Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows10_x64
  • resource
    win10-20220414-en
  • submitted
    17-06-2022 04:31

General

  • Target

    d5fde03fa631677cc1f5b2863ce80206a1f319095a0a38c4cbbaa778858167f0.exe

  • Size

    244KB

  • MD5

    16d5d1a9fbdead0107d1f620f02e1eb1

  • SHA1

    f5adf4603e5ad34cb3c0e7f1ec99f8caf508b5c3

  • SHA256

    d5fde03fa631677cc1f5b2863ce80206a1f319095a0a38c4cbbaa778858167f0

  • SHA512

    99b373b81e6fe0e4cc3d39c1f4c54356afcc50daacd447767b966d7a9fe969c481f261e66914e7a783176f23775d2ed2c14054f5b851568d9fb62b00da0e121e

Malware Config

Extracted

Family

vidar

Version

52.6

Botnet

1415

C2

https://t.me/tg_dailylessons

https://busshi.moe/@olegf9844xx

Attributes
  • profile_id

    1415

Extracted

Family

recordbreaker

C2

http://138.197.179.146/

Extracted

Family

redline

Botnet

mario

C2

193.106.191.129:80

Attributes
  • auth_value

    8fb912f79eac650a3e3f25f46f070f5d

Extracted

Family

redline

Botnet

USAeuTEST

C2

193.106.191.246:23196

Attributes
  • auth_value

    7dbf5ba6d421c1b0e8ce8d5867af4537

Signatures

  • RecordBreaker

    RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

    suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

  • suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

    suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Vidar Stealer 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 7 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5fde03fa631677cc1f5b2863ce80206a1f319095a0a38c4cbbaa778858167f0.exe
    "C:\Users\Admin\AppData\Local\Temp\d5fde03fa631677cc1f5b2863ce80206a1f319095a0a38c4cbbaa778858167f0.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1184
  • C:\Users\Admin\AppData\Local\Temp\34FA.exe
    C:\Users\Admin\AppData\Local\Temp\34FA.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:3764
    • C:\Users\Admin\AppData\Local\Temp\34FA.exe
      C:\Users\Admin\AppData\Local\Temp\34FA.exe
      2⤵
      • Executes dropped EXE
      PID:1748
  • C:\Users\Admin\AppData\Local\Temp\49FA.exe
    C:\Users\Admin\AppData\Local\Temp\49FA.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
        PID:3928
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1596
    • C:\Users\Admin\AppData\Local\Temp\5FD5.exe
      C:\Users\Admin\AppData\Local\Temp\5FD5.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks processor information in registry
      PID:3932
    • C:\Users\Admin\AppData\Local\Temp\78DC.exe
      C:\Users\Admin\AppData\Local\Temp\78DC.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2200
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell" Start-Sleep -Seconds 10;Start-Sleep -Seconds 10;
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2740
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout 15
        2⤵
          PID:3764
          • C:\Windows\SysWOW64\timeout.exe
            timeout 15
            3⤵
            • Delays execution with timeout.exe
            PID:1480
        • C:\Users\Admin\AppData\Local\Temp\78DC.exe
          C:\Users\Admin\AppData\Local\Temp\78DC.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3548
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        1⤵
        • Accesses Microsoft Outlook profiles
        • outlook_office_path
        • outlook_win_path
        PID:4072
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe
        1⤵
          PID:1352

