0178F32B3H0.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3636
        • C:\Users\Admin\AppData\Local\Temp\1K8L0178F32B3H0.exe
          "C:\Users\Admin\AppData\Local\Temp\1K8L0178F32B3H0.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4928
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe"  Æy/c taskkill /im 1K8L0178F32B3H0.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1K8L0178F32B3H0.exe" & del C:\PrograData\*.dll & exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4784
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /im 1K8L0178F32B3H0.exe /f
              6⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3808
            • C:\Windows\SysWOW64\timeout.exe
              timeout /t 6
              6⤵
              • Delays execution with timeout.exe
              PID:4740
      • C:\Users\Admin\AppData\Local\Temp\D5K70B1BAM4799I.exe
        "C:\Users\Admin\AppData\Local\Temp\D5K70B1BAM4799I.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3476
        • C:\Users\Admin\AppData\Local\Temp\D5K70B1BAM4799I.exe
          "C:\Users\Admin\AppData\Local\Temp\D5K70B1BAM4799I.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2276
      • C:\Users\Admin\AppData\Local\Temp\ICIJ5DL15K11K5B.exe
        "C:\Users\Admin\AppData\Local\Temp\ICIJ5DL15K11K5B.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4568
        • C:\Users\Admin\AppData\Local\Temp\ICIJ5DL15K11K5B.exe
          "C:\Users\Admin\AppData\Local\Temp\ICIJ5DL15K11K5B.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          PID:404
      • C:\Users\Admin\AppData\Local\Temp\7K754GFA0G3JBD5.exe
        "C:\Users\Admin\AppData\Local\Temp\7K754GFA0G3JBD5.exe"
        3⤵
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1660
        • C:\Windows\SysWOW64\control.exe
          "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\k9VXVaOX.cPl",
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4636
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\k9VXVaOX.cPl",
            5⤵
            • Loads dropped DLL
            PID:2268
            • C:\Windows\system32\RunDll32.exe
              C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\k9VXVaOX.cPl",
              6⤵
                PID:3976
                • C:\Windows\SysWOW64\rundll32.exe
                  "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\k9VXVaOX.cPl",
                  7⤵
                  • Loads dropped DLL
                  PID:3956
        • C:\Users\Admin\AppData\Local\Temp\D559GHC0HE1KM9E.exe
          https://iplogger.org/1x5az7
          3⤵
          • Executes dropped EXE
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2824

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Credential Access

    Credentials in Files

    3
    T1081

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    3
    T1005

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
      Filesize

      4KB

      MD5

      f7dcb24540769805e5bb30d193944dce

      SHA1

      e26c583c562293356794937d9e2e6155d15449ee

      SHA256

      6b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea

      SHA512

      cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
      Filesize

      340B

      MD5

      2efcfcfe65bcebfb8e1f813af5541b36

      SHA1

      e7f41791c748734933b1788a60ec8634a4ba6843

      SHA256

      a787df7b0b884b7f03c82e136837f948956578e1cbd3aca5f10c5c89b9dce605

      SHA512

      a4feb1d73f7cd4b1b42f3174cc2e82b6d2be64e6a777e99bee6c1d0bf3cd02b1689c5728c7f8aee2ee3f02ea0543edbd94c2c287deb72ca0f71f833ef90ded73

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\D5K70B1BAM4799I.exe.log
      Filesize

      42B

      MD5

      84cfdb4b995b1dbf543b26b86c863adc

      SHA1

      d2f47764908bf30036cf8248b9ff5541e2711fa2

      SHA256

      d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b

      SHA512

      485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ICIJ5DL15K11K5B.exe.log
      Filesize

      42B

      MD5

      84cfdb4b995b1dbf543b26b86c863adc

      SHA1

      d2f47764908bf30036cf8248b9ff5541e2711fa2

      SHA256

      d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b

      SHA512

      485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce

    • C:\Users\Admin\AppData\Local\Temp\1K8L0178F32B3H0.exe
      Filesize

      669KB

      MD5

      0d6804e83ff5775c4f6a162c9761c7e2

      SHA1

      6eb877d9710253e460d5d697962cb660118c5533

      SHA256

      78fd273090d2697ec2d7bf6b2d300413dc92d6f25c05443e80e7d3f0f9d8867c

      SHA512

      20c2aafb91cfa8b05152c451901342514b6290ae8351e830fbf1f696352b0fbc26d5b9960da88c02f7b6a08afb221b22b17c36253ddd84def413ba0798f83ea0

