Analysis

  • max time kernel
    157s
  • max time network
    161s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    29/10/2022, 01:32

General

  • Target

    ed042cc41f4b69c2152d2d0c2f804618b5f10c2a427dac966077f4cb9482b595.exe

  • Size

    260KB

  • MD5

    6f0743f702e066798c1e423c52337c60

  • SHA1

    ec0a3ad3edfce5ee6a6f79290c5a0043b1a23de5

  • SHA256

    ed042cc41f4b69c2152d2d0c2f804618b5f10c2a427dac966077f4cb9482b595

  • SHA512

    db0f27749c8d33645d7a4445e35f9f0ba75852db04c6945a66c0ec96aa3d88c8d55e4cd47f96541df752476ce053e184c47182b5597c9dc55e874cb8edf540cb

  • SSDEEP

    6144:u0BUzLqlgWadI10xA42EGSoYwwwCb/HJ:XB8+lmdLxA42EGtwwKJ

Malware Config

Extracted

Family

vidar

Version

55.2

Botnet

1752

C2

https://t.me/slivetalks

https://c.im/@xinibin420

Attributes
  • profile_id

    1752

Extracted

Family

djvu

C2

http://winnlinne.com/lancer/get.php

Attributes
  • extension

    .pozq

  • offline_id

    oq4l7AoeQAT1wLV4c2ModKTOluU7sQaRllQplQt1

  • payload_url

    http://uaery.top/dl/build2.exe

    http://winnlinne.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-2gP6wwZcZ9 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0593Jhyjd

rsa_pubkey.plain

Extracted

Family

redline

Botnet

mario23_10

C2

167.235.252.160:10642

Attributes
  • auth_value

    eca57cfb5172f71dc45986763bb98942

Signatures

  • Detected Djvu ransomware 3 IoCs
  • Detects Smokeloader packer 1 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 14 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed042cc41f4b69c2152d2d0c2f804618b5f10c2a427dac966077f4cb9482b595.exe
    "C:\Users\Admin\AppData\Local\Temp\ed042cc41f4b69c2152d2d0c2f804618b5f10c2a427dac966077f4cb9482b595.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2364
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\4F39.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3804
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\4F39.dll
      2⤵
      • Loads dropped DLL
      PID:3312
  • C:\Users\Admin\AppData\Local\Temp\5034.exe
    C:\Users\Admin\AppData\Local\Temp\5034.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Checks processor information in registry
    PID:4620
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4620 -s 1556
      2⤵
      • Program crash
      PID:88836
  • C:\Users\Admin\AppData\Local\Temp\5650.exe
    C:\Users\Admin\AppData\Local\Temp\5650.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1440
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:147076
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 197120
      2⤵
      • Program crash
      PID:193508
  • C:\Users\Admin\AppData\Local\Temp\6CA7.exe
    C:\Users\Admin\AppData\Local\Temp\6CA7.exe
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:11324
  • C:\Users\Admin\AppData\Local\Temp\712D.exe
    C:\Users\Admin\AppData\Local\Temp\712D.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:23864
    • C:\Users\Admin\AppData\Local\Temp\712D.exe
      C:\Users\Admin\AppData\Local\Temp\712D.exe
      2⤵
      • Executes dropped EXE
      PID:88048
  • C:\Users\Admin\AppData\Local\Temp\7B30.exe
    C:\Users\Admin\AppData\Local\Temp\7B30.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:57720
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:193444
  • C:\Windows\SysWOW64\explorer.exe
    C:\Windows\SysWOW64\explorer.exe
    1⤵
    • Accesses Microsoft Outlook profiles
    • outlook_office_path
    • outlook_win_path
    PID:68320
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe
    1⤵
      PID:78516
    • C:\Users\Admin\AppData\Local\Temp\5862.exe
      C:\Users\Admin\AppData\Local\Temp\5862.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:89540
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 89540 -s 592
        2⤵
        • Program crash
        PID:90060
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 89540 -s 920
        2⤵
        • Program crash
        PID:90416
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 89540 -s 952
        2⤵
        • Program crash
        PID:90596
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 89540 -s 1028
        2⤵
        • Program crash
        PID:90800
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 89540 -s 1068
        2⤵
        • Program crash
        PID:90896
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 89540 -s 1036
        2⤵
        • Program crash
        PID:90984
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 89540 -s 1080
        2⤵
        • Program crash
        PID:91096
      • C:\Users\Admin\AppData\Local\Temp\5862.exe
        "C:\Users\Admin\AppData\Local\Temp\5862.exe"
        2⤵
        • Executes dropped EXE
        PID:91404
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 91404 -s 564
          3⤵
          • Program crash
          PID:93584
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 91404 -s 856
          3⤵
          • Program crash
          PID:93792
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 91404 -s 992
          3⤵
          • Program crash
          PID:93984
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 91404 -s 948
          3⤵
          • Program crash
          PID:94140
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 89540 -s 1188
        2⤵
        • Program crash
        PID:91460

