Analysis

  • max time kernel
    135s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    18-05-2022 13:48

General

  • Target

    69db771b992adb89ed17465f8c448b1a44c5f99ef7e73fe1dae45982790cae5e.exe

  • Size

    319KB

  • MD5

    00abc3cdf40d724b3bbaf8cb2de12d95

  • SHA1

    529cfe8010a6541a0c7accd33ae02a5237f58301

  • SHA256

    69db771b992adb89ed17465f8c448b1a44c5f99ef7e73fe1dae45982790cae5e

  • SHA512

    414218603c46f6a8e0fe27dc8ec9c83979dd7be8ebc4c89cfd1d795dadaaf3466ef6d0ef953b3ce0d660dfa6b615b31e878ccd57c21aedb1b09f886e7dfb830e

Malware Config

Extracted

Family

amadey

Version

3.10

C2

199.188.204.245/f8dfksdj3/index.php

Extracted

Family

vidar

Version

52.2

Botnet

1376

C2

https://t.me/netflixaccsfree

https://mastodon.social/@ronxik12

Attributes
  • profile_id

    1376

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • suricata: ET MALWARE Amadey CnC Check-In

    suricata: ET MALWARE Amadey CnC Check-In

  • suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

    suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

    suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

  • suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

    suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

  • Vidar Stealer 2 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\69db771b992adb89ed17465f8c448b1a44c5f99ef7e73fe1dae45982790cae5e.exe
    "C:\Users\Admin\AppData\Local\Temp\69db771b992adb89ed17465f8c448b1a44c5f99ef7e73fe1dae45982790cae5e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1920
    • C:\Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe
      "C:\Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1232
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\70d66d8271\
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2036
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\70d66d8271\
          4⤵
            PID:380
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN orxds.exe /TR "C:\Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe" /F
          3⤵
          • Creates scheduled task(s)
          PID:1788
        • C:\Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe
          "C:\Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks processor information in registry
          • Modifies system certificate store
          PID:1472
        • C:\Users\Admin\AppData\Local\Temp\1000006001\mine3.exe
          "C:\Users\Admin\AppData\Local\Temp\1000006001\mine3.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1596
          • C:\Windows\system32\schtasks.exe
            "schtasks.exe" /create /tn TxMT8hHkO8fBB5FlBurdwljpn /tr "C:\ProgramData\4vFAHkNczECIXuLdvBZKuXofw\IFMb39aGmCsqJcthXwNQEToq7.exe" /st 16:02 /du 23:59 /sc daily /ri 1 /f
            4⤵
            • Creates scheduled task(s)
            PID:1388
          • C:\ProgramData\4vFAHkNczECIXuLdvBZKuXofw\IFMb39aGmCsqJcthXwNQEToq7.exe
            "C:\ProgramData\4vFAHkNczECIXuLdvBZKuXofw\IFMb39aGmCsqJcthXwNQEToq7.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1520
          • C:\Windows\system32\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp7521.tmp.bat""
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1380
            • C:\Windows\system32\timeout.exe
              timeout 6
              5⤵
              • Delays execution with timeout.exe
              PID:1684
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\95ae2649e6d72d\cred.dll, Main
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Accesses Microsoft Outlook profiles
          • outlook_win_path
          PID:1076
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {8E993B29-2FEB-4954-A5D5-32191950D067} S-1-5-21-2277218442-1199762539-2004043321-1000:AUVQQRRF\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1640
      • C:\Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe
        C:\Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe
        2⤵
        • Executes dropped EXE
        PID:1648
      • C:\Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe
        C:\Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe
        2⤵
        • Executes dropped EXE
        PID:1508

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Modify Registry

    2
    T1112

    Install Root Certificate

    1
    T1130

    Credential Access

    Credentials in Files

    4
    T1081

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    4
    T1005

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\4vFAHkNczECIXuLdvBZKuXofw\IFMb39aGmCsqJcthXwNQEToq7.exe
      Filesize

      186.8MB

      MD5

      ea475912a10155462a3709ce7c6e5c68

      SHA1

      38a53e6dde894c9e8d6aa9ff5f11445c7a8643e6

      SHA256

      84cfd1fb71cba99f07159366b591a00845acac6d16f76a16b63a0fc05c3a27a8

      SHA512

      4d970a67550f91db91475740eb0006593646e18d26cb807291bd1a98a9c97ff1d27b3773c6cc3feb7fdd1ac8e71322f56bebe7765784cbe7ec0b8e479a3a1a45

