Analysis

  • max time kernel
    95s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30-11-2022 21:20

General

  • Target

    780e633b56607c091dcf8b6cdde49fc66d1a343c067369eac6d45c28247b0f06.exe

  • Size

    243KB

  • MD5

    db745dc6374c0b2ed58ecd74b1940fd0

  • SHA1

    fd6313c7f08cccb66f0a98a13bad7c7ed61108e2

  • SHA256

    780e633b56607c091dcf8b6cdde49fc66d1a343c067369eac6d45c28247b0f06

  • SHA512

    e77f7632b9b1a1a4d78454bbe26b1c81535d08cc54a0e381ad7c0a02238ec8347c79c8242d5db1cbe78a2332560fa546ec1df48ad9c3495b4d0f88221e9fd23e

  • SSDEEP

    6144:GMEU0V8hQmbym8CnP1Evx4ujRk6eh+Ml:GMb+HM8C9EvltBgR

Malware Config

Extracted

Family

amadey

Version

3.50

C2

62.204.41.252/nB8cWack3/index.php

Extracted

Family

vidar

Version

55.9

Botnet

909

C2

https://t.me/headshotsonly

https://steamcommunity.com/profiles/76561199436777531

Attributes
  • profile_id

    909

Extracted

Family

redline

Botnet

@REDLINEVIP Cloud (TG: @FATHEROFCARDERS)

C2

151.80.89.233:13553

Attributes
  • auth_value

    fbee175162920530e6bf470c8003fa1a

Extracted

Family

redline

Botnet

Lege

C2

31.41.244.14:4694

Attributes
  • auth_value

    096090aaf3ba0872338140cec5689868

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\780e633b56607c091dcf8b6cdde49fc66d1a343c067369eac6d45c28247b0f06.exe
    "C:\Users\Admin\AppData\Local\Temp\780e633b56607c091dcf8b6cdde49fc66d1a343c067369eac6d45c28247b0f06.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5052
    • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
      "C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1600
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:4304
      • C:\Users\Admin\AppData\Local\Temp\1000024001\123.exe
        "C:\Users\Admin\AppData\Local\Temp\1000024001\123.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3300
        • C:\Users\Admin\AppData\Local\Temp\1000024001\123.exe
          "C:\Users\Admin\AppData\Local\Temp\1000024001\123.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:5016
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1000024001\123.exe" & exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2772
            • C:\Windows\SysWOW64\timeout.exe
              timeout /t 6
              6⤵
              • Delays execution with timeout.exe
              PID:1192
      • C:\Users\Admin\AppData\Local\Temp\1000025001\40K.exe
        "C:\Users\Admin\AppData\Local\Temp\1000025001\40K.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1820
      • C:\Users\Admin\AppData\Local\Temp\1000026001\Lege.exe
        "C:\Users\Admin\AppData\Local\Temp\1000026001\Lege.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4812
      • C:\Users\Admin\AppData\Local\Temp\1000027001\linda5.exe
        "C:\Users\Admin\AppData\Local\Temp\1000027001\linda5.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4256
        • C:\Windows\SysWOW64\msiexec.exe
          "C:\Windows\System32\msiexec.exe" /y .\Q16tIcM.CB
          4⤵
          • Loads dropped DLL
          PID:4976
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • outlook_win_path
        PID:2360
  • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
    C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
    1⤵
    • Executes dropped EXE
    PID:4856
  • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
    C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
    1⤵
    • Executes dropped EXE
    PID:5092

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

4
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

4
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1000024001\123.exe
    Filesize

    389KB

    MD5

    dc25367580940e04fdbf1b41a4668dd6

    SHA1

    62e8ef3cfa7eb33d59e46cfe2ee1cba3600cf4a9

    SHA256

    71f865d049fb8a9d07c0e65fcfa174e200dc5fd1e9de3af19f5d77f8a2014305

    SHA512

    612f0ac06684a2662f67a68fda021287b397ebaa76c9f781d4fad14bf6e94daf12d1978e1f14c13369e3987f094382f52af90f4d6979fa9c535d2dac64db5075