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Defense Evasion

        Virtualization/Sandbox Evasion

        1
        T1497

        Credential Access

        Credentials in Files

        4
        T1081

        Discovery

        Query Registry

        5
        T1012

        Virtualization/Sandbox Evasion

        1
        T1497

        System Information Discovery

        5
        T1082

        Peripheral Device Discovery

        1
        T1120

        Collection

        Data from Local System

        4
        T1005

        Email Collection

        1
        T1114

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
          Filesize

          4KB

          MD5

          f7dcb24540769805e5bb30d193944dce

          SHA1

          e26c583c562293356794937d9e2e6155d15449ee

          SHA256

          6b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea

          SHA512

          cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
          Filesize

          340B

          MD5

          1c89a2458e4fba5c0d0123c9a67f4ccb

          SHA1

          d6a6b1f74b656304325ed7f27e3fa4d121659a1f

          SHA256

          25d534870bcef2555158a313abade2bf77922ac9c506ea2331604aa28ceb0354

          SHA512

          5211c46c577622a5896d1c4377de29134ab8b3b91bc9d7411dd0be3f84ebddaa0a208bdae7693da8779d13707d916d1542c00bf35408c548e522d905e0f4b534

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\78DC.exe.log
          Filesize

          710B

          MD5

          0f7e8ddf64c503df6ef2a2e21db58272

          SHA1

          f5ee233b786f93605cdd9f91ac4a68d8d9334bf9

          SHA256

          7102e134d51a9dbad02c448087baaaa3336c5571626177158c967f788d1a2e14

          SHA512

          79821afbf2d9a5104a810e3fcead177cda6934029b08691563b882616a2564e015cc662e376787aba29833e89602d4de0143bcefa4c097551a0604cc47b60455

        • C:\Users\Admin\AppData\Local\Temp\34FA.exe
          Filesize

          1.7MB

          MD5

          254b148abafdf19e098ecb77a9c86b80

          SHA1

          42d2b71d4dc7159301bc190e053c333dd174e402

          SHA256

          f791af4bc67aaffc24fc3a0f87222b3c62995b9b25476626952551b2f9c797ed

          SHA512

          973e73a9fedc5bb000c44d9ac9f6aba10273c240c1a16551701f5e62fe886f693cd099dbcb6ee4ca37a58fdecdf3e87b5aeebb880833589257da4f4835bb54b6

        • C:\Users\Admin\AppData\Local\Temp\34FA.exe
          Filesize

          1.7MB

          MD5

          254b148abafdf19e098ecb77a9c86b80

          SHA1

          42d2b71d4dc7159301bc190e053c333dd174e402

          SHA256

          f791af4bc67aaffc24fc3a0f87222b3c62995b9b25476626952551b2f9c797ed

          SHA512

          973e73a9fedc5bb000c44d9ac9f6aba10273c240c1a16551701f5e62fe886f693cd099dbcb6ee4ca37a58fdecdf3e87b5aeebb880833589257da4f4835bb54b6

        • C:\Users\Admin\AppData\Local\Temp\34FA.exe
          Filesize

          1.7MB

          MD5

          254b148abafdf19e098ecb77a9c86b80

          SHA1

          42d2b71d4dc7159301bc190e053c333dd174e402

          SHA256

          f791af4bc67aaffc24fc3a0f87222b3c62995b9b25476626952551b2f9c797ed

          SHA512

          973e73a9fedc5bb000c44d9ac9f6aba10273c240c1a16551701f5e62fe886f693cd099dbcb6ee4ca37a58fdecdf3e87b5aeebb880833589257da4f4835bb54b6

        • C:\Users\Admin\AppData\Local\Temp\49FA.exe
          Filesize

          1.6MB

          MD5

          afbc8407b66c37a33db9db0a783eef9b

          SHA1

          8cc0e05627ca730f5f530c8e84500e9ae7963284

          SHA256

          92e544135488b31959ac03b31fda224e79d68c54f6bff68c910800a4483fad64

          SHA512

          4a7b9b6ef506b36a2efea114667a1691b47e234406f45921e5fecc00fb8ddc73a3993019819a38266b244ddf3c62dc938f82cebbac31ebbc438bca2524be7cb9