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\4F39.dll

      Filesize

      2.9MB

      MD5

      29aed617847ea377543d6ee9b6f8e4dc

      SHA1

      d33edffe7aa23884db4e34abf4f7bb5c061beff8

      SHA256

      0e2d36b89cc18e35919d132a0bfe21da4bbbe2d4c884739e4437b37057316c88

      SHA512

      719acd6c61597b4e071fcd8e69d249c9fa31b8978f5d08f18d18c149748708ef4230c1a9797273b9a754d6036109d39adaf5bb5ed047822966c0baedf4a1e688

    • C:\Users\Admin\AppData\Local\Temp\5034.exe

      Filesize

      327KB

      MD5

      d15781d757edf0a03934b606371342ba

      SHA1

      1b21111f86709a97bf5de34d3797219d00a75038

      SHA256

      2ecfd1b2898479688cc8374b178ccc7f75142021dcc40787694faad198c693e4

      SHA512

      ce056282b54538286875bd790aecb16d4eca4de297721247653be9fd3a42c35fcef89efc27c73276b944d19b45e14239c69d01846a83fc179c788b13ba13b4e7

    • C:\Users\Admin\AppData\Local\Temp\5034.exe

      Filesize

      327KB

      MD5

      d15781d757edf0a03934b606371342ba

      SHA1

      1b21111f86709a97bf5de34d3797219d00a75038

      SHA256

      2ecfd1b2898479688cc8374b178ccc7f75142021dcc40787694faad198c693e4

      SHA512

      ce056282b54538286875bd790aecb16d4eca4de297721247653be9fd3a42c35fcef89efc27c73276b944d19b45e14239c69d01846a83fc179c788b13ba13b4e7

    • C:\Users\Admin\AppData\Local\Temp\5650.exe

      Filesize

      1.6MB

      MD5

      ca1c6c4ab17df66febd0fbb52e77e543

      SHA1

      f0312684ec973dc1a062b6aa087b2a33b8d49ad1

      SHA256

      474b143cd92f6a058630687023ce314592ab92775f26257afc7c44e95fef3b1e

      SHA512

      268023576c90cddba97fa2f5efbd887a14efe16863f8bbd6b2f193278e4391f6cb4e3d1e51e8f86e943bf1d0fe9e77e3df5f6e11347ca09a2d8d2babfcda4c45

    • C:\Users\Admin\AppData\Local\Temp\5650.exe

      Filesize

      1.6MB

      MD5

      ca1c6c4ab17df66febd0fbb52e77e543

      SHA1

      f0312684ec973dc1a062b6aa087b2a33b8d49ad1

      SHA256

      474b143cd92f6a058630687023ce314592ab92775f26257afc7c44e95fef3b1e

      SHA512

      268023576c90cddba97fa2f5efbd887a14efe16863f8bbd6b2f193278e4391f6cb4e3d1e51e8f86e943bf1d0fe9e77e3df5f6e11347ca09a2d8d2babfcda4c45

    • C:\Users\Admin\AppData\Local\Temp\5862.exe

      Filesize

      6.1MB

      MD5

      6fd92c892d46d281597eefc2251e7c54

      SHA1

      9669788d6ba9d84fc779142480698721b81f3352

      SHA256

      9f42ddc106dde02a48a89f93f63f50f0fd081970ba865bd628232eaa960cbe71

      SHA512

      2a7fc6ce9db677c58d15edaadeaca8d0ffaf78b9cef7d32b872cec1e688a9eeab1b01d36493b221daca7e0aefe0eb3ef49232e8e520a7b307a754b20905e30cf

    • C:\Users\Admin\AppData\Local\Temp\5862.exe

      Filesize

      6.1MB

      MD5

      6fd92c892d46d281597eefc2251e7c54

      SHA1

      9669788d6ba9d84fc779142480698721b81f3352

      SHA256

      9f42ddc106dde02a48a89f93f63f50f0fd081970ba865bd628232eaa960cbe71

      SHA512

      2a7fc6ce9db677c58d15edaadeaca8d0ffaf78b9cef7d32b872cec1e688a9eeab1b01d36493b221daca7e0aefe0eb3ef49232e8e520a7b307a754b20905e30cf