  • C:\Users\Admin\AppData\Local\Temp\1000024001\123.exe
    Filesize

    389KB

    MD5

    dc25367580940e04fdbf1b41a4668dd6

    SHA1

    62e8ef3cfa7eb33d59e46cfe2ee1cba3600cf4a9

    SHA256

    71f865d049fb8a9d07c0e65fcfa174e200dc5fd1e9de3af19f5d77f8a2014305

    SHA512

    612f0ac06684a2662f67a68fda021287b397ebaa76c9f781d4fad14bf6e94daf12d1978e1f14c13369e3987f094382f52af90f4d6979fa9c535d2dac64db5075

  • C:\Users\Admin\AppData\Local\Temp\1000024001\123.exe
    Filesize

    389KB

    MD5

    dc25367580940e04fdbf1b41a4668dd6

    SHA1

    62e8ef3cfa7eb33d59e46cfe2ee1cba3600cf4a9

    SHA256

    71f865d049fb8a9d07c0e65fcfa174e200dc5fd1e9de3af19f5d77f8a2014305

    SHA512

    612f0ac06684a2662f67a68fda021287b397ebaa76c9f781d4fad14bf6e94daf12d1978e1f14c13369e3987f094382f52af90f4d6979fa9c535d2dac64db5075

  • C:\Users\Admin\AppData\Local\Temp\1000025001\40K.exe
    Filesize

    137KB

    MD5

    87ef06885fd221a86bba9e5b86a7ea7d

    SHA1

    6644db86f2d557167f442a5fe72a82de3fe943ba

    SHA256

    ab5026bf6fe5d692faaf86752b4c9fa226ec49ba54cfb625579287b498eab20f

    SHA512

    c65b38856d4995b01454754044ae7373363a02b8e228c249fee3c1c2222f2348473f0bba5a5f2e4a280cd183e57dc13423bb09f86919ccb8968c8229310c5ad0

  • C:\Users\Admin\AppData\Local\Temp\1000025001\40K.exe
    Filesize

    137KB

    MD5

    87ef06885fd221a86bba9e5b86a7ea7d

    SHA1

    6644db86f2d557167f442a5fe72a82de3fe943ba

    SHA256

    ab5026bf6fe5d692faaf86752b4c9fa226ec49ba54cfb625579287b498eab20f

    SHA512

    c65b38856d4995b01454754044ae7373363a02b8e228c249fee3c1c2222f2348473f0bba5a5f2e4a280cd183e57dc13423bb09f86919ccb8968c8229310c5ad0

  • C:\Users\Admin\AppData\Local\Temp\1000026001\Lege.exe
    Filesize

    137KB

    MD5

    0a793a6b9941c49675a47a2bc91cb420

    SHA1

    ff051cc2d9cf081e863f5bb8c3d2449c28f12c7f

    SHA256

    3bb977fda504647a2f21a19b67c3edf91ea1eb35166258164eb89b8ae1603c60

    SHA512

    fd695f62ef32f79f3b4e5c57c68056b004355d5a16e6558bfb310f8ded03c837fe5f505f5a4f433a740fa0b980a71962571c3dd4ed86d95146a22f126850dc36

  • C:\Users\Admin\AppData\Local\Temp\1000026001\Lege.exe
    Filesize

    137KB

    MD5

    0a793a6b9941c49675a47a2bc91cb420

    SHA1

    ff051cc2d9cf081e863f5bb8c3d2449c28f12c7f

    SHA256

    3bb977fda504647a2f21a19b67c3edf91ea1eb35166258164eb89b8ae1603c60

    SHA512

    fd695f62ef32f79f3b4e5c57c68056b004355d5a16e6558bfb310f8ded03c837fe5f505f5a4f433a740fa0b980a71962571c3dd4ed86d95146a22f126850dc36