        • C:\Users\Admin\AppData\Local\Temp\49FA.exe
          Filesize

          1.6MB

          MD5

          afbc8407b66c37a33db9db0a783eef9b

          SHA1

          8cc0e05627ca730f5f530c8e84500e9ae7963284

          SHA256

          92e544135488b31959ac03b31fda224e79d68c54f6bff68c910800a4483fad64

          SHA512

          4a7b9b6ef506b36a2efea114667a1691b47e234406f45921e5fecc00fb8ddc73a3993019819a38266b244ddf3c62dc938f82cebbac31ebbc438bca2524be7cb9

        • C:\Users\Admin\AppData\Local\Temp\5FD5.exe
          Filesize

          398KB

          MD5

          b11d457d1e93984c08100d700aa8aa3f

          SHA1

          14af67d58e1b88fad577e78713c16c466482aad8

          SHA256

          1f6c22291f1156fc884dbea51aca8f29f58e5106e48d30112f37a11e7dfb1d71

          SHA512

          4c827a1cdb03cd33997768196f91eb50bccb661d0fa32f529313fdffd90e6c38a236c6cea3a86fc165dcf5ed0b2b8493dc69a5018fd8c81b1e9f4fed45992291

        • C:\Users\Admin\AppData\Local\Temp\5FD5.exe
          Filesize

          398KB

          MD5

          b11d457d1e93984c08100d700aa8aa3f

          SHA1

          14af67d58e1b88fad577e78713c16c466482aad8

          SHA256

          1f6c22291f1156fc884dbea51aca8f29f58e5106e48d30112f37a11e7dfb1d71

          SHA512

          4c827a1cdb03cd33997768196f91eb50bccb661d0fa32f529313fdffd90e6c38a236c6cea3a86fc165dcf5ed0b2b8493dc69a5018fd8c81b1e9f4fed45992291

        • C:\Users\Admin\AppData\Local\Temp\78DC.exe
          Filesize

          857KB

          MD5

          e05e8f5d45e55c5d238f3b112b077ca1

          SHA1

          466203c2d920723eaa3cca76939ad37fd42320b5

          SHA256

          60d613e0e98945c023b210635a37142933823d9a06c16ab55676ea6051a93c30

          SHA512

          abdfeb3b886dd424029a129b36cf76826f795e37496dc215b6eb451b7837c9bd03641757f9784f151a31b50d35b8e656e4de3b362eb097f0882a58e8ea27b980

        • C:\Users\Admin\AppData\Local\Temp\78DC.exe
          Filesize

          857KB

          MD5

          e05e8f5d45e55c5d238f3b112b077ca1

          SHA1

          466203c2d920723eaa3cca76939ad37fd42320b5

          SHA256

          60d613e0e98945c023b210635a37142933823d9a06c16ab55676ea6051a93c30

          SHA512

          abdfeb3b886dd424029a129b36cf76826f795e37496dc215b6eb451b7837c9bd03641757f9784f151a31b50d35b8e656e4de3b362eb097f0882a58e8ea27b980

        • C:\Users\Admin\AppData\Local\Temp\78DC.exe
          Filesize

          857KB

          MD5

          e05e8f5d45e55c5d238f3b112b077ca1

          SHA1

          466203c2d920723eaa3cca76939ad37fd42320b5

          SHA256

          60d613e0e98945c023b210635a37142933823d9a06c16ab55676ea6051a93c30

          SHA512

          abdfeb3b886dd424029a129b36cf76826f795e37496dc215b6eb451b7837c9bd03641757f9784f151a31b50d35b8e656e4de3b362eb097f0882a58e8ea27b980

        • \ProgramData\mozglue.dll
          Filesize

          133KB

          MD5

          8f73c08a9660691143661bf7332c3c27

          SHA1

          37fa65dd737c50fda710fdbde89e51374d0c204a

          SHA256

          3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

          SHA512

          0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

        • \ProgramData\nss3.dll
          Filesize

          1.2MB

          MD5

          bfac4e3c5908856ba17d41edcd455a51

          SHA1

          8eec7e888767aa9e4cca8ff246eb2aacb9170428

          SHA256

          e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

          SHA512

          2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

        • memory/1184-136-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-153-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-133-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-134-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-135-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-131-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-137-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-140-0x0000000000660000-0x000000000070E000-memory.dmp
          Filesize