    • C:\Users\Admin\AppData\Local\Temp\5862.exe

      Filesize

      6.1MB

      MD5

      6fd92c892d46d281597eefc2251e7c54

      SHA1

      9669788d6ba9d84fc779142480698721b81f3352

      SHA256

      9f42ddc106dde02a48a89f93f63f50f0fd081970ba865bd628232eaa960cbe71

      SHA512

      2a7fc6ce9db677c58d15edaadeaca8d0ffaf78b9cef7d32b872cec1e688a9eeab1b01d36493b221daca7e0aefe0eb3ef49232e8e520a7b307a754b20905e30cf

    • C:\Users\Admin\AppData\Local\Temp\6CA7.exe

      Filesize

      256KB

      MD5

      322e1f9be173e881a9338aa15fc2f779

      SHA1

      abf139eccde40824b0eb52e2a275e400f25d3a1d

      SHA256

      4468ce5cc5fe2589893be91a0cd2170aad8ec75aff9d1003d36995cabcad3658

      SHA512

      ae9f8521e84cadbd4782e254ac7408f74c8d595561803b93a420c56b5c4d48c3d2080fb04627cc6d5ac2159aa4c3428bf4e91b0072b21c2408dcfa33c7e5ca3b

    • C:\Users\Admin\AppData\Local\Temp\6CA7.exe

      Filesize

      256KB

      MD5

      322e1f9be173e881a9338aa15fc2f779

      SHA1

      abf139eccde40824b0eb52e2a275e400f25d3a1d

      SHA256

      4468ce5cc5fe2589893be91a0cd2170aad8ec75aff9d1003d36995cabcad3658

      SHA512

      ae9f8521e84cadbd4782e254ac7408f74c8d595561803b93a420c56b5c4d48c3d2080fb04627cc6d5ac2159aa4c3428bf4e91b0072b21c2408dcfa33c7e5ca3b

    • C:\Users\Admin\AppData\Local\Temp\712D.exe

      Filesize

      767KB

      MD5

      255b28fdb2739fed02c7fa07e8a203eb

      SHA1

      5b8120a3c5806fa0625f3da9d4c677f3e8546c01

      SHA256

      d747f2231ca7608bdfda9b0069afd178a45f170940558a7423b956cbaa818279

      SHA512

      a1fe4c3696a0902618f485f0621b044285e0cb94a24a3a8f1b26cfe9785b409850506b1d675891e89564ed889ba6ffce83c030284a8c94e12f8b87eeb55d76e4

    • C:\Users\Admin\AppData\Local\Temp\712D.exe

      Filesize

      767KB

      MD5

      255b28fdb2739fed02c7fa07e8a203eb

      SHA1

      5b8120a3c5806fa0625f3da9d4c677f3e8546c01

      SHA256

      d747f2231ca7608bdfda9b0069afd178a45f170940558a7423b956cbaa818279

      SHA512

      a1fe4c3696a0902618f485f0621b044285e0cb94a24a3a8f1b26cfe9785b409850506b1d675891e89564ed889ba6ffce83c030284a8c94e12f8b87eeb55d76e4

    • C:\Users\Admin\AppData\Local\Temp\712D.exe

      Filesize

      767KB

      MD5

      255b28fdb2739fed02c7fa07e8a203eb

      SHA1

      5b8120a3c5806fa0625f3da9d4c677f3e8546c01

      SHA256

      d747f2231ca7608bdfda9b0069afd178a45f170940558a7423b956cbaa818279

      SHA512

      a1fe4c3696a0902618f485f0621b044285e0cb94a24a3a8f1b26cfe9785b409850506b1d675891e89564ed889ba6ffce83c030284a8c94e12f8b87eeb55d76e4

    • C:\Users\Admin\AppData\Local\Temp\7B30.exe

      Filesize

      1.4MB

      MD5

      be5e5013e21321a527331fc2df3e0d53

      SHA1

      6e3d9c3e71a7248deb8d99246f2336fb901b907e

      SHA256

      296453246eb59d82e13b3300e1ae490c6ea58e008cfa627c7a3bedcf9c69b8c1

      SHA512

      ad2bcb112ae04752fbec216f6124e9a849780b088320c3096ced3ff37178bd06b87017e53938b0f29005b3fb856291f16f2a9d747ec41f44d022cde6283ca122

