Analysis

  • max time kernel
    121s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27-01-2023 04:31

General

  • Target

    deflated-gimp-2.10.32.-setup-1.exe

  • Size

    217KB

  • MD5

    009d70132e15d6f0bf593da170f0b7b0

  • SHA1

    5a1bd8f31059de4e46778510fffd23c87bc32740

  • SHA256

    af8ea2ae4917c68825f1c60f3900634cc7c2d3d2de079215f1aacf116841418c

  • SHA512

    5192b9c860b4e10a329b181f4419cd7443f602ec9174d9c538e0843d10e59e4472df0e1b2a6572d96f89ad061eb1f6ea6240c8dd11d860664f93500dbee4824d

  • SSDEEP

    3072:uI71VdaROKutNI6mKR0QHTT1Xm4B1jj0hhih3GD2xvwN64u/KKR7:uInda0KuksNzB1jjAoGD2lww4V

Malware Config

Extracted

Family

redline

Botnet

redline

C2

79.137.133.225:25999

Attributes
  • auth_value

    38284dbf15da9b4a9eaee0ef0d2b343f

Signatures

  • Detect PureCrypter injector 4 IoCs
  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\deflated-gimp-2.10.32.-setup-1.exe
    "C:\Users\Admin\AppData\Local\Temp\deflated-gimp-2.10.32.-setup-1.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Users\Admin\AppData\Local\Temp\tmp3DCB.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp3DCB.tmp.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:676
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1620
      • C:\Users\Admin\AppData\Local\Temp\tmp3DCB.tmp.exe
        C:\Users\Admin\AppData\Local\Temp\tmp3DCB.tmp.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1440
    • C:\Users\Admin\AppData\Local\Temp\tmp3DDB.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp3DDB.tmp.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1356
    • C:\Users\Admin\AppData\Local\Temp\tmp3E0B.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp3E0B.tmp.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1424
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1612
      • C:\Users\Admin\AppData\Local\Temp\tmp3E0B.tmp.exe
        C:\Users\Admin\AppData\Local\Temp\tmp3E0B.tmp.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:676
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -Seconds 5; Stop-Process 676 -Force; Start-Sleep -Seconds 2; Remove-Item "C:\Users\Admin\AppData\Local\Temp\tmp3E0B.tmp.exe" -Force
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1736
    • C:\Users\Admin\AppData\Local\Temp\tmp3E3B.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp3E3B.tmp.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1468
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1996
      • C:\Users\Admin\AppData\Local\Temp\tmp3E3B.tmp.exe
        C:\Users\Admin\AppData\Local\Temp\tmp3E3B.tmp.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:612

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    e17f505346ec76004f34d78b7e0cabb6

    SHA1

    29bf3aa896edaf95ed15b62c337d37305382bdd3

    SHA256

    87ab3f7b63f20ee9af4d8b7d7eee6ff5ea70dd3de4e0b5ff581e91488bb08d2a

    SHA512

    63b4532768c7b8d32fc1fa03d92373e2f83c232ae24f9d4a8b015ddf7f3f8f7f88dec7ee92c8a3526c314b68d539a80998926f8c8c286c350a84efdf9c799761

  • C:\Users\Admin\AppData\Local\Temp\tmp3DCB.tmp.exe
    Filesize

    2.3MB

    MD5

    1d85c4d35f557fbbde158258300b753f

    SHA1

    1a0f596ee4f5abdb3dc3bad8a1247625fce982ea

    SHA256

    36ccb94aa071489c4f03b72cd09c2560e40d66e541e006b5f6ca1b6e84ef2e1a

    SHA512

    09aa7748f392dd2104672e4f774d717298659bb6df21db51de8455e01dba0ee0d5761ecf7cf5bd24eaae80943b91ed4ab189d1e1a0df9621636bb33a2e2cdd52

