Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows10_x64
  • resource
    win10-20220414-en
  • submitted
    17-06-2022 02:47

General

  • Target

    67e0f94ca1fc7682d56aaada7a53b5c9346b9e36745f0f8d2b5ea3bcf3abff40.exe

  • Size

    239KB

  • MD5

    6322fb06f4d1b355a0801e02ec00156c

  • SHA1

    753c9e4a97568ca9a56f1e5876c746686d26852b

  • SHA256

    67e0f94ca1fc7682d56aaada7a53b5c9346b9e36745f0f8d2b5ea3bcf3abff40

  • SHA512

    89fa646024c943c8432595d213d4e083ad48950d8e805c6a31c8236a5c970f940331ba9096587f23c3a4fae61ef9e9e513e4ba4aabe4594b87e4252f57c21255

Malware Config

Extracted

Family

vidar

Version

52.6

Botnet

1415

C2

https://t.me/tg_dailylessons

https://busshi.moe/@olegf9844xx

Attributes
  • profile_id

    1415

Extracted

Family

recordbreaker

C2

http://138.197.179.146/

Extracted

Family

redline

Botnet

mario

C2

193.106.191.129:80

Attributes
  • auth_value

    8fb912f79eac650a3e3f25f46f070f5d

Extracted

Family

redline

Botnet

USAeuTEST

C2

193.106.191.246:23196

Attributes
  • auth_value

    7dbf5ba6d421c1b0e8ce8d5867af4537

Signatures

  • RecordBreaker

    RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

    suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

  • suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

    suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Vidar Stealer 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 6 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67e0f94ca1fc7682d56aaada7a53b5c9346b9e36745f0f8d2b5ea3bcf3abff40.exe
    "C:\Users\Admin\AppData\Local\Temp\67e0f94ca1fc7682d56aaada7a53b5c9346b9e36745f0f8d2b5ea3bcf3abff40.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1184
  • C:\Users\Admin\AppData\Local\Temp\2C9E.exe
    C:\Users\Admin\AppData\Local\Temp\2C9E.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:4060
    • C:\Users\Admin\AppData\Local\Temp\2C9E.exe
      C:\Users\Admin\AppData\Local\Temp\2C9E.exe
      2⤵
      • Executes dropped EXE
      PID:3536
  • C:\Users\Admin\AppData\Local\Temp\4075.exe
    C:\Users\Admin\AppData\Local\Temp\4075.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
        PID:1244
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1020
    • C:\Users\Admin\AppData\Local\Temp\5527.exe
      C:\Users\Admin\AppData\Local\Temp\5527.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks processor information in registry
      PID:928
    • C:\Users\Admin\AppData\Local\Temp\6D82.exe
      C:\Users\Admin\AppData\Local\Temp\6D82.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2264
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell" Start-Sleep -Seconds 10;Start-Sleep -Seconds 10;
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3700
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout 15
        2⤵
          PID:2636
          • C:\Windows\SysWOW64\timeout.exe
            timeout 15
            3⤵
            • Delays execution with timeout.exe
            PID:3736
        • C:\Users\Admin\AppData\Local\Temp\6D82.exe
          C:\Users\Admin\AppData\Local\Temp\6D82.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2260
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        1⤵
        • Accesses Microsoft Outlook profiles
        • outlook_office_path
        • outlook_win_path
        PID:4072
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe
        1⤵
          PID:1744

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Defense Evasion

        Virtualization/Sandbox Evasion

        1
        T1497

        Credential Access

        Credentials in Files

        4
        T1081

        Discovery

        Query Registry

        5
        T1012

        Virtualization/Sandbox Evasion

        1
        T1497

        System Information Discovery

        5
        T1082

        Peripheral Device Discovery

        1
        T1120

        Collection

        Data from Local System

        4
        T1005

        Email Collection

        1
        T1114

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\6D82.exe.log
          Filesize

          710B

          MD5

          0f7e8ddf64c503df6ef2a2e21db58272

          SHA1

          f5ee233b786f93605cdd9f91ac4a68d8d9334bf9

          SHA256

          7102e134d51a9dbad02c448087baaaa3336c5571626177158c967f788d1a2e14

          SHA512

          79821afbf2d9a5104a810e3fcead177cda6934029b08691563b882616a2564e015cc662e376787aba29833e89602d4de0143bcefa4c097551a0604cc47b60455