          696KB

        • memory/1184-139-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-141-0x00000000007F0000-0x00000000007F9000-memory.dmp
          Filesize

          36KB

        • memory/1184-142-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-143-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-144-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-145-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-146-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-147-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-148-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-149-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-150-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-152-0x0000000000400000-0x0000000000659000-memory.dmp
          Filesize

          2.3MB

        • memory/1184-151-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-116-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-154-0x0000000000400000-0x0000000000659000-memory.dmp
          Filesize

          2.3MB

        • memory/1184-155-0x00000000007F0000-0x00000000007F9000-memory.dmp
          Filesize

          36KB

        • memory/1184-130-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-129-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-128-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-117-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-118-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-119-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-120-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-121-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-132-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-126-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-122-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-123-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-127-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-124-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1184-125-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/1352-499-0x0000000000000000-mapping.dmp
        • memory/1352-510-0x0000000001040000-0x0000000001047000-memory.dmp
          Filesize

          28KB

        • memory/1352-514-0x0000000001030000-0x000000000103C000-memory.dmp
          Filesize

          48KB

        • memory/1480-892-0x0000000000000000-mapping.dmp
        • memory/1596-945-0x0000000006C80000-0x000000000717E000-memory.dmp
          Filesize

          5.0MB

        • memory/1596-858-0x00000000054A0000-0x00000000054DE000-memory.dmp
          Filesize

          248KB

        • memory/1596-954-0x0000000008800000-0x0000000008D2C000-memory.dmp
          Filesize

          5.2MB

        • memory/1596-953-0x0000000008100000-0x00000000082C2000-memory.dmp
          Filesize

          1.8MB

        • memory/1596-952-0x0000000006C00000-0x0000000006C50000-memory.dmp
          Filesize

          320KB

        • memory/1596-950-0x00000000068E0000-0x00000000068FE000-memory.dmp
          Filesize

          120KB

        • memory/1596-946-0x0000000006980000-0x0000000006A12000-memory.dmp
          Filesize

          584KB

        • memory/1596-832-0x0000000000400000-0x0000000000420000-memory.dmp
          Filesize

          128KB

        • memory/1596-853-0x00000000059A0000-0x0000000005FA6000-memory.dmp
          Filesize

          6.0MB

        • memory/1596-854-0x0000000005440000-0x0000000005452000-memory.dmp
          Filesize

          72KB

        • memory/1596-855-0x0000000005570000-0x000000000567A000-memory.dmp
          Filesize

          1.0MB

        • memory/1748-561-0x0000000000000000-mapping.dmp
        • memory/1748-765-0x0000000010410000-0x0000000010422000-memory.dmp
          Filesize

          72KB

        • memory/1748-766-0x00000000001E0000-0x000000000062D000-memory.dmp
          Filesize

          4.3MB

        • memory/2176-439-0x00000000029F0000-0x0000000002DD8000-memory.dmp
          Filesize

          3.9MB

        • memory/2176-244-0x0000000000000000-mapping.dmp
        • memory/2176-797-0x000000000C890000-0x000000000C9B9000-memory.dmp
          Filesize

          1.2MB

        • memory/2176-491-0x00000000010C0000-0x0000000001214000-memory.dmp
          Filesize

          1.3MB

        • memory/2176-271-0x00000000029F0000-0x0000000002DD8000-memory.dmp
          Filesize

          3.9MB

        • memory/2176-273-0x00000000010C0000-0x0000000001214000-memory.dmp
          Filesize

          1.3MB

        • memory/2200-869-0x0000000004D50000-0x0000000004D9C000-memory.dmp
          Filesize

          304KB

        • memory/2200-529-0x0000000000110000-0x00000000001EC000-memory.dmp
          Filesize