    • C:\Users\Admin\AppData\Local\Temp\7B30.exe

      Filesize

      1.4MB

      MD5

      be5e5013e21321a527331fc2df3e0d53

      SHA1

      6e3d9c3e71a7248deb8d99246f2336fb901b907e

      SHA256

      296453246eb59d82e13b3300e1ae490c6ea58e008cfa627c7a3bedcf9c69b8c1

      SHA512

      ad2bcb112ae04752fbec216f6124e9a849780b088320c3096ced3ff37178bd06b87017e53938b0f29005b3fb856291f16f2a9d747ec41f44d022cde6283ca122

    • \ProgramData\mozglue.dll

      Filesize

      593KB

      MD5

      c8fd9be83bc728cc04beffafc2907fe9

      SHA1

      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

      SHA256

      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

      SHA512

      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

    • \ProgramData\nss3.dll

      Filesize

      2.0MB

      MD5

      1cc453cdf74f31e4d913ff9c10acdde2

      SHA1

      6e85eae544d6e965f15fa5c39700fa7202f3aafe

      SHA256

      ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

      SHA512

      dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

    • \ProgramData\sqlite3.dll

      Filesize

      1.1MB

      MD5

      1f44d4d3087c2b202cf9c90ee9d04b0f

      SHA1

      106a3ebc9e39ab6ddb3ff987efb6527c956f192d

      SHA256

      4841020c8bd06b08fde6e44cbe2e2ab33439e1c8368e936ec5b00dc0584f7260

      SHA512

      b614c72a3c1ce681ebffa628e29aa50275cc80ca9267380960c5198ea4d0a3f2df6cfb7275491d220bad72f14fc94e6656501e9a061d102fb11e00cfda2beb45

    • \Users\Admin\AppData\Local\Temp\4F39.dll

      Filesize

      2.9MB

      MD5

      29aed617847ea377543d6ee9b6f8e4dc

      SHA1

      d33edffe7aa23884db4e34abf4f7bb5c061beff8

      SHA256

      0e2d36b89cc18e35919d132a0bfe21da4bbbe2d4c884739e4437b37057316c88

      SHA512

      719acd6c61597b4e071fcd8e69d249c9fa31b8978f5d08f18d18c149748708ef4230c1a9797273b9a754d6036109d39adaf5bb5ed047822966c0baedf4a1e688

    • \Users\Admin\AppData\Local\Temp\4F39.dll

      Filesize

      2.9MB

      MD5

      29aed617847ea377543d6ee9b6f8e4dc

      SHA1

      d33edffe7aa23884db4e34abf4f7bb5c061beff8

      SHA256

      0e2d36b89cc18e35919d132a0bfe21da4bbbe2d4c884739e4437b37057316c88

      SHA512

      719acd6c61597b4e071fcd8e69d249c9fa31b8978f5d08f18d18c149748708ef4230c1a9797273b9a754d6036109d39adaf5bb5ed047822966c0baedf4a1e688

    • memory/1440-179-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/1440-184-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/1440-177-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/1440-195-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/1440-182-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-135-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-138-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-148-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-149-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-150-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-151-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-152-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-153-0x0000000002E03000-0x0000000002E19000-memory.dmp

      Filesize

      88KB

    • memory/2364-154-0x00000000001E0000-0x00000000001E9000-memory.dmp

      Filesize

      36KB

    • memory/2364-155-0x0000000000400000-0x0000000002C2F000-memory.dmp

      Filesize

      40.2MB

    • memory/2364-156-0x0000000000400000-0x0000000002C2F000-memory.dmp

      Filesize

      40.2MB

    • memory/2364-146-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-145-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-144-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-143-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-142-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-141-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-140-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-139-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-147-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-137-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-136-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-134-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-133-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-132-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-131-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-130-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-129-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-128-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-127-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-126-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-125-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-124-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-123-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-122-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-121-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/2364-120-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/3312-190-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/3312-186-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/3312-183-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/3312-187-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/3312-188-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/3312-189-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/3312-185-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/3312-191-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/3312-192-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/3312-348-0x0000000004BD0000-0x0000000004E5E000-memory.dmp

      Filesize

      2.6MB

    • memory/3312-194-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/3312-193-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/3312-350-0x0000000004FB0000-0x00000000050F8000-memory.dmp

      Filesize

      1.3MB

    • memory/3312-693-0x0000000004FB0000-0x00000000050F8000-memory.dmp

      Filesize

      1.3MB

    • memory/4620-212-0x00000000008F6000-0x0000000000922000-memory.dmp

      Filesize

      176KB

    • memory/4620-239-0x0000000000400000-0x00000000005B0000-memory.dmp

      Filesize

      1.7MB

    • memory/4620-216-0x00000000005B0000-0x00000000006FA000-memory.dmp

      Filesize

      1.3MB

    • memory/4620-178-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/4620-180-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/4620-175-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/4620-172-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/4620-160-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/4620-170-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/4620-168-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/4620-174-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/4620-161-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/4620-166-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/4620-162-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/4620-163-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/4620-337-0x00000000005B0000-0x00000000006FA000-memory.dmp