        • C:\Users\Admin\AppData\Local\Temp\2C9E.exe
          Filesize

          1.7MB

          MD5

          254b148abafdf19e098ecb77a9c86b80

          SHA1

          42d2b71d4dc7159301bc190e053c333dd174e402

          SHA256

          f791af4bc67aaffc24fc3a0f87222b3c62995b9b25476626952551b2f9c797ed

          SHA512

          973e73a9fedc5bb000c44d9ac9f6aba10273c240c1a16551701f5e62fe886f693cd099dbcb6ee4ca37a58fdecdf3e87b5aeebb880833589257da4f4835bb54b6

        • C:\Users\Admin\AppData\Local\Temp\2C9E.exe
          Filesize

          1.7MB

          MD5

          254b148abafdf19e098ecb77a9c86b80

          SHA1

          42d2b71d4dc7159301bc190e053c333dd174e402

          SHA256

          f791af4bc67aaffc24fc3a0f87222b3c62995b9b25476626952551b2f9c797ed

          SHA512

          973e73a9fedc5bb000c44d9ac9f6aba10273c240c1a16551701f5e62fe886f693cd099dbcb6ee4ca37a58fdecdf3e87b5aeebb880833589257da4f4835bb54b6

        • C:\Users\Admin\AppData\Local\Temp\2C9E.exe
          Filesize

          1.7MB

          MD5

          254b148abafdf19e098ecb77a9c86b80

          SHA1

          42d2b71d4dc7159301bc190e053c333dd174e402

          SHA256

          f791af4bc67aaffc24fc3a0f87222b3c62995b9b25476626952551b2f9c797ed

          SHA512

          973e73a9fedc5bb000c44d9ac9f6aba10273c240c1a16551701f5e62fe886f693cd099dbcb6ee4ca37a58fdecdf3e87b5aeebb880833589257da4f4835bb54b6

        • C:\Users\Admin\AppData\Local\Temp\4075.exe
          Filesize

          1.6MB

          MD5

          afbc8407b66c37a33db9db0a783eef9b

          SHA1

          8cc0e05627ca730f5f530c8e84500e9ae7963284

          SHA256

          92e544135488b31959ac03b31fda224e79d68c54f6bff68c910800a4483fad64

          SHA512

          4a7b9b6ef506b36a2efea114667a1691b47e234406f45921e5fecc00fb8ddc73a3993019819a38266b244ddf3c62dc938f82cebbac31ebbc438bca2524be7cb9

        • C:\Users\Admin\AppData\Local\Temp\4075.exe
          Filesize

          1.6MB

          MD5

          afbc8407b66c37a33db9db0a783eef9b

          SHA1

          8cc0e05627ca730f5f530c8e84500e9ae7963284

          SHA256

          92e544135488b31959ac03b31fda224e79d68c54f6bff68c910800a4483fad64

          SHA512

          4a7b9b6ef506b36a2efea114667a1691b47e234406f45921e5fecc00fb8ddc73a3993019819a38266b244ddf3c62dc938f82cebbac31ebbc438bca2524be7cb9

        • C:\Users\Admin\AppData\Local\Temp\5527.exe
          Filesize

          398KB

          MD5

          b11d457d1e93984c08100d700aa8aa3f

          SHA1

          14af67d58e1b88fad577e78713c16c466482aad8

          SHA256

          1f6c22291f1156fc884dbea51aca8f29f58e5106e48d30112f37a11e7dfb1d71

          SHA512

          4c827a1cdb03cd33997768196f91eb50bccb661d0fa32f529313fdffd90e6c38a236c6cea3a86fc165dcf5ed0b2b8493dc69a5018fd8c81b1e9f4fed45992291

        • C:\Users\Admin\AppData\Local\Temp\5527.exe
          Filesize

          398KB

          MD5

          b11d457d1e93984c08100d700aa8aa3f

          SHA1

          14af67d58e1b88fad577e78713c16c466482aad8

          SHA256

          1f6c22291f1156fc884dbea51aca8f29f58e5106e48d30112f37a11e7dfb1d71

          SHA512

          4c827a1cdb03cd33997768196f91eb50bccb661d0fa32f529313fdffd90e6c38a236c6cea3a86fc165dcf5ed0b2b8493dc69a5018fd8c81b1e9f4fed45992291

        • C:\Users\Admin\AppData\Local\Temp\6D82.exe
          Filesize

          857KB

          MD5

          e05e8f5d45e55c5d238f3b112b077ca1

          SHA1

          466203c2d920723eaa3cca76939ad37fd42320b5

          SHA256

          60d613e0e98945c023b210635a37142933823d9a06c16ab55676ea6051a93c30

          SHA512

          abdfeb3b886dd424029a129b36cf76826f795e37496dc215b6eb451b7837c9bd03641757f9784f151a31b50d35b8e656e4de3b362eb097f0882a58e8ea27b980