  • C:\Users\Admin\AppData\Local\Temp\1000027001\linda5.exe
    Filesize

    1.6MB

    MD5

    cbd965445a8c5e4568209e041a859fac

    SHA1

    00d847680a33ddcede3719313784de9c073dfcdc

    SHA256

    a6036a6fa56c25e452b2849acf9932131987a240c495913896aba681f4267191

    SHA512

    d67b615cd3e0b55a53f604c3ee29394d03cfe6e9a51b092f97e664cc9a2359a6735becdd373b59dde49fdd7b4a1a1fd46abcca2decd270daa0c5c6a0206d1f35

  • C:\Users\Admin\AppData\Local\Temp\1000027001\linda5.exe
    Filesize

    1.6MB

    MD5

    cbd965445a8c5e4568209e041a859fac

    SHA1

    00d847680a33ddcede3719313784de9c073dfcdc

    SHA256

    a6036a6fa56c25e452b2849acf9932131987a240c495913896aba681f4267191

    SHA512

    d67b615cd3e0b55a53f604c3ee29394d03cfe6e9a51b092f97e664cc9a2359a6735becdd373b59dde49fdd7b4a1a1fd46abcca2decd270daa0c5c6a0206d1f35

  • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
    Filesize

    243KB

    MD5

    db745dc6374c0b2ed58ecd74b1940fd0

    SHA1

    fd6313c7f08cccb66f0a98a13bad7c7ed61108e2

    SHA256

    780e633b56607c091dcf8b6cdde49fc66d1a343c067369eac6d45c28247b0f06

    SHA512

    e77f7632b9b1a1a4d78454bbe26b1c81535d08cc54a0e381ad7c0a02238ec8347c79c8242d5db1cbe78a2332560fa546ec1df48ad9c3495b4d0f88221e9fd23e

  • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
    Filesize

    243KB

    MD5

    db745dc6374c0b2ed58ecd74b1940fd0

    SHA1

    fd6313c7f08cccb66f0a98a13bad7c7ed61108e2

    SHA256

    780e633b56607c091dcf8b6cdde49fc66d1a343c067369eac6d45c28247b0f06

    SHA512

    e77f7632b9b1a1a4d78454bbe26b1c81535d08cc54a0e381ad7c0a02238ec8347c79c8242d5db1cbe78a2332560fa546ec1df48ad9c3495b4d0f88221e9fd23e

  • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
    Filesize

    243KB

    MD5

    db745dc6374c0b2ed58ecd74b1940fd0

    SHA1

    fd6313c7f08cccb66f0a98a13bad7c7ed61108e2

    SHA256

    780e633b56607c091dcf8b6cdde49fc66d1a343c067369eac6d45c28247b0f06

    SHA512

    e77f7632b9b1a1a4d78454bbe26b1c81535d08cc54a0e381ad7c0a02238ec8347c79c8242d5db1cbe78a2332560fa546ec1df48ad9c3495b4d0f88221e9fd23e

  • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
    Filesize

    243KB

    MD5

    db745dc6374c0b2ed58ecd74b1940fd0

    SHA1

    fd6313c7f08cccb66f0a98a13bad7c7ed61108e2

    SHA256

    780e633b56607c091dcf8b6cdde49fc66d1a343c067369eac6d45c28247b0f06

    SHA512

    e77f7632b9b1a1a4d78454bbe26b1c81535d08cc54a0e381ad7c0a02238ec8347c79c8242d5db1cbe78a2332560fa546ec1df48ad9c3495b4d0f88221e9fd23e

  • C:\Users\Admin\AppData\Local\Temp\Q16tIcM.CB
    Filesize

    1.6MB

    MD5

    daf0a3b304e1314760baef16e6e54e43

    SHA1

    df3758ae7dccd308db37e19e18e1618da86c0cd3

    SHA256

    cd307ccd6eb184413bb0cb520628fc5cad1d33d76bdbb582dec6f743a807370d

    SHA512

    d914264aa8dd4f0b9bdffba6cbaf579233a9d848172c335ed64188d2dfefe93411a8b50574ac5920bdda29a63c2b3dad69a88841f57f6eb0a4b53bb15f78ad20