  • C:\Users\Admin\AppData\Local\Temp\tmp3DCB.tmp.exe
    Filesize

    2.3MB

    MD5

    1d85c4d35f557fbbde158258300b753f

    SHA1

    1a0f596ee4f5abdb3dc3bad8a1247625fce982ea

    SHA256

    36ccb94aa071489c4f03b72cd09c2560e40d66e541e006b5f6ca1b6e84ef2e1a

    SHA512

    09aa7748f392dd2104672e4f774d717298659bb6df21db51de8455e01dba0ee0d5761ecf7cf5bd24eaae80943b91ed4ab189d1e1a0df9621636bb33a2e2cdd52

  • C:\Users\Admin\AppData\Local\Temp\tmp3DCB.tmp.exe
    Filesize

    2.3MB

    MD5

    1d85c4d35f557fbbde158258300b753f

    SHA1

    1a0f596ee4f5abdb3dc3bad8a1247625fce982ea

    SHA256

    36ccb94aa071489c4f03b72cd09c2560e40d66e541e006b5f6ca1b6e84ef2e1a

    SHA512

    09aa7748f392dd2104672e4f774d717298659bb6df21db51de8455e01dba0ee0d5761ecf7cf5bd24eaae80943b91ed4ab189d1e1a0df9621636bb33a2e2cdd52

  • C:\Users\Admin\AppData\Local\Temp\tmp3DDB.tmp.exe
    Filesize

    4.0MB

    MD5

    58f86d3f8a1f981a7c7bf541c3bc787b

    SHA1

    a6b43c84c1b79551b39fc7c589deec969de84227

    SHA256

    5ec2cb39e7538c4c2eaedcd2c2ce1ea79665260e14ff5b6579e33829c06c0235

    SHA512

    88dd8807bbc2ad6f93eacc729489d4a859edf310becfafb788c69de80b716780dde739604d53656be8cbec160c940392d24344d2737ff9d25e064f29989b7719

  • C:\Users\Admin\AppData\Local\Temp\tmp3DDB.tmp.exe
    Filesize

    4.0MB

    MD5

    58f86d3f8a1f981a7c7bf541c3bc787b

    SHA1

    a6b43c84c1b79551b39fc7c589deec969de84227

    SHA256

    5ec2cb39e7538c4c2eaedcd2c2ce1ea79665260e14ff5b6579e33829c06c0235

    SHA512

    88dd8807bbc2ad6f93eacc729489d4a859edf310becfafb788c69de80b716780dde739604d53656be8cbec160c940392d24344d2737ff9d25e064f29989b7719

  • C:\Users\Admin\AppData\Local\Temp\tmp3E0B.tmp.exe
    Filesize

    2.8MB

    MD5

    dd3be814f985b521299022ac5b69f8f1

    SHA1

    f7be9ac89ea6632004c8251e3f814cd21ec481a8

    SHA256

    83533cb6a1439e6abdad6ed5f64ebfcf0768309ebacaeee2bdd86d9fd6fc5bc6

    SHA512

    964a09e433dbc59764c78356304c59cb6533afe621a426ba6565888de6ac77c4f48ead61e11ae4b48ac8497eda13122819b08f4a8126bdb86ed727addaf9b253

  • C:\Users\Admin\AppData\Local\Temp\tmp3E0B.tmp.exe
    Filesize

    2.8MB

    MD5

    dd3be814f985b521299022ac5b69f8f1

    SHA1

    f7be9ac89ea6632004c8251e3f814cd21ec481a8

    SHA256

    83533cb6a1439e6abdad6ed5f64ebfcf0768309ebacaeee2bdd86d9fd6fc5bc6

    SHA512

    964a09e433dbc59764c78356304c59cb6533afe621a426ba6565888de6ac77c4f48ead61e11ae4b48ac8497eda13122819b08f4a8126bdb86ed727addaf9b253

