Analysis

  • max time kernel
    149s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    30-05-2022 20:36

General

  • Target

    08df48c8601f0c28b046a7cefb564d9628a5416c111488142ada2ee7bb398550.exe

  • Size

    4.3MB

  • MD5

    05d1f810e1e7d48d0d729ed811108d2f

  • SHA1

    96650bd1c28b0fe73dee7dc0c50885310bcf8c11

  • SHA256

    08df48c8601f0c28b046a7cefb564d9628a5416c111488142ada2ee7bb398550

  • SHA512

    d71609dd0ce443ed3a3b138ca5375775b62f0e42c3fe660de3ad2ad1607287edce2bf9f2627392882c9ea73b6eb1490d71730bbc86a8cf2f0f7600a8a6f923d7

Malware Config

Extracted

Family

vidar

Version

10.3

Botnet

231

C2

http://trasolevelqvines.com/

Attributes
  • profile_id

    231

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

    suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

  • Vidar Stealer 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08df48c8601f0c28b046a7cefb564d9628a5416c111488142ada2ee7bb398550.exe
    "C:\Users\Admin\AppData\Local\Temp\08df48c8601f0c28b046a7cefb564d9628a5416c111488142ada2ee7bb398550.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1472
    • C:\Program Files (x86)\LetsSee!\busshost.exe
      "C:\Program Files (x86)\LetsSee!\busshost.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:952
    • C:\Program Files (x86)\LetsSee!\YTLoader.exe
      "C:\Program Files (x86)\LetsSee!\YTLoader.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:1832
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1832 -s 1084
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1664
    • C:\Program Files (x86)\LetsSee!\conf.exe
      "C:\Program Files (x86)\LetsSee!\conf.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1880
      • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2016
        • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\\.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:840
          • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
            C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:812
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c SchTasks /create /SC MINUTE /TN 7ZipUnis /TR C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\volumfix.exe
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:908
              • C:\Windows\SysWOW64\schtasks.exe
                SchTasks /create /SC MINUTE /TN 7ZipUnis /TR C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\volumfix.exe
                7⤵
                • Creates scheduled task(s)
                PID:1856
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c SchTasks /create /SC HOURLY /TN FlashServis /TR C:\ProgramData\FlashSys\CurlMSI.exe
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:972
              • C:\Windows\SysWOW64\schtasks.exe
                SchTasks /create /SC HOURLY /TN FlashServis /TR C:\ProgramData\FlashSys\CurlMSI.exe
                7⤵
                • Creates scheduled task(s)
                PID:1324
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k ping -n 2 localhost < nul & del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:468
            • C:\Windows\SysWOW64\PING.EXE
              ping -n 2 localhost
              6⤵
              • Runs ping.exe
              PID:1552
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k ping -n 2 localhost < nul & del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:964
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 2 localhost
            5⤵
            • Runs ping.exe
            PID:1740
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k ping -n 2 localhost < nul & del /F /Q "C:\Program Files (x86)\LetsSee!\conf.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1120
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 2 localhost
          4⤵
          • Runs ping.exe
          PID:304
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {0F02BEFE-5839-4B3D-B14D-D28DD18C2745} S-1-5-21-790309383-526510583-3802439154-1000:TVHJCWMH\Admin:Interactive:[1]
    1⤵
      PID:1516

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Credential Access

    Credentials in Files

    4
    T1081

    Discovery

    Query Registry

    3
    T1012

    System Information Discovery

    3
    T1082

    Remote System Discovery

    1
    T1018

    Collection

    Data from Local System

    4
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\LetsSee!\YTLoader.exe
      Filesize

