Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220414-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-07-2022 22:56

General

  • Target

    2218554f8a68852689a385cb97d5dfd9.exe

  • Size

    287KB

  • MD5

    2218554f8a68852689a385cb97d5dfd9

  • SHA1

    93506fcf94c46362219849a6208da0f174518b65

  • SHA256

    982bf31d61369c3223cfb3385f45e2af5da41d360e24bcc9d0d302a818e73454

  • SHA512

    d0f907842eb9491e709c937337c0360f4b86d2d96eddc634bbf823edc9ee06d2c814e5574c13e8e7e33be3d4a3644df19e309037a45fddbef66b474cab31a9a8

Malware Config

Extracted

Family

vidar

Version

53.2

Botnet

1415

C2

https://t.me/tgch_hijuly

https://c.im/@olegf9844h

Attributes
  • profile_id

    1415

Signatures

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

    suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

  • Vidar Stealer 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2218554f8a68852689a385cb97d5dfd9.exe
    "C:\Users\Admin\AppData\Local\Temp\2218554f8a68852689a385cb97d5dfd9.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1220
  • C:\Users\Admin\AppData\Local\Temp\3A69.exe
    C:\Users\Admin\AppData\Local\Temp\3A69.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3684
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
      • Loads dropped DLL
      PID:3964
  • C:\Users\Admin\AppData\Local\Temp\539F.exe
    C:\Users\Admin\AppData\Local\Temp\539F.exe
    1⤵
    • Executes dropped EXE
    • Checks computer location settings
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:3244
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c taskkill /im 539F.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\539F.exe" & del C:\ProgramData\*.dll & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2412
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im 539F.exe /f
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4668
      • C:\Windows\SysWOW64\timeout.exe
        timeout /t 6
        3⤵
        • Delays execution with timeout.exe
        PID:1264
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3244 -s 2108
      2⤵
      • Program crash
      PID:3816
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\A5B8.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4360
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\A5B8.dll
      2⤵
      • Loads dropped DLL
      PID:4928
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3244 -ip 3244
    1⤵
      PID:3820
    • C:\Users\Admin\AppData\Local\Temp\667.exe
      C:\Users\Admin\AppData\Local\Temp\667.exe
      1⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3804
      • C:\Users\Admin\AppData\Local\Temp\667.exe
        "C:\Users\Admin\AppData\Local\Temp\667.exe" H
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4572
    • C:\Users\Admin\AppData\Local\Temp\18B7.exe
      C:\Users\Admin\AppData\Local\Temp\18B7.exe
      1⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:628
    • C:\Windows\system32\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global
      1⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:748
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global
        2⤵
        • Loads dropped DLL
        PID:4116
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 600
          3⤵
          • Program crash
          PID:3312
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4116 -ip 4116
      1⤵
        PID:3016
      • C:\Users\Admin\AppData\Local\Temp\28E5.exe
        C:\Users\Admin\AppData\Local\Temp\28E5.exe
        1⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2912
        • C:\Users\Admin\AppData\Local\Temp\28E5.exe
          "C:\Users\Admin\AppData\Local\Temp\28E5.exe" H
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:5028
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        1⤵
          PID:1372
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 872
            2⤵
            • Program crash
            PID:2404
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1372 -ip 1372
          1⤵
            PID:1536
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            1⤵
              PID:3236
            • C:\Windows\system32\rundll32.exe
              rundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global
              1⤵
              • Process spawned unexpected child process
              • Suspicious use of WriteProcessMemory
              PID:4296
              • C:\Windows\SysWOW64\rundll32.exe
                rundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global
                2⤵
                • Loads dropped DLL
                PID:2148
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 600
                  3⤵
                  • Program crash
                  PID:2356
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2148 -ip 2148
              1⤵
                PID:1072

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Credential Access

              Credentials in Files

              3
              T1081

              Discovery

              Query Registry

              4
              T1012

              System Information Discovery

              4
              T1082

              Peripheral Device Discovery

              1
              T1120

              Collection

              Data from Local System

              3
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\LocalLow\mozglue.dll
                Filesize