    • C:\ProgramData\4vFAHkNczECIXuLdvBZKuXofw\IFMb39aGmCsqJcthXwNQEToq7.exe
      Filesize

      235.8MB

      MD5

      a77a74dd8dca55231334d70fdc76683b

      SHA1

      4184b2da9ab52c26a1c099594d286199051df752

      SHA256

      c8b65aec18924ff6b9192a97b4a45fe7e6814e45b7e5300e55fc1ffd2f3a3d5d

      SHA512

      f26831a574e04575d7a25e60aafc58dfe276b23eae584e05add3f5612d0cd14e5c098eb65c4c21883a9035e9fee1dcdd54109245a7fe9dc8594e74f637202a27

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      60KB

      MD5

      b9f21d8db36e88831e5352bb82c438b3

      SHA1

      4a3c330954f9f65a2f5fd7e55800e46ce228a3e2

      SHA256

      998e0209690a48ed33b79af30fc13851e3e3416bed97e3679b6030c10cab361e

      SHA512

      d4a2ac7c14227fbaf8b532398fb69053f0a0d913273f6917027c8cadbba80113fdbec20c2a7eb31b7bb57c99f9fdeccf8576be5f39346d8b564fc72fb1699476

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      7bde20fe34a14da5db80242bce650157

      SHA1

      7536ca60c34a154a2945dad95d63ff414c8aab27

      SHA256

      55d2b62868bb2e7ae0a16aaaa7269f11e8926257332d5087ca0b61435a841cd7

      SHA512

      690cf8a89efa29d811f0c4f3544cd1a73a0336f07e1e4c35f6cc656fe129db97db54dd8d07b5d696888340481d4d0d3fb9a608ac24b3d85b6323dc5363399d38

    • C:\Users\Admin\AppData\Local\Temp\1000006001\mine3.exe
      Filesize

      809KB

      MD5

      ff72b295ded9889cee24320db368bcf1

      SHA1

      5d7991f8495d56088710dd558faba639ffd05292

      SHA256

      e54ccfd9a2ab15b4461eb38baec21eb828f7757ca3e67db3b7acb261be34adcd

      SHA512

      37ab209741e90c78565d170ab48d7ee83c8633e93e646a4c8f639c305c8b6528841668b6aa7797870612d24e11e1ff1aaae0f5622e9a2195957f9142e93a7b1b

    • C:\Users\Admin\AppData\Local\Temp\1000006001\mine3.exe
      Filesize

      809KB

      MD5

      ff72b295ded9889cee24320db368bcf1

      SHA1

      5d7991f8495d56088710dd558faba639ffd05292

      SHA256

      e54ccfd9a2ab15b4461eb38baec21eb828f7757ca3e67db3b7acb261be34adcd

      SHA512

      37ab209741e90c78565d170ab48d7ee83c8633e93e646a4c8f639c305c8b6528841668b6aa7797870612d24e11e1ff1aaae0f5622e9a2195957f9142e93a7b1b

    • C:\Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe
      Filesize

      319KB

      MD5

      00abc3cdf40d724b3bbaf8cb2de12d95

      SHA1

      529cfe8010a6541a0c7accd33ae02a5237f58301

      SHA256

      69db771b992adb89ed17465f8c448b1a44c5f99ef7e73fe1dae45982790cae5e

      SHA512

      414218603c46f6a8e0fe27dc8ec9c83979dd7be8ebc4c89cfd1d795dadaaf3466ef6d0ef953b3ce0d660dfa6b615b31e878ccd57c21aedb1b09f886e7dfb830e

    • C:\Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe
      Filesize

      319KB

      MD5

      00abc3cdf40d724b3bbaf8cb2de12d95

      SHA1

      529cfe8010a6541a0c7accd33ae02a5237f58301

      SHA256

      69db771b992adb89ed17465f8c448b1a44c5f99ef7e73fe1dae45982790cae5e

      SHA512

      414218603c46f6a8e0fe27dc8ec9c83979dd7be8ebc4c89cfd1d795dadaaf3466ef6d0ef953b3ce0d660dfa6b615b31e878ccd57c21aedb1b09f886e7dfb830e