      3.0MB

      MD5

      adc9db2753fa3daa6a8156254ba2a5f1

      SHA1

      50ff27e2e1c4acc35768b93b73c03f7630027f04

      SHA256

      f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde

      SHA512

      5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

    • C:\Program Files (x86)\LetsSee!\YTLoader.exe
      Filesize

      3.0MB

      MD5

      adc9db2753fa3daa6a8156254ba2a5f1

      SHA1

      50ff27e2e1c4acc35768b93b73c03f7630027f04

      SHA256

      f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde

      SHA512

      5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

    • C:\Program Files (x86)\LetsSee!\busshost.exe
      Filesize

      716KB

      MD5

      bede4a068f27d85678a99ddf669089fa

      SHA1

      fd0a9d064a8fe23319fd21433035de6c4179a68c

      SHA256

      990a53055c9bc648da3f860413a5bafd06b0889e408d443fd99fc4e4259cdbab

      SHA512

      c06e8159540364f2e2e11da834fd2680021cc4057ee70f9b77c7feb2151dd9d14a4518278bf39b805a2b3eb2813a6e73758e038423519f657d9a82ea69d28afe

    • C:\Program Files (x86)\LetsSee!\conf.exe
      Filesize

      1022KB

      MD5

      e675b999d5c8091a8e4cefd3d1da03d6

      SHA1

      20a148083b31517f52fbb775d84d7d7256f0b9c6

      SHA256

      cbb8ed00b41745ee83a78041057f5eacf1110815e79591bbb8f1e961230b7f8b

      SHA512

      23fd81dad4065b8aad0287d9a5e9b857962786fc34152ea281c2728602e37509cea42740faf73477f3815b084a1c50b3fea9da3ce95f82cb4bbf06272c36a9f2

    • C:\Program Files (x86)\LetsSee!\conf.exe
      Filesize

      1022KB

      MD5

      e675b999d5c8091a8e4cefd3d1da03d6

      SHA1

      20a148083b31517f52fbb775d84d7d7256f0b9c6

      SHA256

      cbb8ed00b41745ee83a78041057f5eacf1110815e79591bbb8f1e961230b7f8b

      SHA512

      23fd81dad4065b8aad0287d9a5e9b857962786fc34152ea281c2728602e37509cea42740faf73477f3815b084a1c50b3fea9da3ce95f82cb4bbf06272c36a9f2

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\win.ini
      Filesize

      199B

      MD5

      3d68da5fd157231843a13667676de3f2

      SHA1

      206082eb56a40f38ba1e852ffcde4cd6e23cc338

      SHA256

      f5c9d294b9c805e38bebe17ac7150bf591df5b28f28db56dc2a1a9e609331759

      SHA512

      e136ed0cc3f47c52b439d72d39fcde3724852ec106e145c5e0dbb6d4d6e69209da7d160e3cc7c7ad51370230ffd4403477a65cd334cf71965473b847db0584a5

    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\.exe
      Filesize

      1022KB

      MD5

      e675b999d5c8091a8e4cefd3d1da03d6

      SHA1

      20a148083b31517f52fbb775d84d7d7256f0b9c6

      SHA256

      cbb8ed00b41745ee83a78041057f5eacf1110815e79591bbb8f1e961230b7f8b

      SHA512

      23fd81dad4065b8aad0287d9a5e9b857962786fc34152ea281c2728602e37509cea42740faf73477f3815b084a1c50b3fea9da3ce95f82cb4bbf06272c36a9f2

    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\.exe
      Filesize

      1022KB

      MD5

      e675b999d5c8091a8e4cefd3d1da03d6

      SHA1

      20a148083b31517f52fbb775d84d7d7256f0b9c6

      SHA256

      cbb8ed00b41745ee83a78041057f5eacf1110815e79591bbb8f1e961230b7f8b

      SHA512

      23fd81dad4065b8aad0287d9a5e9b857962786fc34152ea281c2728602e37509cea42740faf73477f3815b084a1c50b3fea9da3ce95f82cb4bbf06272c36a9f2

    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
      Filesize

      1022KB

      MD5

      e675b999d5c8091a8e4cefd3d1da03d6

      SHA1

      20a148083b31517f52fbb775d84d7d7256f0b9c6

      SHA256

      cbb8ed00b41745ee83a78041057f5eacf1110815e79591bbb8f1e961230b7f8b

      SHA512

      23fd81dad4065b8aad0287d9a5e9b857962786fc34152ea281c2728602e37509cea42740faf73477f3815b084a1c50b3fea9da3ce95f82cb4bbf06272c36a9f2