                612KB

                MD5

                f07d9977430e762b563eaadc2b94bbfa

                SHA1

                da0a05b2b8d269fb73558dfcf0ed5c167f6d3877

                SHA256

                4191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862

                SHA512

                6afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf

              • C:\Users\Admin\AppData\LocalLow\nss3.dll
                Filesize

                1.9MB

                MD5

                f67d08e8c02574cbc2f1122c53bfb976

                SHA1

                6522992957e7e4d074947cad63189f308a80fcf2

                SHA256

                c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e

                SHA512

                2e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5

              • C:\Users\Admin\AppData\LocalLow\sqlite3.dll
                Filesize

                1.0MB

                MD5

                dbf4f8dcefb8056dc6bae4b67ff810ce

                SHA1

                bbac1dd8a07c6069415c04b62747d794736d0689

                SHA256

                47b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68

                SHA512

                b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1

              • C:\Users\Admin\AppData\Local\Temp\18B7.exe
                Filesize

                288KB

                MD5

                c01447a30dcdc9f0813337a45e6f0ef9

                SHA1

                d40c072f6778fa5f14754663b1b3d701ba338d49

                SHA256

                2637e45828936c755b5fe9bd40dc8b389f0bcad81b1ca1cc361245d6b7c73080

                SHA512

                40dd3a6bb8d3a17ee3d2851726744903d11c9f17c972fe3f092b405bb7b85000baa5c0fdf97bf0d5005195ad3edb1454c29de74abd6321355f9eafdfd10ba31a

              • C:\Users\Admin\AppData\Local\Temp\18B7.exe
                Filesize

                288KB

                MD5

                c01447a30dcdc9f0813337a45e6f0ef9

                SHA1

                d40c072f6778fa5f14754663b1b3d701ba338d49

                SHA256

                2637e45828936c755b5fe9bd40dc8b389f0bcad81b1ca1cc361245d6b7c73080

                SHA512

                40dd3a6bb8d3a17ee3d2851726744903d11c9f17c972fe3f092b405bb7b85000baa5c0fdf97bf0d5005195ad3edb1454c29de74abd6321355f9eafdfd10ba31a

              • C:\Users\Admin\AppData\Local\Temp\28E5.exe
                Filesize

                220KB

                MD5

                c7f746348c737cb6a768cdbd83217b9d

                SHA1

                8000144cef12e27f52415830b3e5290d972ee795

                SHA256

                b4c6e4afb0f17c15a882096ad8459e8b26141beb127475ff5216fdbb2e9d24c9

                SHA512

                dd9d0e1425980d8afe8e18e54672a1cbb016c43655dd3baf531bfeb24c7d88d7d4869d0df3c26d3c64a9dc1d37bffaa64ace19dfba39420cbb992b63152b044e

              • C:\Users\Admin\AppData\Local\Temp\28E5.exe
                Filesize

                220KB

                MD5

                c7f746348c737cb6a768cdbd83217b9d

                SHA1

                8000144cef12e27f52415830b3e5290d972ee795

                SHA256

                b4c6e4afb0f17c15a882096ad8459e8b26141beb127475ff5216fdbb2e9d24c9

                SHA512

                dd9d0e1425980d8afe8e18e54672a1cbb016c43655dd3baf531bfeb24c7d88d7d4869d0df3c26d3c64a9dc1d37bffaa64ace19dfba39420cbb992b63152b044e

              • C:\Users\Admin\AppData\Local\Temp\28E5.exe
                Filesize

                220KB

                MD5

                c7f746348c737cb6a768cdbd83217b9d

                SHA1

                8000144cef12e27f52415830b3e5290d972ee795

                SHA256

                b4c6e4afb0f17c15a882096ad8459e8b26141beb127475ff5216fdbb2e9d24c9

                SHA512

                dd9d0e1425980d8afe8e18e54672a1cbb016c43655dd3baf531bfeb24c7d88d7d4869d0df3c26d3c64a9dc1d37bffaa64ace19dfba39420cbb992b63152b044e