    • C:\Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe
      Filesize

      319KB

      MD5

      00abc3cdf40d724b3bbaf8cb2de12d95

      SHA1

      529cfe8010a6541a0c7accd33ae02a5237f58301

      SHA256

      69db771b992adb89ed17465f8c448b1a44c5f99ef7e73fe1dae45982790cae5e

      SHA512

      414218603c46f6a8e0fe27dc8ec9c83979dd7be8ebc4c89cfd1d795dadaaf3466ef6d0ef953b3ce0d660dfa6b615b31e878ccd57c21aedb1b09f886e7dfb830e

    • C:\Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe
      Filesize

      319KB

      MD5

      00abc3cdf40d724b3bbaf8cb2de12d95

      SHA1

      529cfe8010a6541a0c7accd33ae02a5237f58301

      SHA256

      69db771b992adb89ed17465f8c448b1a44c5f99ef7e73fe1dae45982790cae5e

      SHA512

      414218603c46f6a8e0fe27dc8ec9c83979dd7be8ebc4c89cfd1d795dadaaf3466ef6d0ef953b3ce0d660dfa6b615b31e878ccd57c21aedb1b09f886e7dfb830e

    • C:\Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe
      Filesize

      319KB

      MD5

      00abc3cdf40d724b3bbaf8cb2de12d95

      SHA1

      529cfe8010a6541a0c7accd33ae02a5237f58301

      SHA256

      69db771b992adb89ed17465f8c448b1a44c5f99ef7e73fe1dae45982790cae5e

      SHA512

      414218603c46f6a8e0fe27dc8ec9c83979dd7be8ebc4c89cfd1d795dadaaf3466ef6d0ef953b3ce0d660dfa6b615b31e878ccd57c21aedb1b09f886e7dfb830e

    • C:\Users\Admin\AppData\Local\Temp\tmp7521.tmp.bat
      Filesize

      168B

      MD5

      fb6ab1c9f12966b79559a6f2ec7f4ec4

      SHA1

      7ef5d445b73dcad2ac292385ef6e16a13ccbc036

      SHA256

      1bcb73b3ecbe8c5b1660f08536762aaaa6991cbcc17b97fa8a4e8c0fe26a5319

      SHA512

      4f462f29a8abea88ae19ad2837ad8f46d4224956da65f898049e7d26b8e6f59011644805b1cb5c089fb772301c32d0f368db81b3923ec39633774f098e2889f0

    • C:\Users\Admin\AppData\Roaming\95ae2649e6d72d\cred.dll
      Filesize

      126KB

      MD5

      210d9d14509f0bc2c26c87ba5fef4108

      SHA1

      8f4443a8cdfe1ff2156c3a1abd3371e778a2806f

      SHA256

      993c8664fac2e9aefc6cd25b3b435d6358fccc98119faedadbd68679281c0b77

      SHA512

      68250b674fff40870d5102760b9064e3483850f91d64a2fe395bea0058559b79daa5ad867d7578fe875d7ead415801eb99b49718912799e69683df66036c8095

    • \ProgramData\4vFAHkNczECIXuLdvBZKuXofw\IFMb39aGmCsqJcthXwNQEToq7.exe
      Filesize

      183.7MB

      MD5

      fcc74d816dd5fc52fe85228cd77f3ac7

      SHA1

      d931d23e07b3ec83ef47ddaba64f4075f3649a3b

      SHA256

      6814eaf149853b657b4d783b5a96569939ba11b94d060ef80750c614de4c228f

      SHA512

      22d60c1fac761f1068adff6c212acd22d9d623de28a134bfbbf48293b4d76c2c77e8e6f47e967f205785589eff3145575a06c9a2e2f552e0f283c88c2fcf1ae0

    • \ProgramData\mozglue.dll
      Filesize

      133KB

      MD5

      8f73c08a9660691143661bf7332c3c27

      SHA1

      37fa65dd737c50fda710fdbde89e51374d0c204a

      SHA256

      3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

      SHA512

      0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

    • \ProgramData\nss3.dll
      Filesize

      1.2MB

      MD5

      bfac4e3c5908856ba17d41edcd455a51

      SHA1

      8eec7e888767aa9e4cca8ff246eb2aacb9170428

      SHA256

      e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

      SHA512

      2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

    • \Users\Admin\AppData\Local\Temp\1000006001\mine3.exe
      Filesize

      809KB

      MD5

      ff72b295ded9889cee24320db368bcf1

      SHA1

      5d7991f8495d56088710dd558faba639ffd05292

      SHA256

      e54ccfd9a2ab15b4461eb38baec21eb828f7757ca3e67db3b7acb261be34adcd

      SHA512

      37ab209741e90c78565d170ab48d7ee83c8633e93e646a4c8f639c305c8b6528841668b6aa7797870612d24e11e1ff1aaae0f5622e9a2195957f9142e93a7b1b