  • C:\Users\Admin\AppData\Local\Temp\tmp3E0B.tmp.exe
    Filesize

    2.8MB

    MD5

    dd3be814f985b521299022ac5b69f8f1

    SHA1

    f7be9ac89ea6632004c8251e3f814cd21ec481a8

    SHA256

    83533cb6a1439e6abdad6ed5f64ebfcf0768309ebacaeee2bdd86d9fd6fc5bc6

    SHA512

    964a09e433dbc59764c78356304c59cb6533afe621a426ba6565888de6ac77c4f48ead61e11ae4b48ac8497eda13122819b08f4a8126bdb86ed727addaf9b253

  • C:\Users\Admin\AppData\Local\Temp\tmp3E3B.tmp.exe
    Filesize

    2.7MB

    MD5

    e0a5c7191e00ea683c4e73b1c80b8823

    SHA1

    8349e708101ba87a868fcf7cb4d00b91f1620ff6

    SHA256

    95dd221630d172703a90842a31b0e25a97f98c236e7a4cc09e5dc5862d8d0370

    SHA512

    1f2c10f8205952f613f406d7ea1c4d4bcdf6c71286ca4db859e3a131b4ee30af86f0e35cbcd58e3cd2d8f05a7e4a5be4dede910980b0afbfc44b7fea4d9224fa

  • C:\Users\Admin\AppData\Local\Temp\tmp3E3B.tmp.exe
    Filesize

    2.7MB

    MD5

    e0a5c7191e00ea683c4e73b1c80b8823

    SHA1

    8349e708101ba87a868fcf7cb4d00b91f1620ff6

    SHA256

    95dd221630d172703a90842a31b0e25a97f98c236e7a4cc09e5dc5862d8d0370

    SHA512

    1f2c10f8205952f613f406d7ea1c4d4bcdf6c71286ca4db859e3a131b4ee30af86f0e35cbcd58e3cd2d8f05a7e4a5be4dede910980b0afbfc44b7fea4d9224fa

  • C:\Users\Admin\AppData\Local\Temp\tmp3E3B.tmp.exe
    Filesize

    2.7MB

    MD5

    e0a5c7191e00ea683c4e73b1c80b8823

    SHA1

    8349e708101ba87a868fcf7cb4d00b91f1620ff6

    SHA256

    95dd221630d172703a90842a31b0e25a97f98c236e7a4cc09e5dc5862d8d0370

    SHA512

    1f2c10f8205952f613f406d7ea1c4d4bcdf6c71286ca4db859e3a131b4ee30af86f0e35cbcd58e3cd2d8f05a7e4a5be4dede910980b0afbfc44b7fea4d9224fa

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
    Filesize

    7KB

    MD5

    c530d40f5161d6003cc887405cc152e9

    SHA1

    fe9a27d72b23e5d4c9da2cfb6e665ad206260aa3

    SHA256

    99a7fc9216dbaf60ed0346aa0743ccc0f0ae196023fe09c686dfaf770e18e12c

    SHA512

    045fcb41ab9d599097ead9c0e2f0536abac3e003da314365c9d9373683a3988e43189e8d0ca4d9dcdcbb30131d60f503d34e06d2c154601a0d0d50ac9e992042

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
    Filesize

    7KB

    MD5

    d6b1984c8d4c049c7e44691147727510

    SHA1

    043878c98a3fc0e130ada22a69662f991f3b51e3

    SHA256

    ccccb833ab6ef7784ec2c2104533a2f3f811aa8aceb14d264875f73df53cc828

    SHA512

    3007a51ddb6bdfe03bf534ff4b6d15440c5a42ba8e5c37983b3c69b40eb2347738808524de321dc228224aea1d8b02d93b992b889db3275fb1ae5e667ac04af2

  • \??\PIPE\srvsvc
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • \Users\Admin\AppData\Local\Temp\tmp3DCB.tmp.exe
    Filesize