        • C:\Users\Admin\AppData\Local\Temp\6D82.exe
          Filesize

          857KB

          MD5

          e05e8f5d45e55c5d238f3b112b077ca1

          SHA1

          466203c2d920723eaa3cca76939ad37fd42320b5

          SHA256

          60d613e0e98945c023b210635a37142933823d9a06c16ab55676ea6051a93c30

          SHA512

          abdfeb3b886dd424029a129b36cf76826f795e37496dc215b6eb451b7837c9bd03641757f9784f151a31b50d35b8e656e4de3b362eb097f0882a58e8ea27b980

        • C:\Users\Admin\AppData\Local\Temp\6D82.exe
          Filesize

          857KB

          MD5

          e05e8f5d45e55c5d238f3b112b077ca1

          SHA1

          466203c2d920723eaa3cca76939ad37fd42320b5

          SHA256

          60d613e0e98945c023b210635a37142933823d9a06c16ab55676ea6051a93c30

          SHA512

          abdfeb3b886dd424029a129b36cf76826f795e37496dc215b6eb451b7837c9bd03641757f9784f151a31b50d35b8e656e4de3b362eb097f0882a58e8ea27b980

        • \ProgramData\mozglue.dll
          Filesize

          133KB

          MD5

          8f73c08a9660691143661bf7332c3c27

          SHA1

          37fa65dd737c50fda710fdbde89e51374d0c204a

          SHA256

          3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

          SHA512

          0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

        • \ProgramData\nss3.dll
          Filesize

          1.2MB

          MD5

          bfac4e3c5908856ba17d41edcd455a51

          SHA1

          8eec7e888767aa9e4cca8ff246eb2aacb9170428

          SHA256

          e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

          SHA512

          2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

        • memory/928-598-0x0000000000C90000-0x0000000000DDA000-memory.dmp
          Filesize

          1.3MB

        • memory/928-602-0x0000000000400000-0x0000000000B56000-memory.dmp
          Filesize

          7.3MB

        • memory/928-303-0x0000000000400000-0x0000000000B56000-memory.dmp
          Filesize

          7.3MB

        • memory/928-302-0x0000000000C90000-0x0000000000DDA000-memory.dmp
          Filesize

          1.3MB

        • memory/928-301-0x0000000000E96000-0x0000000000EC3000-memory.dmp
          Filesize

          180KB

        • memory/928-273-0x0000000000000000-mapping.dmp
        • memory/928-594-0x0000000000E96000-0x0000000000EC3000-memory.dmp
          Filesize

          180KB

        • memory/1020-849-0x00000000058B0000-0x0000000005EB6000-memory.dmp
          Filesize

          6.0MB

        • memory/1020-828-0x0000000000400000-0x0000000000420000-memory.dmp
          Filesize

          128KB

        • memory/1020-949-0x00000000078E0000-0x0000000007E0C000-memory.dmp
          Filesize

          5.2MB

        • memory/1020-850-0x0000000002DC0000-0x0000000002DD2000-memory.dmp
          Filesize

          72KB

        • memory/1020-851-0x00000000053B0000-0x00000000054BA000-memory.dmp
          Filesize

          1.0MB

        • memory/1020-854-0x00000000052A0000-0x00000000052DE000-memory.dmp
          Filesize

          248KB

        • memory/1020-941-0x0000000006740000-0x00000000067D2000-memory.dmp
          Filesize

          584KB

        • memory/1020-942-0x0000000006CE0000-0x00000000071DE000-memory.dmp
          Filesize

          5.0MB

        • memory/1020-946-0x00000000066A0000-0x00000000066BE000-memory.dmp
          Filesize

          120KB

        • memory/1020-947-0x0000000006AC0000-0x0000000006B10000-memory.dmp
          Filesize

          320KB

        • memory/1020-948-0x00000000071E0000-0x00000000073A2000-memory.dmp
          Filesize

          1.8MB

        • memory/1184-149-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-138-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-151-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-150-0x0000000000400000-0x0000000000657000-memory.dmp
          Filesize

          2.3MB

        • memory/1184-152-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-148-0x00000000007C0000-0x00000000007C9000-memory.dmp
          Filesize

          36KB

        • memory/1184-153-0x000000000099A000-0x00000000009A3000-memory.dmp
          Filesize

          36KB

        • memory/1184-154-0x0000000000400000-0x0000000000657000-memory.dmp
          Filesize

          2.3MB

        • memory/1184-117-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-129-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-118-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-128-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-127-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-131-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-146-0x000000000099A000-0x00000000009A3000-memory.dmp
          Filesize