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
    Filesize

    126KB

    MD5

    d3cb6267ee9076d5aef4a2dbe0d815c8

    SHA1

    840218680463914d50509ed6d7858e328fc8a54c

    SHA256

    fea6ecd2a63044cc6be256142021fc91564c2ae1705620efc2fe6a3f4e265689

    SHA512

    4c10709ae5288dae7d297beecca29b7700e2926787941139e81c61eb4ad0790152991d7447c4243891c51115f5a9dd43b4c0e7dd0f9dfdbe1cc466fbe9f3841a

  • \ProgramData\mozglue.dll
    Filesize

    593KB

    MD5

    c8fd9be83bc728cc04beffafc2907fe9

    SHA1

    95ab9f701e0024cedfbd312bcfe4e726744c4f2e

    SHA256

    ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

    SHA512

    fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

  • \ProgramData\nss3.dll
    Filesize

    2.0MB

    MD5

    1cc453cdf74f31e4d913ff9c10acdde2

    SHA1

    6e85eae544d6e965f15fa5c39700fa7202f3aafe

    SHA256

    ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

    SHA512

    dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

  • \Users\Admin\AppData\Local\Temp\q16tIcM.cB
    Filesize

    1.6MB

    MD5

    daf0a3b304e1314760baef16e6e54e43

    SHA1

    df3758ae7dccd308db37e19e18e1618da86c0cd3

    SHA256

    cd307ccd6eb184413bb0cb520628fc5cad1d33d76bdbb582dec6f743a807370d

    SHA512

    d914264aa8dd4f0b9bdffba6cbaf579233a9d848172c335ed64188d2dfefe93411a8b50574ac5920bdda29a63c2b3dad69a88841f57f6eb0a4b53bb15f78ad20

  • \Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
    Filesize

    126KB

    MD5

    d3cb6267ee9076d5aef4a2dbe0d815c8

    SHA1

    840218680463914d50509ed6d7858e328fc8a54c

    SHA256

    fea6ecd2a63044cc6be256142021fc91564c2ae1705620efc2fe6a3f4e265689

    SHA512

    4c10709ae5288dae7d297beecca29b7700e2926787941139e81c61eb4ad0790152991d7447c4243891c51115f5a9dd43b4c0e7dd0f9dfdbe1cc466fbe9f3841a

  • memory/1192-557-0x0000000000000000-mapping.dmp
  • memory/1600-221-0x00000000007CA000-0x00000000007E9000-memory.dmp
    Filesize

    124KB

  • memory/1600-184-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/1600-222-0x00000000006F0000-0x000000000072E000-memory.dmp
    Filesize

    248KB

  • memory/1600-451-0x00000000007CA000-0x00000000007E9000-memory.dmp
    Filesize

    124KB

  • memory/1600-191-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/1600-190-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/1600-189-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/1600-188-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/1600-187-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/1600-186-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/1600-185-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/1600-225-0x0000000000400000-0x0000000000472000-memory.dmp
    Filesize

    456KB

  • memory/1600-181-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/1600-183-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/1600-452-0x0000000000400000-0x0000000000472000-memory.dmp
    Filesize

    456KB

  • memory/1600-180-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/1600-179-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/1600-178-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/1600-177-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/1600-174-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/1600-173-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/1600-171-0x0000000000000000-mapping.dmp
  • memory/1820-460-0x0000000007690000-0x000000000779A000-memory.dmp
    Filesize

    1.0MB

  • memory/1820-640-0x0000000008110000-0x0000000008176000-memory.dmp
    Filesize

    408KB

  • memory/1820-358-0x0000000000000000-mapping.dmp
  • memory/1820-406-0x0000000000A40000-0x0000000000A68000-memory.dmp
    Filesize