    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
      Filesize

      1022KB

      MD5

      e675b999d5c8091a8e4cefd3d1da03d6

      SHA1

      20a148083b31517f52fbb775d84d7d7256f0b9c6

      SHA256

      cbb8ed00b41745ee83a78041057f5eacf1110815e79591bbb8f1e961230b7f8b

      SHA512

      23fd81dad4065b8aad0287d9a5e9b857962786fc34152ea281c2728602e37509cea42740faf73477f3815b084a1c50b3fea9da3ce95f82cb4bbf06272c36a9f2

    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
      Filesize

      1022KB

      MD5

      e675b999d5c8091a8e4cefd3d1da03d6

      SHA1

      20a148083b31517f52fbb775d84d7d7256f0b9c6

      SHA256

      cbb8ed00b41745ee83a78041057f5eacf1110815e79591bbb8f1e961230b7f8b

      SHA512

      23fd81dad4065b8aad0287d9a5e9b857962786fc34152ea281c2728602e37509cea42740faf73477f3815b084a1c50b3fea9da3ce95f82cb4bbf06272c36a9f2

    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
      Filesize

      1022KB

      MD5

      e675b999d5c8091a8e4cefd3d1da03d6

      SHA1

      20a148083b31517f52fbb775d84d7d7256f0b9c6

      SHA256

      cbb8ed00b41745ee83a78041057f5eacf1110815e79591bbb8f1e961230b7f8b

      SHA512

      23fd81dad4065b8aad0287d9a5e9b857962786fc34152ea281c2728602e37509cea42740faf73477f3815b084a1c50b3fea9da3ce95f82cb4bbf06272c36a9f2

    • \Program Files (x86)\LetsSee!\YTLoader.exe
      Filesize

      3.0MB

      MD5

      adc9db2753fa3daa6a8156254ba2a5f1

      SHA1

      50ff27e2e1c4acc35768b93b73c03f7630027f04

      SHA256

      f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde

      SHA512

      5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

    • \Program Files (x86)\LetsSee!\YTLoader.exe
      Filesize

      3.0MB

      MD5

      adc9db2753fa3daa6a8156254ba2a5f1

      SHA1

      50ff27e2e1c4acc35768b93b73c03f7630027f04

      SHA256

      f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde

      SHA512

      5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

    • \Program Files (x86)\LetsSee!\YTLoader.exe
      Filesize

      3.0MB

      MD5

      adc9db2753fa3daa6a8156254ba2a5f1

      SHA1

      50ff27e2e1c4acc35768b93b73c03f7630027f04

      SHA256

      f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde

      SHA512

      5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

    • \Program Files (x86)\LetsSee!\YTLoader.exe
      Filesize

      3.0MB

      MD5

      adc9db2753fa3daa6a8156254ba2a5f1

      SHA1

      50ff27e2e1c4acc35768b93b73c03f7630027f04

      SHA256

      f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde

      SHA512

      5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

    • \Program Files (x86)\LetsSee!\YTLoader.exe
      Filesize

      3.0MB

      MD5

      adc9db2753fa3daa6a8156254ba2a5f1

      SHA1

      50ff27e2e1c4acc35768b93b73c03f7630027f04

      SHA256

      f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde

      SHA512

      5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

    • \Program Files (x86)\LetsSee!\YTLoader.exe
      Filesize

      3.0MB

      MD5

      adc9db2753fa3daa6a8156254ba2a5f1

      SHA1

      50ff27e2e1c4acc35768b93b73c03f7630027f04

      SHA256

      f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde

      SHA512

      5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

    • \Program Files (x86)\LetsSee!\busshost.exe
      Filesize

      716KB

      MD5

      bede4a068f27d85678a99ddf669089fa

      SHA1

      fd0a9d064a8fe23319fd21433035de6c4179a68c

      SHA256

      990a53055c9bc648da3f860413a5bafd06b0889e408d443fd99fc4e4259cdbab

      SHA512

      c06e8159540364f2e2e11da834fd2680021cc4057ee70f9b77c7feb2151dd9d14a4518278bf39b805a2b3eb2813a6e73758e038423519f657d9a82ea69d28afe