          36KB

        • memory/1184-147-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-126-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-145-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-144-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-143-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-142-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-132-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-133-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-119-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-141-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-140-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-139-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-130-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-137-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-120-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-125-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-116-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-136-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-121-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-135-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-134-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-122-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-123-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-124-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1744-512-0x0000000000FE0000-0x0000000000FEC000-memory.dmp
          Filesize

          48KB

        • memory/1744-506-0x0000000000000000-mapping.dmp
        • memory/2180-509-0x0000000002C60000-0x0000000002DB0000-memory.dmp
          Filesize

          1.3MB

        • memory/2180-272-0x0000000002C60000-0x0000000002DB0000-memory.dmp
          Filesize

          1.3MB

        • memory/2180-488-0x0000000002870000-0x0000000002C57000-memory.dmp
          Filesize

          3.9MB

        • memory/2180-243-0x0000000000000000-mapping.dmp
        • memory/2180-270-0x0000000002870000-0x0000000002C57000-memory.dmp
          Filesize

          3.9MB

        • memory/2180-793-0x000000000DEC0000-0x000000000DFE9000-memory.dmp
          Filesize

          1.2MB

        • memory/2260-959-0x000000000041814E-mapping.dmp
        • memory/2260-994-0x0000000000400000-0x000000000041E000-memory.dmp
          Filesize

          120KB

        • memory/2260-1018-0x00000000032D0000-0x000000000331B000-memory.dmp
          Filesize

          300KB

        • memory/2264-460-0x00000000000D0000-0x00000000001AC000-memory.dmp
          Filesize

          880KB

        • memory/2264-423-0x0000000000000000-mapping.dmp
        • memory/2264-486-0x0000000004990000-0x0000000004A52000-memory.dmp
          Filesize

          776KB

        • memory/2264-863-0x0000000004D00000-0x0000000004DC2000-memory.dmp
          Filesize

          776KB

        • memory/2264-865-0x0000000004F90000-0x0000000004FDC000-memory.dmp
          Filesize

          304KB

        • memory/2636-882-0x0000000000000000-mapping.dmp
        • memory/3536-611-0x0000000000000000-mapping.dmp
        • memory/3536-762-0x00000000011C0000-0x000000000160D000-memory.dmp
          Filesize

          4.3MB

        • memory/3536-761-0x0000000010410000-0x0000000010422000-memory.dmp
          Filesize

          72KB

        • memory/3700-708-0x0000000009600000-0x0000000009C78000-memory.dmp
          Filesize

          6.5MB

        • memory/3700-709-0x0000000008B80000-0x0000000008B9A000-memory.dmp
          Filesize

          104KB

        • memory/3700-491-0x0000000000000000-mapping.dmp
        • memory/3700-622-0x00000000065E0000-0x0000000006616000-memory.dmp
          Filesize

          216KB

        • memory/3700-686-0x0000000007D70000-0x0000000007DE6000-memory.dmp
          Filesize

          472KB

        • memory/3700-682-0x0000000007FA0000-0x0000000007FEB000-memory.dmp
          Filesize

          300KB

        • memory/3700-681-0x0000000007680000-0x000000000769C000-memory.dmp
          Filesize

          112KB

        • memory/3700-676-0x00000000076B0000-0x0000000007A00000-memory.dmp
          Filesize

          3.3MB

        • memory/3700-673-0x00000000073B0000-0x0000000007416000-memory.dmp
          Filesize

          408KB

        • memory/3700-671-0x0000000007590000-0x00000000075F6000-memory.dmp
          Filesize

          408KB

        • memory/3700-661-0x0000000006BC0000-0x0000000006BE2000-memory.dmp
          Filesize

          136KB

        • memory/3700-632-0x0000000006D10000-0x0000000007338000-memory.dmp
          Filesize

          6.2MB

        • memory/3736-888-0x0000000000000000-mapping.dmp
        • memory/4060-179-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-175-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-155-0x0000000000000000-mapping.dmp
        • memory/4060-157-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-178-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-300-0x00000000011C0000-0x000000000160D000-memory.dmp
          Filesize

          4.3MB

        • memory/4060-180-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-181-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-182-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-183-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-184-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-185-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-186-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-159-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-187-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-177-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-176-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-172-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-174-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-173-0x00000000011C0000-0x000000000160D000-memory.dmp
          Filesize

          4.3MB

        • memory/4060-171-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-163-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-170-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-169-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-188-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-168-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-167-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-166-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-165-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-162-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-161-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-160-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4060-158-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/4072-476-0x0000000000000000-mapping.dmp
        • memory/4072-659-0x00000000030E0000-0x000000000314B000-memory.dmp
          Filesize

          428KB

        • memory/4072-631-0x0000000003150000-0x00000000031C4000-memory.dmp
          Filesize

          464KB