    • C:\Users\Admin\AppData\Local\Temp\1K8L0178F32B3H0.exe
      Filesize

      669KB

      MD5

      0d6804e83ff5775c4f6a162c9761c7e2

      SHA1

      6eb877d9710253e460d5d697962cb660118c5533

      SHA256

      78fd273090d2697ec2d7bf6b2d300413dc92d6f25c05443e80e7d3f0f9d8867c

      SHA512

      20c2aafb91cfa8b05152c451901342514b6290ae8351e830fbf1f696352b0fbc26d5b9960da88c02f7b6a08afb221b22b17c36253ddd84def413ba0798f83ea0

    • C:\Users\Admin\AppData\Local\Temp\1K8L0178F32B3H0.exe
      Filesize

      669KB

      MD5

      0d6804e83ff5775c4f6a162c9761c7e2

      SHA1

      6eb877d9710253e460d5d697962cb660118c5533

      SHA256

      78fd273090d2697ec2d7bf6b2d300413dc92d6f25c05443e80e7d3f0f9d8867c

      SHA512

      20c2aafb91cfa8b05152c451901342514b6290ae8351e830fbf1f696352b0fbc26d5b9960da88c02f7b6a08afb221b22b17c36253ddd84def413ba0798f83ea0

    • C:\Users\Admin\AppData\Local\Temp\7K754GFA0G3JBD5.exe
      Filesize

      1.8MB

      MD5

      a196e5e1c8968c6f2837b003ac87b265

      SHA1

      99c5631c8f4fbddcaecf8c0cf340a9ec8c6b2fc5

      SHA256

      8c57bc7023c1b437b8bb49c9d9f1e41f63805b441a4365dd2ff33d5252078a83

      SHA512

      461e091baefb16728159353bc75b946ec11d9b8dce99fbb53ae81cbef9c2996bbb8b27d46c23790a5f080f365d423be1615c3ff9610d179c002b4d0af000824f

    • C:\Users\Admin\AppData\Local\Temp\7K754GFA0G3JBD5.exe
      Filesize

      1.8MB

      MD5

      a196e5e1c8968c6f2837b003ac87b265

      SHA1

      99c5631c8f4fbddcaecf8c0cf340a9ec8c6b2fc5

      SHA256

      8c57bc7023c1b437b8bb49c9d9f1e41f63805b441a4365dd2ff33d5252078a83

      SHA512

      461e091baefb16728159353bc75b946ec11d9b8dce99fbb53ae81cbef9c2996bbb8b27d46c23790a5f080f365d423be1615c3ff9610d179c002b4d0af000824f

    • C:\Users\Admin\AppData\Local\Temp\D559GHC0HE1KM9E.exe
      Filesize

      8KB

      MD5

      8719ce641e7c777ac1b0eaec7b5fa7c7

      SHA1

      c04de52cb511480cc7d00d67f1d9e17b02d6406b

      SHA256

      6283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea

      SHA512

      7be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97

    • C:\Users\Admin\AppData\Local\Temp\D559GHC0HE1KM9E.exe
      Filesize

      8KB

      MD5

      8719ce641e7c777ac1b0eaec7b5fa7c7

      SHA1

      c04de52cb511480cc7d00d67f1d9e17b02d6406b

      SHA256

      6283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea

      SHA512

      7be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97

    • C:\Users\Admin\AppData\Local\Temp\D5K70B1BAM4799I.exe
      Filesize

      481KB

      MD5

      20585a9206f748dba754f099434f7628

      SHA1

      e55f5ed8987887693a393d6dd1600a5bd7a45461

      SHA256

      b1c40ded5b798303fc9ee12e12f58ed66288f87b952812aff63b9c0cf0e07811

      SHA512

      50dbbcac963a60d4e3a9acf1ddf55170771158ef1e54bb624ac25679d6168128cfab6fd492e64926e25fd98c64c507210a7ef8d3463097756e9924b87178721c