    2.3MB

    MD5

    1d85c4d35f557fbbde158258300b753f

    SHA1

    1a0f596ee4f5abdb3dc3bad8a1247625fce982ea

    SHA256

    36ccb94aa071489c4f03b72cd09c2560e40d66e541e006b5f6ca1b6e84ef2e1a

    SHA512

    09aa7748f392dd2104672e4f774d717298659bb6df21db51de8455e01dba0ee0d5761ecf7cf5bd24eaae80943b91ed4ab189d1e1a0df9621636bb33a2e2cdd52

  • \Users\Admin\AppData\Local\Temp\tmp3DCB.tmp.exe
    Filesize

    2.3MB

    MD5

    1d85c4d35f557fbbde158258300b753f

    SHA1

    1a0f596ee4f5abdb3dc3bad8a1247625fce982ea

    SHA256

    36ccb94aa071489c4f03b72cd09c2560e40d66e541e006b5f6ca1b6e84ef2e1a

    SHA512

    09aa7748f392dd2104672e4f774d717298659bb6df21db51de8455e01dba0ee0d5761ecf7cf5bd24eaae80943b91ed4ab189d1e1a0df9621636bb33a2e2cdd52

  • \Users\Admin\AppData\Local\Temp\tmp3DDB.tmp.exe
    Filesize

    4.0MB

    MD5

    58f86d3f8a1f981a7c7bf541c3bc787b

    SHA1

    a6b43c84c1b79551b39fc7c589deec969de84227

    SHA256

    5ec2cb39e7538c4c2eaedcd2c2ce1ea79665260e14ff5b6579e33829c06c0235

    SHA512

    88dd8807bbc2ad6f93eacc729489d4a859edf310becfafb788c69de80b716780dde739604d53656be8cbec160c940392d24344d2737ff9d25e064f29989b7719

  • \Users\Admin\AppData\Local\Temp\tmp3E0B.tmp.exe
    Filesize

    2.8MB

    MD5

    dd3be814f985b521299022ac5b69f8f1

    SHA1

    f7be9ac89ea6632004c8251e3f814cd21ec481a8

    SHA256

    83533cb6a1439e6abdad6ed5f64ebfcf0768309ebacaeee2bdd86d9fd6fc5bc6

    SHA512

    964a09e433dbc59764c78356304c59cb6533afe621a426ba6565888de6ac77c4f48ead61e11ae4b48ac8497eda13122819b08f4a8126bdb86ed727addaf9b253

  • \Users\Admin\AppData\Local\Temp\tmp3E0B.tmp.exe
    Filesize

    2.8MB

    MD5

    dd3be814f985b521299022ac5b69f8f1

    SHA1

    f7be9ac89ea6632004c8251e3f814cd21ec481a8

    SHA256

    83533cb6a1439e6abdad6ed5f64ebfcf0768309ebacaeee2bdd86d9fd6fc5bc6

    SHA512

    964a09e433dbc59764c78356304c59cb6533afe621a426ba6565888de6ac77c4f48ead61e11ae4b48ac8497eda13122819b08f4a8126bdb86ed727addaf9b253

  • \Users\Admin\AppData\Local\Temp\tmp3E3B.tmp.exe
    Filesize

    2.7MB

    MD5

    e0a5c7191e00ea683c4e73b1c80b8823

    SHA1

    8349e708101ba87a868fcf7cb4d00b91f1620ff6

    SHA256

    95dd221630d172703a90842a31b0e25a97f98c236e7a4cc09e5dc5862d8d0370

    SHA512

    1f2c10f8205952f613f406d7ea1c4d4bcdf6c71286ca4db859e3a131b4ee30af86f0e35cbcd58e3cd2d8f05a7e4a5be4dede910980b0afbfc44b7fea4d9224fa