    • \Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe
      Filesize

      319KB

      MD5

      00abc3cdf40d724b3bbaf8cb2de12d95

      SHA1

      529cfe8010a6541a0c7accd33ae02a5237f58301

      SHA256

      69db771b992adb89ed17465f8c448b1a44c5f99ef7e73fe1dae45982790cae5e

      SHA512

      414218603c46f6a8e0fe27dc8ec9c83979dd7be8ebc4c89cfd1d795dadaaf3466ef6d0ef953b3ce0d660dfa6b615b31e878ccd57c21aedb1b09f886e7dfb830e

    • \Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe
      Filesize

      319KB

      MD5

      00abc3cdf40d724b3bbaf8cb2de12d95

      SHA1

      529cfe8010a6541a0c7accd33ae02a5237f58301

      SHA256

      69db771b992adb89ed17465f8c448b1a44c5f99ef7e73fe1dae45982790cae5e

      SHA512

      414218603c46f6a8e0fe27dc8ec9c83979dd7be8ebc4c89cfd1d795dadaaf3466ef6d0ef953b3ce0d660dfa6b615b31e878ccd57c21aedb1b09f886e7dfb830e

    • \Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe
      Filesize

      319KB

      MD5

      00abc3cdf40d724b3bbaf8cb2de12d95

      SHA1

      529cfe8010a6541a0c7accd33ae02a5237f58301

      SHA256

      69db771b992adb89ed17465f8c448b1a44c5f99ef7e73fe1dae45982790cae5e

      SHA512

      414218603c46f6a8e0fe27dc8ec9c83979dd7be8ebc4c89cfd1d795dadaaf3466ef6d0ef953b3ce0d660dfa6b615b31e878ccd57c21aedb1b09f886e7dfb830e

    • \Users\Admin\AppData\Roaming\95ae2649e6d72d\cred.dll
      Filesize

      126KB

      MD5

      210d9d14509f0bc2c26c87ba5fef4108

      SHA1

      8f4443a8cdfe1ff2156c3a1abd3371e778a2806f

      SHA256

      993c8664fac2e9aefc6cd25b3b435d6358fccc98119faedadbd68679281c0b77

      SHA512

      68250b674fff40870d5102760b9064e3483850f91d64a2fe395bea0058559b79daa5ad867d7578fe875d7ead415801eb99b49718912799e69683df66036c8095

    • \Users\Admin\AppData\Roaming\95ae2649e6d72d\cred.dll
      Filesize

      126KB

      MD5

      210d9d14509f0bc2c26c87ba5fef4108

      SHA1

      8f4443a8cdfe1ff2156c3a1abd3371e778a2806f

      SHA256

      993c8664fac2e9aefc6cd25b3b435d6358fccc98119faedadbd68679281c0b77

      SHA512

      68250b674fff40870d5102760b9064e3483850f91d64a2fe395bea0058559b79daa5ad867d7578fe875d7ead415801eb99b49718912799e69683df66036c8095

    • \Users\Admin\AppData\Roaming\95ae2649e6d72d\cred.dll
      Filesize

      126KB

      MD5

      210d9d14509f0bc2c26c87ba5fef4108

      SHA1

      8f4443a8cdfe1ff2156c3a1abd3371e778a2806f

      SHA256

      993c8664fac2e9aefc6cd25b3b435d6358fccc98119faedadbd68679281c0b77

      SHA512

      68250b674fff40870d5102760b9064e3483850f91d64a2fe395bea0058559b79daa5ad867d7578fe875d7ead415801eb99b49718912799e69683df66036c8095

    • \Users\Admin\AppData\Roaming\95ae2649e6d72d\cred.dll
      Filesize

      126KB

      MD5

      210d9d14509f0bc2c26c87ba5fef4108

      SHA1

      8f4443a8cdfe1ff2156c3a1abd3371e778a2806f

      SHA256

      993c8664fac2e9aefc6cd25b3b435d6358fccc98119faedadbd68679281c0b77

      SHA512

      68250b674fff40870d5102760b9064e3483850f91d64a2fe395bea0058559b79daa5ad867d7578fe875d7ead415801eb99b49718912799e69683df66036c8095