    • C:\Users\Admin\AppData\Local\Temp\D5K70B1BAM4799I.exe
      Filesize

      481KB

      MD5

      20585a9206f748dba754f099434f7628

      SHA1

      e55f5ed8987887693a393d6dd1600a5bd7a45461

      SHA256

      b1c40ded5b798303fc9ee12e12f58ed66288f87b952812aff63b9c0cf0e07811

      SHA512

      50dbbcac963a60d4e3a9acf1ddf55170771158ef1e54bb624ac25679d6168128cfab6fd492e64926e25fd98c64c507210a7ef8d3463097756e9924b87178721c

    • C:\Users\Admin\AppData\Local\Temp\D5K70B1BAM4799I.exe
      Filesize

      481KB

      MD5

      20585a9206f748dba754f099434f7628

      SHA1

      e55f5ed8987887693a393d6dd1600a5bd7a45461

      SHA256

      b1c40ded5b798303fc9ee12e12f58ed66288f87b952812aff63b9c0cf0e07811

      SHA512

      50dbbcac963a60d4e3a9acf1ddf55170771158ef1e54bb624ac25679d6168128cfab6fd492e64926e25fd98c64c507210a7ef8d3463097756e9924b87178721c

    • C:\Users\Admin\AppData\Local\Temp\ICIJ5DL15K11K5B.exe
      Filesize

      408KB

      MD5

      85fa84ce1cea24686f8426c846266121

      SHA1

      32a62d7e35d8bfed1bae24ae3b9adce5955529c5

      SHA256

      621138685d13638a0ec064ca8b1858198116c6699c02eff23fd1d0a841917e4a

      SHA512

      bfe82e744a4fe8b46f4bedb5ad8b8be86fd589cd3aeabb29e9ea41023754d2982350670b61bb19aea214dcdfae6b1abc9edb31da8681c13bdd895d544388ec75

    • C:\Users\Admin\AppData\Local\Temp\ICIJ5DL15K11K5B.exe
      Filesize

      408KB

      MD5

      85fa84ce1cea24686f8426c846266121

      SHA1

      32a62d7e35d8bfed1bae24ae3b9adce5955529c5

      SHA256

      621138685d13638a0ec064ca8b1858198116c6699c02eff23fd1d0a841917e4a

      SHA512

      bfe82e744a4fe8b46f4bedb5ad8b8be86fd589cd3aeabb29e9ea41023754d2982350670b61bb19aea214dcdfae6b1abc9edb31da8681c13bdd895d544388ec75

    • C:\Users\Admin\AppData\Local\Temp\ICIJ5DL15K11K5B.exe
      Filesize

      408KB

      MD5

      85fa84ce1cea24686f8426c846266121

      SHA1

      32a62d7e35d8bfed1bae24ae3b9adce5955529c5

      SHA256

      621138685d13638a0ec064ca8b1858198116c6699c02eff23fd1d0a841917e4a

      SHA512

      bfe82e744a4fe8b46f4bedb5ad8b8be86fd589cd3aeabb29e9ea41023754d2982350670b61bb19aea214dcdfae6b1abc9edb31da8681c13bdd895d544388ec75

    • C:\Users\Admin\AppData\Local\Temp\k9VXVaOX.cPl
      Filesize

      1.9MB

      MD5

      564d73169c09ba68cf6c256ada54bf45

      SHA1

      8a156c1d8001261fc41e3a1728db14454801fa66

      SHA256

      95a7c9d08136fa55eb2399ba51f572a8c0515258c7623a3f85c687f6963d0ae2

      SHA512

      9fa99658a5a73c379115aeafadb21618a57840dc7b571bdebfd79c8028c764138b43c0f9cd2601a7dd6ade5696b005f34485feef0eebb7dbafa89547acdd0453

    • C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
      Filesize

      17KB

      MD5

      d9e2fc3a247db17e03d220092e4756ff

      SHA1

      c409057b469fcefe230ee170a5b2bc33d3bb28ec

      SHA256

      ee36cfc26f2b4205cf7de07cd257af6d1d992919e58047ec7a4fdd6cf70140dd

      SHA512

      b973884a248e162dd7f83d981d6c7774eb21bce3983012474799b9b96f18846d60a2995cc82d4f7c362d4495626d36f6f39ff76d22c806b755c7cb2c7bfcb4af