  • \Users\Admin\AppData\Local\Temp\tmp3E3B.tmp.exe
    Filesize

    2.7MB

    MD5

    e0a5c7191e00ea683c4e73b1c80b8823

    SHA1

    8349e708101ba87a868fcf7cb4d00b91f1620ff6

    SHA256

    95dd221630d172703a90842a31b0e25a97f98c236e7a4cc09e5dc5862d8d0370

    SHA512

    1f2c10f8205952f613f406d7ea1c4d4bcdf6c71286ca4db859e3a131b4ee30af86f0e35cbcd58e3cd2d8f05a7e4a5be4dede910980b0afbfc44b7fea4d9224fa

  • memory/612-124-0x0000000000400000-0x00000000004A6000-memory.dmp
    Filesize

    664KB

  • memory/612-126-0x0000000000400000-0x00000000004A6000-memory.dmp
    Filesize

    664KB

  • memory/612-122-0x0000000000400000-0x00000000004A6000-memory.dmp
    Filesize

    664KB

  • memory/612-125-0x0000000000400000-0x00000000004A6000-memory.dmp
    Filesize

    664KB

  • memory/612-127-0x00000000004A0E0E-mapping.dmp
  • memory/612-132-0x0000000000400000-0x00000000004A6000-memory.dmp
    Filesize

    664KB

  • memory/612-130-0x0000000000400000-0x00000000004A6000-memory.dmp
    Filesize

    664KB

  • memory/612-121-0x0000000000400000-0x00000000004A6000-memory.dmp
    Filesize

    664KB

  • memory/676-63-0x0000000001220000-0x000000000147E000-memory.dmp
    Filesize

    2.4MB

  • memory/676-149-0x0000000002780000-0x000000000281E000-memory.dmp
    Filesize

    632KB

  • memory/676-58-0x0000000000000000-mapping.dmp
  • memory/676-78-0x0000000004B50000-0x0000000004DAC000-memory.dmp
    Filesize

    2.4MB

  • memory/676-144-0x0000000140000000-mapping.dmp
  • memory/676-154-0x000000001B140000-0x000000001B194000-memory.dmp
    Filesize

    336KB

  • memory/676-139-0x0000000140000000-0x0000000140078000-memory.dmp
    Filesize

    480KB

  • memory/676-142-0x0000000140000000-0x0000000140078000-memory.dmp
    Filesize

    480KB

  • memory/676-104-0x0000000000F30000-0x0000000000F7C000-memory.dmp
    Filesize

    304KB

  • memory/676-153-0x0000000000920000-0x000000000096C000-memory.dmp
    Filesize

    304KB

  • memory/676-140-0x0000000140000000-0x0000000140078000-memory.dmp
    Filesize

    480KB

  • memory/676-150-0x0000000000820000-0x0000000000876000-memory.dmp
    Filesize

    344KB

  • memory/676-143-0x0000000140000000-0x0000000140078000-memory.dmp
    Filesize

    480KB

  • memory/1356-68-0x0000000000110000-0x0000000000516000-memory.dmp
    Filesize

    4.0MB

  • memory/1356-61-0x0000000000000000-mapping.dmp
  • memory/1356-77-0x0000000004CE0000-0x00000000050E4000-memory.dmp
    Filesize

    4.0MB

  • memory/1424-137-0x000000001BFC0000-0x000000001C072000-memory.dmp
    Filesize

    712KB

  • memory/1424-95-0x000000001B677000-0x000000001B696000-memory.dmp
    Filesize

    124KB

  • memory/1424-88-0x000000001BBF0000-0x000000001BEC8000-memory.dmp
    Filesize

    2.8MB

  • memory/1424-147-0x000000001B677000-0x000000001B696000-memory.dmp
    Filesize

    124KB

  • memory/1424-79-0x0000000000A10000-0x0000000000CE8000-memory.dmp
    Filesize

    2.8MB

  • memory/1424-66-0x0000000000000000-mapping.dmp
  • memory/1440-112-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/1440-116-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/1440-118-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/1440-106-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/1440-113-0x000000000041B59A-mapping.dmp
  • memory/1440-107-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/1440-111-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/1440-109-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/1468-119-0x00000000059B0000-0x0000000005A46000-memory.dmp
    Filesize