    • memory/380-65-0x0000000000000000-mapping.dmp
    • memory/1076-108-0x0000000000161000-0x000000000017B000-memory.dmp
      Filesize

      104KB

    • memory/1076-100-0x0000000000000000-mapping.dmp
    • memory/1232-67-0x0000000000400000-0x00000000004E6000-memory.dmp
      Filesize

      920KB

    • memory/1232-57-0x0000000000000000-mapping.dmp
    • memory/1232-66-0x00000000005FE000-0x000000000061C000-memory.dmp
      Filesize

      120KB

    • memory/1380-134-0x0000000000000000-mapping.dmp
    • memory/1388-95-0x0000000000000000-mapping.dmp
    • memory/1472-71-0x0000000000400000-0x00000000004B1000-memory.dmp
      Filesize

      708KB

    • memory/1472-73-0x0000000000400000-0x00000000004B1000-memory.dmp
      Filesize

      708KB

    • memory/1472-70-0x0000000000400000-0x00000000004B1000-memory.dmp
      Filesize

      708KB

    • memory/1472-75-0x0000000000400000-0x00000000004B1000-memory.dmp
      Filesize

      708KB

    • memory/1472-78-0x0000000000410640-mapping.dmp
    • memory/1472-77-0x0000000000400000-0x00000000004B1000-memory.dmp
      Filesize

      708KB

    • memory/1472-81-0x0000000000400000-0x00000000004B1000-memory.dmp
      Filesize

      708KB

    • memory/1472-82-0x0000000000400000-0x00000000004B1000-memory.dmp
      Filesize

      708KB

    • memory/1472-83-0x00000000006AA000-0x00000000006D7000-memory.dmp
      Filesize

      180KB

    • memory/1472-107-0x0000000060900000-0x0000000060992000-memory.dmp
      Filesize

      584KB

    • memory/1472-84-0x0000000000220000-0x000000000026E000-memory.dmp
      Filesize

      312KB

    • memory/1508-137-0x0000000000000000-mapping.dmp
    • memory/1508-144-0x0000000000400000-0x00000000004E6000-memory.dmp
      Filesize

      920KB

    • memory/1508-143-0x000000000065E000-0x000000000067C000-memory.dmp
      Filesize

      120KB

    • memory/1520-133-0x000000013FF40000-0x000000014000E000-memory.dmp
      Filesize

      824KB

    • memory/1520-139-0x000000001BAE0000-0x000000001BBAA000-memory.dmp
      Filesize

      808KB

    • memory/1520-145-0x0000000002316000-0x0000000002335000-memory.dmp
      Filesize

      124KB

    • memory/1520-146-0x0000000002335000-0x000000000233A000-memory.dmp
      Filesize

      20KB

    • memory/1520-130-0x0000000000000000-mapping.dmp
    • memory/1520-147-0x0000000002344000-0x000000000234D000-memory.dmp
      Filesize

      36KB

    • memory/1596-96-0x0000000000690000-0x0000000000710000-memory.dmp
      Filesize

      512KB

    • memory/1596-92-0x0000000000540000-0x0000000000546000-memory.dmp
      Filesize

      24KB

    • memory/1596-86-0x0000000000000000-mapping.dmp
    • memory/1596-91-0x000000001ACB0000-0x000000001AD86000-memory.dmp
      Filesize

      856KB

    • memory/1596-90-0x000000013FC40000-0x000000013FD0E000-memory.dmp
      Filesize

      824KB

    • memory/1648-93-0x0000000000000000-mapping.dmp
    • memory/1648-98-0x00000000005CE000-0x00000000005EC000-memory.dmp
      Filesize

      120KB

    • memory/1648-99-0x0000000000400000-0x00000000004E6000-memory.dmp
      Filesize

      920KB

    • memory/1684-136-0x0000000000000000-mapping.dmp
    • memory/1788-64-0x0000000000000000-mapping.dmp
    • memory/1920-59-0x00000000002AE000-0x00000000002CC000-memory.dmp
      Filesize

      120KB

    • memory/1920-60-0x0000000001C80000-0x0000000001CB8000-memory.dmp
      Filesize

      224KB

    • memory/1920-61-0x0000000000400000-0x00000000004E6000-memory.dmp
      Filesize

      920KB

    • memory/1920-54-0x0000000075F61000-0x0000000075F63000-memory.dmp
      Filesize

      8KB

    • memory/2036-63-0x0000000000000000-mapping.dmp