              • C:\Users\Admin\AppData\Local\Temp\3A69.exe
                Filesize

                1.5MB

                MD5

                f329728b04e9d98d64a0892216e033f4

                SHA1

                6585ac4780bd200793b0ce5959302c12302b3ad8

                SHA256

                e559e03d2fabc5545ffbc70c83ac0353638cbd3a598a0bfc2994d4224624416a

                SHA512

                2f9b827e6340373838d91c047e89f3d4b618b5557d3bc19574c90d969b3cdfb50af5102de296774b00dfcfececeb8076ab687434be06baa340b8d10cbfaf7a4f

              • C:\Users\Admin\AppData\Local\Temp\3A69.exe
                Filesize

                1.5MB

                MD5

                f329728b04e9d98d64a0892216e033f4

                SHA1

                6585ac4780bd200793b0ce5959302c12302b3ad8

                SHA256

                e559e03d2fabc5545ffbc70c83ac0353638cbd3a598a0bfc2994d4224624416a

                SHA512

                2f9b827e6340373838d91c047e89f3d4b618b5557d3bc19574c90d969b3cdfb50af5102de296774b00dfcfececeb8076ab687434be06baa340b8d10cbfaf7a4f

              • C:\Users\Admin\AppData\Local\Temp\539F.exe
                Filesize

                396KB

                MD5

                f282dcf8da023c44cdadb647227e673c

                SHA1

                a2c8a21705daf52ee76d70d2ea5a2b435a927017

                SHA256

                39af01bc15ad26c998f51cd6b17c555c286806bd2a2fb8b0b7b109d6db343c7c

                SHA512

                ccf25e2182a0dbf9bc6a12dad1125b5adaf754eb9cf6f55baeedf0ae419ee1dabafa9bc318faf79b1dc087bd4e3aa58b9cbd901df49897eafe4eb0febf40d0a2

              • C:\Users\Admin\AppData\Local\Temp\539F.exe
                Filesize

                396KB

                MD5

                f282dcf8da023c44cdadb647227e673c

                SHA1

                a2c8a21705daf52ee76d70d2ea5a2b435a927017

                SHA256

                39af01bc15ad26c998f51cd6b17c555c286806bd2a2fb8b0b7b109d6db343c7c

                SHA512

                ccf25e2182a0dbf9bc6a12dad1125b5adaf754eb9cf6f55baeedf0ae419ee1dabafa9bc318faf79b1dc087bd4e3aa58b9cbd901df49897eafe4eb0febf40d0a2

              • C:\Users\Admin\AppData\Local\Temp\667.exe
                Filesize

                220KB

                MD5

                c7f746348c737cb6a768cdbd83217b9d

                SHA1

                8000144cef12e27f52415830b3e5290d972ee795

                SHA256

                b4c6e4afb0f17c15a882096ad8459e8b26141beb127475ff5216fdbb2e9d24c9

                SHA512

                dd9d0e1425980d8afe8e18e54672a1cbb016c43655dd3baf531bfeb24c7d88d7d4869d0df3c26d3c64a9dc1d37bffaa64ace19dfba39420cbb992b63152b044e

              • C:\Users\Admin\AppData\Local\Temp\667.exe
                Filesize

                220KB

                MD5

                c7f746348c737cb6a768cdbd83217b9d

                SHA1

                8000144cef12e27f52415830b3e5290d972ee795

                SHA256

                b4c6e4afb0f17c15a882096ad8459e8b26141beb127475ff5216fdbb2e9d24c9

                SHA512

                dd9d0e1425980d8afe8e18e54672a1cbb016c43655dd3baf531bfeb24c7d88d7d4869d0df3c26d3c64a9dc1d37bffaa64ace19dfba39420cbb992b63152b044e