    600KB

  • memory/1468-70-0x0000000000000000-mapping.dmp
  • memory/1468-76-0x0000000004AF0000-0x0000000004DA4000-memory.dmp
    Filesize

    2.7MB

  • memory/1468-74-0x0000000000C90000-0x0000000000F44000-memory.dmp
    Filesize

    2.7MB

  • memory/1612-93-0x000007FEFBB11000-0x000007FEFBB13000-memory.dmp
    Filesize

    8KB

  • memory/1612-96-0x000007FEEBE80000-0x000007FEEC9DD000-memory.dmp
    Filesize

    11.4MB

  • memory/1612-135-0x0000000002424000-0x0000000002427000-memory.dmp
    Filesize

    12KB

  • memory/1612-136-0x000000000242B000-0x000000000244A000-memory.dmp
    Filesize

    124KB

  • memory/1612-94-0x000007FEEC9E0000-0x000007FEED403000-memory.dmp
    Filesize

    10.1MB

  • memory/1612-97-0x0000000002424000-0x0000000002427000-memory.dmp
    Filesize

    12KB

  • memory/1612-92-0x0000000000000000-mapping.dmp
  • memory/1612-103-0x000000000242B000-0x000000000244A000-memory.dmp
    Filesize

    124KB

  • memory/1612-100-0x000000001B730000-0x000000001BA2F000-memory.dmp
    Filesize

    3.0MB

  • memory/1620-90-0x000000006DF10000-0x000000006E4BB000-memory.dmp
    Filesize

    5.7MB

  • memory/1620-98-0x000000006DF10000-0x000000006E4BB000-memory.dmp
    Filesize

    5.7MB

  • memory/1620-102-0x000000006DF10000-0x000000006E4BB000-memory.dmp
    Filesize

    5.7MB

  • memory/1620-84-0x0000000000000000-mapping.dmp
  • memory/1736-159-0x000007FEED690000-0x000007FEEE0B3000-memory.dmp
    Filesize

    10.1MB

  • memory/1736-162-0x000000001B800000-0x000000001BAFF000-memory.dmp
    Filesize

    3.0MB

  • memory/1736-155-0x0000000000000000-mapping.dmp
  • memory/1736-165-0x000000000284B000-0x000000000286A000-memory.dmp
    Filesize

    124KB

  • memory/1736-164-0x0000000002844000-0x0000000002847000-memory.dmp
    Filesize

    12KB

  • memory/1736-163-0x000000000284B000-0x000000000286A000-memory.dmp
    Filesize

    124KB

  • memory/1736-161-0x0000000002844000-0x0000000002847000-memory.dmp
    Filesize

    12KB

  • memory/1736-160-0x000007FEECB30000-0x000007FEED68D000-memory.dmp
    Filesize

    11.4MB

  • memory/1996-101-0x000000006DF10000-0x000000006E4BB000-memory.dmp
    Filesize

    5.7MB

  • memory/1996-99-0x000000006DF10000-0x000000006E4BB000-memory.dmp
    Filesize

    5.7MB

  • memory/1996-83-0x0000000000000000-mapping.dmp
  • memory/1996-91-0x000000006DF10000-0x000000006E4BB000-memory.dmp
    Filesize

    5.7MB

  • memory/2020-89-0x00000000043A5000-0x00000000043B6000-memory.dmp
    Filesize

    68KB

  • memory/2020-54-0x0000000000AE0000-0x0000000000B1C000-memory.dmp
    Filesize

    240KB

  • memory/2020-55-0x0000000074FD1000-0x0000000074FD3000-memory.dmp
    Filesize

    8KB

  • memory/2020-56-0x00000000043A5000-0x00000000043B6000-memory.dmp
    Filesize

    68KB