    • C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
      Filesize

      17KB

      MD5

      d9e2fc3a247db17e03d220092e4756ff

      SHA1

      c409057b469fcefe230ee170a5b2bc33d3bb28ec

      SHA256

      ee36cfc26f2b4205cf7de07cd257af6d1d992919e58047ec7a4fdd6cf70140dd

      SHA512

      b973884a248e162dd7f83d981d6c7774eb21bce3983012474799b9b96f18846d60a2995cc82d4f7c362d4495626d36f6f39ff76d22c806b755c7cb2c7bfcb4af

    • \ProgramData\mozglue.dll
      Filesize

      593KB

      MD5

      c8fd9be83bc728cc04beffafc2907fe9

      SHA1

      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

      SHA256

      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

      SHA512

      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

    • \ProgramData\nss3.dll
      Filesize

      2.0MB

      MD5

      1cc453cdf74f31e4d913ff9c10acdde2

      SHA1

      6e85eae544d6e965f15fa5c39700fa7202f3aafe

      SHA256

      ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

      SHA512

      dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

    • \Users\Admin\AppData\Local\Temp\k9VxVaoX.cpl
      Filesize

      1.9MB

      MD5

      564d73169c09ba68cf6c256ada54bf45

      SHA1

      8a156c1d8001261fc41e3a1728db14454801fa66

      SHA256

      95a7c9d08136fa55eb2399ba51f572a8c0515258c7623a3f85c687f6963d0ae2

      SHA512

      9fa99658a5a73c379115aeafadb21618a57840dc7b571bdebfd79c8028c764138b43c0f9cd2601a7dd6ade5696b005f34485feef0eebb7dbafa89547acdd0453

    • \Users\Admin\AppData\Local\Temp\k9VxVaoX.cpl
      Filesize

      1.9MB

      MD5

      564d73169c09ba68cf6c256ada54bf45

      SHA1

      8a156c1d8001261fc41e3a1728db14454801fa66

      SHA256

      95a7c9d08136fa55eb2399ba51f572a8c0515258c7623a3f85c687f6963d0ae2

      SHA512

      9fa99658a5a73c379115aeafadb21618a57840dc7b571bdebfd79c8028c764138b43c0f9cd2601a7dd6ade5696b005f34485feef0eebb7dbafa89547acdd0453

    • memory/368-164-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/368-170-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/368-178-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/368-177-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/368-179-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/368-175-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/368-176-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/368-174-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/368-173-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/368-172-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/368-171-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/368-181-0x00000000013B0000-0x00000000013E6000-memory.dmp
      Filesize

      216KB

    • memory/368-152-0x00000000013B0000-0x00000000013E6000-memory.dmp
      Filesize

      216KB

    • memory/368-153-0x00000000013D436C-mapping.dmp
    • memory/368-154-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/368-180-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/368-159-0x00000000013B0000-0x00000000013E6000-memory.dmp
      Filesize

      216KB

    • memory/368-163-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/368-162-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/368-169-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/368-165-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/368-166-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/368-167-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/368-168-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/404-689-0x00000000052A0000-0x00000000052AA000-memory.dmp
      Filesize

      40KB

    • memory/404-516-0x0000000000960000-0x000000000096A000-memory.dmp
      Filesize

      40KB

    • memory/404-403-0x000000000096587E-mapping.dmp
    • memory/1660-410-0x0000000000000000-mapping.dmp
    • memory/1952-191-0x0000000000000000-mapping.dmp
    • memory/2228-198-0x0000000000000000-mapping.dmp
    • memory/2268-720-0x0000000000000000-mapping.dmp
    • memory/2268-853-0x0000000004BF0000-0x0000000004D7C000-memory.dmp
      Filesize

      1.5MB

    • memory/2268-921-0x0000000004ED0000-0x0000000005019000-memory.dmp
      Filesize

      1.3MB

    • memory/2268-854-0x0000000004ED0000-0x0000000005019000-memory.dmp
      Filesize

      1.3MB

    • memory/2276-527-0x0000000004BB0000-0x0000000004BEE000-memory.dmp
      Filesize