              • C:\Users\Admin\AppData\Local\Temp\667.exe
                Filesize

                220KB

                MD5

                c7f746348c737cb6a768cdbd83217b9d

                SHA1

                8000144cef12e27f52415830b3e5290d972ee795

                SHA256

                b4c6e4afb0f17c15a882096ad8459e8b26141beb127475ff5216fdbb2e9d24c9

                SHA512

                dd9d0e1425980d8afe8e18e54672a1cbb016c43655dd3baf531bfeb24c7d88d7d4869d0df3c26d3c64a9dc1d37bffaa64ace19dfba39420cbb992b63152b044e

              • C:\Users\Admin\AppData\Local\Temp\A5B8.dll
                Filesize

                2.1MB

                MD5

                e93b7568fd1aecad3e440117f5bb1e38

                SHA1

                2ff18b35f85c58e8b542a6b138381c1a734475a1

                SHA256

                1541e3f115612e60ffe55f51b41eba01bdb1bacabb63b0de1b4330afd4a8994f

                SHA512

                ab955464b0cecedd51b2fc57c7ed0563b1358c22a1a5e5391e28b606a2c465a3454f55302e91c1feea5f8bc96592e49539a342886599a9f320fc94e3011b3d21

              • C:\Users\Admin\AppData\Local\Temp\A5B8.dll
                Filesize

                2.1MB

                MD5

                e93b7568fd1aecad3e440117f5bb1e38

                SHA1

                2ff18b35f85c58e8b542a6b138381c1a734475a1

                SHA256

                1541e3f115612e60ffe55f51b41eba01bdb1bacabb63b0de1b4330afd4a8994f

                SHA512

                ab955464b0cecedd51b2fc57c7ed0563b1358c22a1a5e5391e28b606a2c465a3454f55302e91c1feea5f8bc96592e49539a342886599a9f320fc94e3011b3d21

              • C:\Users\Admin\AppData\Local\Temp\A5B8.dll
                Filesize

                2.1MB

                MD5

                e93b7568fd1aecad3e440117f5bb1e38

                SHA1

                2ff18b35f85c58e8b542a6b138381c1a734475a1

                SHA256

                1541e3f115612e60ffe55f51b41eba01bdb1bacabb63b0de1b4330afd4a8994f

                SHA512

                ab955464b0cecedd51b2fc57c7ed0563b1358c22a1a5e5391e28b606a2c465a3454f55302e91c1feea5f8bc96592e49539a342886599a9f320fc94e3011b3d21

              • C:\Users\Admin\AppData\Local\Temp\db.dat
                Filesize

                557KB

                MD5

                720ec3d97f3cd9e1dc34b7ad51451892

                SHA1

                8c417926a14a0cd2d268d088658022f49e3dda4b

                SHA256

                6c05e113ed295140f979f4a8864eac92e119e013e74e6ed3d849a66217e34c6a

                SHA512

                0d681247d1f7f5932779da58d59de2dd0e01e904acc8702bea93676f029b2dd0745b961f833d49ef4a6af712a3a3ba51364533741cd605d39442fe2993279dee

              • C:\Users\Admin\AppData\Local\Temp\db.dat
                Filesize

                557KB

                MD5

                720ec3d97f3cd9e1dc34b7ad51451892

                SHA1

                8c417926a14a0cd2d268d088658022f49e3dda4b

                SHA256

                6c05e113ed295140f979f4a8864eac92e119e013e74e6ed3d849a66217e34c6a

                SHA512

                0d681247d1f7f5932779da58d59de2dd0e01e904acc8702bea93676f029b2dd0745b961f833d49ef4a6af712a3a3ba51364533741cd605d39442fe2993279dee