          880KB

        • memory/2200-567-0x0000000004A10000-0x0000000004AD2000-memory.dmp
          Filesize

          776KB

        • memory/2200-867-0x0000000004B70000-0x0000000004C32000-memory.dmp
          Filesize

          776KB

        • memory/2200-428-0x0000000000000000-mapping.dmp
        • memory/2740-635-0x0000000004810000-0x0000000004846000-memory.dmp
          Filesize

          216KB

        • memory/2740-679-0x0000000007CE0000-0x0000000008030000-memory.dmp
          Filesize

          3.3MB

        • memory/2740-648-0x0000000007470000-0x0000000007A98000-memory.dmp
          Filesize

          6.2MB

        • memory/2740-670-0x0000000007120000-0x0000000007142000-memory.dmp
          Filesize

          136KB

        • memory/2740-676-0x00000000072C0000-0x0000000007326000-memory.dmp
          Filesize

          408KB

        • memory/2740-722-0x00000000090C0000-0x00000000090DA000-memory.dmp
          Filesize

          104KB

        • memory/2740-721-0x0000000009B50000-0x000000000A1C8000-memory.dmp
          Filesize

          6.5MB

        • memory/2740-691-0x0000000008310000-0x0000000008386000-memory.dmp
          Filesize

          472KB

        • memory/2740-687-0x0000000008030000-0x000000000807B000-memory.dmp
          Filesize

          300KB

        • memory/2740-686-0x0000000007B80000-0x0000000007B9C000-memory.dmp
          Filesize

          112KB

        • memory/2740-571-0x0000000000000000-mapping.dmp
        • memory/2740-677-0x0000000007330000-0x0000000007396000-memory.dmp
          Filesize

          408KB

        • memory/3548-963-0x000000000041814E-mapping.dmp
        • memory/3548-998-0x0000000000400000-0x000000000041E000-memory.dmp
          Filesize

          120KB

        • memory/3548-1022-0x0000000003330000-0x000000000337B000-memory.dmp
          Filesize

          300KB

        • memory/3764-180-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-175-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-179-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-156-0x0000000000000000-mapping.dmp
        • memory/3764-158-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-159-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-160-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-178-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-177-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-161-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-183-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-182-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-185-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-184-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-162-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-186-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-187-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-188-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-189-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-274-0x00000000001E0000-0x000000000062D000-memory.dmp
          Filesize

          4.3MB

        • memory/3764-747-0x00000000001E0000-0x000000000062D000-memory.dmp
          Filesize

          4.3MB

        • memory/3764-181-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-176-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-174-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-173-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-172-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-171-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-169-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-170-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-168-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-167-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-886-0x0000000000000000-mapping.dmp
        • memory/3764-165-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3764-163-0x00000000001E0000-0x000000000062D000-memory.dmp
          Filesize

          4.3MB

        • memory/3764-164-0x0000000077E40000-0x0000000077FCE000-memory.dmp
          Filesize

          1.6MB

        • memory/3932-573-0x0000000000400000-0x0000000000B56000-memory.dmp
          Filesize

          7.3MB

        • memory/3932-275-0x0000000000000000-mapping.dmp
        • memory/3932-304-0x0000000000400000-0x0000000000B56000-memory.dmp
          Filesize

          7.3MB

        • memory/3932-569-0x0000000000F46000-0x0000000000F73000-memory.dmp
          Filesize

          180KB

        • memory/3932-302-0x0000000000F46000-0x0000000000F73000-memory.dmp
          Filesize

          180KB

        • memory/3932-303-0x0000000000E90000-0x0000000000EDB000-memory.dmp
          Filesize

          300KB

        • memory/4072-471-0x0000000000000000-mapping.dmp
        • memory/4072-643-0x0000000000CB0000-0x0000000000D1B000-memory.dmp
          Filesize

          428KB

        • memory/4072-606-0x0000000000D20000-0x0000000000D94000-memory.dmp
          Filesize

          464KB