      248KB

    • memory/2276-344-0x00000000003A7C6E-mapping.dmp
    • memory/2276-825-0x0000000006420000-0x0000000006470000-memory.dmp
      Filesize

      320KB

    • memory/2276-679-0x0000000005D80000-0x0000000005D9E000-memory.dmp
      Filesize

      120KB

    • memory/2276-671-0x0000000005DC0000-0x0000000005E36000-memory.dmp
      Filesize

      472KB

    • memory/2276-652-0x0000000006C40000-0x000000000716C000-memory.dmp
      Filesize

      5.2MB

    • memory/2276-644-0x0000000006540000-0x0000000006702000-memory.dmp
      Filesize

      1.8MB

    • memory/2276-626-0x0000000005B10000-0x0000000005BA2000-memory.dmp
      Filesize

      584KB

    • memory/2276-620-0x0000000005E70000-0x000000000636E000-memory.dmp
      Filesize

      5.0MB

    • memory/2276-596-0x0000000004F10000-0x0000000004F76000-memory.dmp
      Filesize

      408KB

    • memory/2276-553-0x0000000004D90000-0x0000000004DDB000-memory.dmp
      Filesize

      300KB

    • memory/2276-514-0x0000000004C80000-0x0000000004D8A000-memory.dmp
      Filesize

      1.0MB

    • memory/2276-510-0x0000000004B50000-0x0000000004B62000-memory.dmp
      Filesize

      72KB

    • memory/2276-505-0x0000000005160000-0x0000000005766000-memory.dmp
      Filesize

      6.0MB

    • memory/2276-438-0x0000000000390000-0x00000000003AC000-memory.dmp
      Filesize

      112KB

    • memory/2772-124-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-145-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-141-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-117-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-140-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-118-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-139-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-142-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-119-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-138-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-137-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-136-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-135-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-134-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-120-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-133-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-143-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-132-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-151-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-121-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-122-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-131-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-144-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-130-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-129-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-116-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-128-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-123-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-127-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-155-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-150-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-146-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-149-0x0000000001060000-0x00000000013A3000-memory.dmp
      Filesize

      3.3MB

    • memory/2772-125-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-147-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-148-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-126-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2824-431-0x0000000000000000-mapping.dmp
    • memory/2824-595-0x00000186CD6A0000-0x00000186CDE46000-memory.dmp
      Filesize

      7.6MB

    • memory/2824-455-0x0000017EAF280000-0x0000017EAF286000-memory.dmp
      Filesize

      24KB

    • memory/3476-248-0x0000000000000000-mapping.dmp
    • memory/3476-323-0x00000000008D0000-0x000000000094D000-memory.dmp
      Filesize

      500KB

    • memory/3636-238-0x0000000000850000-0x00000000008FC000-memory.dmp
      Filesize

      688KB

    • memory/3636-202-0x0000000000000000-mapping.dmp
    • memory/3808-771-0x0000000000000000-mapping.dmp
    • memory/3956-919-0x0000000005730000-0x0000000005879000-memory.dmp
      Filesize

      1.3MB

    • memory/3956-912-0x0000000005730000-0x0000000005879000-memory.dmp
      Filesize

      1.3MB

    • memory/3956-911-0x0000000005450000-0x00000000055DC000-memory.dmp
      Filesize

      1.5MB

    • memory/3956-862-0x0000000000000000-mapping.dmp
    • memory/3976-861-0x0000000000000000-mapping.dmp
    • memory/4568-391-0x0000000001320000-0x000000000138A000-memory.dmp
      Filesize

      424KB

    • memory/4568-301-0x0000000000000000-mapping.dmp
    • memory/4636-640-0x0000000000000000-mapping.dmp
    • memory/4740-826-0x0000000000000000-mapping.dmp
    • memory/4784-752-0x0000000000000000-mapping.dmp
    • memory/4928-336-0x0000000000400000-0x000000000045B000-memory.dmp
      Filesize

      364KB

    • memory/4928-712-0x0000000000400000-0x000000000045B000-memory.dmp
      Filesize

      364KB

    • memory/4928-242-0x000000000042094D-mapping.dmp
    • memory/4928-757-0x0000000000400000-0x000000000045B000-memory.dmp
      Filesize

      364KB