              • C:\Users\Admin\AppData\Local\Temp\db.dll
                Filesize

                52KB

                MD5

                18bf5ab8773740f03ba1462c01153540

                SHA1

                872cc1f2ab2358c09735ed80289160ca28905371

                SHA256

                30a5c2aeacb50bfa1892f4c6851413adb6e5d93d0c99d5e631920aee4892db3a

                SHA512

                3828d905159fd01aedd63ffb5fd738dc6a7cb912dd982f1be03e3f3772cb45746e1e0d878f34e5f586b4e014a032ed98bb579a5fc4a39ead7497dce25be07701

              • C:\Users\Admin\AppData\Local\Temp\db.dll
                Filesize

                52KB

                MD5

                18bf5ab8773740f03ba1462c01153540

                SHA1

                872cc1f2ab2358c09735ed80289160ca28905371

                SHA256

                30a5c2aeacb50bfa1892f4c6851413adb6e5d93d0c99d5e631920aee4892db3a

                SHA512

                3828d905159fd01aedd63ffb5fd738dc6a7cb912dd982f1be03e3f3772cb45746e1e0d878f34e5f586b4e014a032ed98bb579a5fc4a39ead7497dce25be07701

              • C:\Users\Admin\AppData\Local\Temp\db.dll
                Filesize

                52KB

                MD5

                18bf5ab8773740f03ba1462c01153540

                SHA1

                872cc1f2ab2358c09735ed80289160ca28905371

                SHA256

                30a5c2aeacb50bfa1892f4c6851413adb6e5d93d0c99d5e631920aee4892db3a

                SHA512

                3828d905159fd01aedd63ffb5fd738dc6a7cb912dd982f1be03e3f3772cb45746e1e0d878f34e5f586b4e014a032ed98bb579a5fc4a39ead7497dce25be07701

              • C:\Users\Admin\AppData\Local\Temp\db.dll
                Filesize

                52KB

                MD5

                18bf5ab8773740f03ba1462c01153540

                SHA1

                872cc1f2ab2358c09735ed80289160ca28905371

                SHA256

                30a5c2aeacb50bfa1892f4c6851413adb6e5d93d0c99d5e631920aee4892db3a

                SHA512

                3828d905159fd01aedd63ffb5fd738dc6a7cb912dd982f1be03e3f3772cb45746e1e0d878f34e5f586b4e014a032ed98bb579a5fc4a39ead7497dce25be07701

              • memory/628-211-0x000000000049D000-0x00000000004AD000-memory.dmp
                Filesize

                64KB

              • memory/628-204-0x0000000000000000-mapping.dmp
              • memory/628-222-0x0000000000400000-0x000000000044E000-memory.dmp
                Filesize

                312KB

              • memory/628-212-0x00000000005C0000-0x00000000005C9000-memory.dmp
                Filesize

                36KB

              • memory/628-213-0x0000000000400000-0x000000000044E000-memory.dmp
                Filesize

                312KB

              • memory/1220-131-0x00000000005E0000-0x00000000005E9000-memory.dmp
                Filesize

                36KB

              • memory/1220-130-0x000000000061D000-0x000000000062E000-memory.dmp
                Filesize

                68KB

              • memory/1220-133-0x0000000000400000-0x000000000044E000-memory.dmp
                Filesize

                312KB

              • memory/1220-132-0x0000000000400000-0x000000000044E000-memory.dmp
                Filesize

                312KB

              • memory/1264-197-0x0000000000000000-mapping.dmp
              • memory/1372-220-0x0000000000A00000-0x0000000000A74000-memory.dmp
                Filesize

                464KB

              • memory/1372-219-0x0000000000000000-mapping.dmp
              • memory/1372-221-0x0000000000720000-0x000000000078B000-memory.dmp
                Filesize

                428KB

              • memory/1372-224-0x0000000000720000-0x000000000078B000-memory.dmp
                Filesize

                428KB

              • memory/2148-227-0x0000000000000000-mapping.dmp
              • memory/2412-195-0x0000000000000000-mapping.dmp
              • memory/2912-214-0x0000000000000000-mapping.dmp
              • memory/3236-223-0x0000000000000000-mapping.dmp
              • memory/3236-225-0x0000000000590000-0x000000000059C000-memory.dmp
                Filesize