      Filesize

      1.3MB

    • memory/4620-346-0x00000000008F6000-0x0000000000922000-memory.dmp

      Filesize

      176KB

    • memory/4620-169-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/4620-165-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/4620-363-0x0000000000400000-0x00000000005B0000-memory.dmp

      Filesize

      1.7MB

    • memory/4620-164-0x0000000077D40000-0x0000000077ECE000-memory.dmp

      Filesize

      1.6MB

    • memory/11324-431-0x0000000002D60000-0x0000000002EAA000-memory.dmp

      Filesize

      1.3MB

    • memory/11324-424-0x0000000002D60000-0x0000000002EAA000-memory.dmp

      Filesize

      1.3MB

    • memory/11324-470-0x0000000000400000-0x0000000002C2E000-memory.dmp

      Filesize

      40.2MB

    • memory/11324-601-0x0000000000400000-0x0000000002C2E000-memory.dmp

      Filesize

      40.2MB

    • memory/23864-484-0x0000000002CB0000-0x0000000002DFA000-memory.dmp

      Filesize

      1.3MB

    • memory/23864-488-0x00000000049F0000-0x0000000004B0B000-memory.dmp

      Filesize

      1.1MB

    • memory/57720-464-0x0000000000400000-0x000000000056D000-memory.dmp

      Filesize

      1.4MB

    • memory/68320-514-0x0000000003090000-0x0000000003105000-memory.dmp

      Filesize

      468KB

    • memory/68320-518-0x0000000003020000-0x000000000308B000-memory.dmp

      Filesize

      428KB

    • memory/68320-603-0x0000000003020000-0x000000000308B000-memory.dmp

      Filesize

      428KB

    • memory/78516-320-0x00000000006C0000-0x00000000006CC000-memory.dmp

      Filesize

      48KB

    • memory/78516-316-0x00000000006D0000-0x00000000006D7000-memory.dmp

      Filesize

      28KB

    • memory/88048-600-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/89540-997-0x0000000003720000-0x0000000003D14000-memory.dmp

      Filesize

      6.0MB

    • memory/89540-823-0x0000000000400000-0x0000000003204000-memory.dmp

      Filesize

      46.0MB

    • memory/89540-786-0x00000000054C0000-0x0000000005AE0000-memory.dmp

      Filesize

      6.1MB

    • memory/89540-781-0x0000000003720000-0x0000000003D14000-memory.dmp

      Filesize

      6.0MB

    • memory/91404-1298-0x0000000003730000-0x0000000003D1F000-memory.dmp

      Filesize

      5.9MB

    • memory/91404-1320-0x0000000000400000-0x0000000003204000-memory.dmp

      Filesize

      46.0MB

    • memory/147076-749-0x000000000A630000-0x000000000A6C2000-memory.dmp

      Filesize

      584KB

    • memory/147076-565-0x0000000000400000-0x0000000000460000-memory.dmp

      Filesize

      384KB

    • memory/147076-731-0x000000000ADA0000-0x000000000B29E000-memory.dmp

      Filesize

      5.0MB

    • memory/147076-694-0x0000000009990000-0x00000000099DB000-memory.dmp

      Filesize

      300KB

    • memory/147076-756-0x000000000AA70000-0x000000000AC32000-memory.dmp

      Filesize

      1.8MB

    • memory/147076-769-0x000000000CAF0000-0x000000000D01C000-memory.dmp

      Filesize

      5.2MB

    • memory/147076-681-0x00000000097B0000-0x00000000097C2000-memory.dmp

      Filesize

      72KB

    • memory/147076-678-0x0000000009880000-0x000000000998A000-memory.dmp

      Filesize

      1.0MB

    • memory/193444-685-0x0000000008D30000-0x0000000008D6E000-memory.dmp

      Filesize

      248KB

    • memory/193444-621-0x0000000006690000-0x0000000006696000-memory.dmp

      Filesize

      24KB

    • memory/193444-677-0x0000000009300000-0x0000000009906000-memory.dmp

      Filesize

      6.0MB

    • memory/193444-564-0x0000000004700000-0x0000000004760000-memory.dmp

      Filesize

      384KB

    • memory/193444-728-0x0000000009190000-0x00000000091F6000-memory.dmp

      Filesize

      408KB