    160KB

  • memory/1820-456-0x0000000005F40000-0x0000000006546000-memory.dmp
    Filesize

    6.0MB

  • memory/1820-745-0x0000000009280000-0x00000000097AC000-memory.dmp
    Filesize

    5.2MB

  • memory/1820-744-0x0000000008B80000-0x0000000008D42000-memory.dmp
    Filesize

    1.8MB

  • memory/1820-474-0x00000000057B0000-0x00000000057C2000-memory.dmp
    Filesize

    72KB

  • memory/1820-488-0x0000000005930000-0x000000000596E000-memory.dmp
    Filesize

    248KB

  • memory/1820-681-0x0000000008220000-0x00000000082B2000-memory.dmp
    Filesize

    584KB

  • memory/1820-501-0x0000000005970000-0x00000000059BB000-memory.dmp
    Filesize

    300KB

  • memory/2360-781-0x0000000000000000-mapping.dmp
  • memory/2772-540-0x0000000000000000-mapping.dmp
  • memory/3300-296-0x0000000005980000-0x0000000005E7E000-memory.dmp
    Filesize

    5.0MB

  • memory/3300-254-0x0000000000000000-mapping.dmp
  • memory/3300-290-0x0000000000BC0000-0x0000000000C28000-memory.dmp
    Filesize

    416KB

  • memory/4256-585-0x0000000000000000-mapping.dmp
  • memory/4304-227-0x0000000000000000-mapping.dmp
  • memory/4812-519-0x0000000000E40000-0x0000000000E68000-memory.dmp
    Filesize

    160KB

  • memory/4812-742-0x0000000007D70000-0x0000000007DE6000-memory.dmp
    Filesize

    472KB

  • memory/4812-475-0x0000000000000000-mapping.dmp
  • memory/4812-743-0x00000000066A0000-0x00000000066F0000-memory.dmp
    Filesize

    320KB

  • memory/4856-760-0x0000000000560000-0x00000000006AA000-memory.dmp
    Filesize

    1.3MB

  • memory/4856-762-0x0000000000560000-0x00000000006AA000-memory.dmp
    Filesize

    1.3MB

  • memory/4856-773-0x0000000000400000-0x0000000000472000-memory.dmp
    Filesize

    456KB

  • memory/4976-664-0x0000000000000000-mapping.dmp
  • memory/5016-300-0x000000000042353C-mapping.dmp
  • memory/5016-355-0x0000000000400000-0x000000000045F000-memory.dmp
    Filesize

    380KB

  • memory/5016-545-0x0000000000400000-0x000000000045F000-memory.dmp
    Filesize

    380KB

  • memory/5052-137-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-130-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-142-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-141-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-144-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-145-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-140-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-139-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-146-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-147-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-138-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-148-0x000000000074A000-0x0000000000769000-memory.dmp
    Filesize

    124KB

  • memory/5052-149-0x00000000005A0000-0x00000000006EA000-memory.dmp
    Filesize

    1.3MB

  • memory/5052-150-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-163-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-136-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-151-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-135-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-134-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-133-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-132-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-152-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-120-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-153-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-154-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-131-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-155-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-143-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-156-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-157-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-158-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-176-0x0000000000400000-0x0000000000472000-memory.dmp
    Filesize

    456KB

  • memory/5052-129-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-159-0x0000000000400000-0x0000000000472000-memory.dmp
    Filesize

    456KB

  • memory/5052-128-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-127-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-175-0x000000000074A000-0x0000000000769000-memory.dmp
    Filesize

    124KB

  • memory/5052-126-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-160-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-161-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-125-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-124-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-162-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-170-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-169-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-168-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-167-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-166-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-165-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-164-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-123-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-122-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5052-121-0x0000000077AA0000-0x0000000077C2E000-memory.dmp
    Filesize

    1.6MB

  • memory/5092-890-0x0000000000570000-0x00000000006BA000-memory.dmp
    Filesize

    1.3MB

  • memory/5092-891-0x0000000002050000-0x000000000208E000-memory.dmp
    Filesize

    248KB

  • memory/5092-902-0x0000000000400000-0x0000000000472000-memory.dmp
    Filesize

    456KB