                48KB

              • memory/3244-201-0x0000000000400000-0x0000000000469000-memory.dmp
                Filesize

                420KB

              • memory/3244-142-0x000000000067D000-0x00000000006A8000-memory.dmp
                Filesize

                172KB

              • memory/3244-176-0x0000000060900000-0x0000000060992000-memory.dmp
                Filesize

                584KB

              • memory/3244-148-0x0000000000400000-0x0000000000469000-memory.dmp
                Filesize

                420KB

              • memory/3244-144-0x0000000000400000-0x0000000000469000-memory.dmp
                Filesize

                420KB

              • memory/3244-143-0x00000000005E0000-0x000000000062A000-memory.dmp
                Filesize

                296KB

              • memory/3244-147-0x000000000067D000-0x00000000006A8000-memory.dmp
                Filesize

                172KB

              • memory/3244-139-0x0000000000000000-mapping.dmp
              • memory/3684-164-0x0000000002DEE000-0x0000000002F36000-memory.dmp
                Filesize

                1.3MB

              • memory/3684-134-0x0000000000000000-mapping.dmp
              • memory/3684-138-0x0000000002DEE000-0x0000000002F36000-memory.dmp
                Filesize

                1.3MB

              • memory/3684-157-0x0000000011B20000-0x0000000011BE4000-memory.dmp
                Filesize

                784KB

              • memory/3684-158-0x0000000011B20000-0x0000000011BE4000-memory.dmp
                Filesize

                784KB

              • memory/3684-145-0x00000000028A8000-0x0000000002DD3000-memory.dmp
                Filesize

                5.2MB

              • memory/3684-137-0x00000000028A8000-0x0000000002DD3000-memory.dmp
                Filesize

                5.2MB

              • memory/3684-146-0x0000000002DEE000-0x0000000002F36000-memory.dmp
                Filesize

                1.3MB

              • memory/3804-198-0x0000000000000000-mapping.dmp
              • memory/3964-166-0x0000000000400000-0x0000000000411000-memory.dmp
                Filesize

                68KB

              • memory/3964-230-0x0000000000400000-0x0000000000411000-memory.dmp
                Filesize

                68KB

              • memory/3964-175-0x0000000000400000-0x0000000000411000-memory.dmp
                Filesize

                68KB

              • memory/3964-165-0x0000000000400000-0x0000000000411000-memory.dmp
                Filesize

                68KB

              • memory/3964-162-0x0000000000400000-0x0000000000411000-memory.dmp
                Filesize

                68KB

              • memory/3964-160-0x0000000000400000-0x0000000000411000-memory.dmp
                Filesize

                68KB

              • memory/3964-159-0x0000000000000000-mapping.dmp
              • memory/4116-208-0x0000000000000000-mapping.dmp
              • memory/4360-149-0x0000000000000000-mapping.dmp
              • memory/4572-202-0x0000000000000000-mapping.dmp
              • memory/4668-196-0x0000000000000000-mapping.dmp
              • memory/4928-155-0x0000000002A40000-0x0000000002BC4000-memory.dmp
                Filesize

                1.5MB

              • memory/4928-174-0x0000000002C90000-0x0000000002D52000-memory.dmp
                Filesize

                776KB

              • memory/4928-168-0x0000000002E20000-0x0000000002EC7000-memory.dmp
                Filesize

                668KB

              • memory/4928-156-0x0000000002C90000-0x0000000002D52000-memory.dmp
                Filesize

                776KB

              • memory/4928-154-0x0000000002260000-0x000000000247A000-memory.dmp
                Filesize

                2.1MB

              • memory/4928-151-0x0000000000000000-mapping.dmp
              • memory/4928-167-0x0000000002D60000-0x0000000002E1C000-memory.dmp
                Filesize

                752KB

              • memory/5028-217-0x0000000000000000-mapping.dmp