    • \Program Files (x86)\LetsSee!\busshost.exe
      Filesize

      716KB

      MD5

      bede4a068f27d85678a99ddf669089fa

      SHA1

      fd0a9d064a8fe23319fd21433035de6c4179a68c

      SHA256

      990a53055c9bc648da3f860413a5bafd06b0889e408d443fd99fc4e4259cdbab

      SHA512

      c06e8159540364f2e2e11da834fd2680021cc4057ee70f9b77c7feb2151dd9d14a4518278bf39b805a2b3eb2813a6e73758e038423519f657d9a82ea69d28afe

    • \Program Files (x86)\LetsSee!\conf.exe
      Filesize

      1022KB

      MD5

      e675b999d5c8091a8e4cefd3d1da03d6

      SHA1

      20a148083b31517f52fbb775d84d7d7256f0b9c6

      SHA256

      cbb8ed00b41745ee83a78041057f5eacf1110815e79591bbb8f1e961230b7f8b

      SHA512

      23fd81dad4065b8aad0287d9a5e9b857962786fc34152ea281c2728602e37509cea42740faf73477f3815b084a1c50b3fea9da3ce95f82cb4bbf06272c36a9f2

    • \Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\.exe
      Filesize

      1022KB

      MD5

      e675b999d5c8091a8e4cefd3d1da03d6

      SHA1

      20a148083b31517f52fbb775d84d7d7256f0b9c6

      SHA256

      cbb8ed00b41745ee83a78041057f5eacf1110815e79591bbb8f1e961230b7f8b

      SHA512

      23fd81dad4065b8aad0287d9a5e9b857962786fc34152ea281c2728602e37509cea42740faf73477f3815b084a1c50b3fea9da3ce95f82cb4bbf06272c36a9f2

    • \Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
      Filesize

      1022KB

      MD5

      e675b999d5c8091a8e4cefd3d1da03d6

      SHA1

      20a148083b31517f52fbb775d84d7d7256f0b9c6

      SHA256

      cbb8ed00b41745ee83a78041057f5eacf1110815e79591bbb8f1e961230b7f8b

      SHA512

      23fd81dad4065b8aad0287d9a5e9b857962786fc34152ea281c2728602e37509cea42740faf73477f3815b084a1c50b3fea9da3ce95f82cb4bbf06272c36a9f2

    • memory/304-84-0x0000000000000000-mapping.dmp
    • memory/468-109-0x0000000000000000-mapping.dmp
    • memory/812-135-0x0000000000400000-0x0000000000520000-memory.dmp
      Filesize

      1.1MB

    • memory/812-104-0x0000000000000000-mapping.dmp
    • memory/812-152-0x0000000000400000-0x0000000000520000-memory.dmp
      Filesize

      1.1MB

    • memory/812-124-0x0000000001E10000-0x0000000001ED5000-memory.dmp
      Filesize

      788KB

    • memory/812-134-0x0000000001E10000-0x0000000001EA4000-memory.dmp
      Filesize

      592KB

    • memory/840-91-0x0000000000000000-mapping.dmp
    • memory/840-110-0x0000000000400000-0x0000000000520000-memory.dmp
      Filesize

      1.1MB

    • memory/840-108-0x0000000000400000-0x0000000000520000-memory.dmp
      Filesize

      1.1MB

    • memory/840-107-0x0000000000520000-0x00000000005B4000-memory.dmp
      Filesize

      592KB

    • memory/840-100-0x0000000000520000-0x00000000005E5000-memory.dmp
      Filesize

      788KB

    • memory/908-129-0x0000000000000000-mapping.dmp
    • memory/952-69-0x0000000000400000-0x00000000004CA000-memory.dmp
      Filesize

      808KB

    • memory/952-144-0x0000000000400000-0x00000000004CA000-memory.dmp
      Filesize

      808KB

    • memory/952-57-0x0000000000000000-mapping.dmp
    • memory/952-68-0x0000000001CF0000-0x0000000001DF0000-memory.dmp
      Filesize

      1024KB

    • memory/952-143-0x0000000001CF0000-0x0000000001DF0000-memory.dmp
      Filesize

      1024KB

    • memory/964-93-0x0000000000000000-mapping.dmp
    • memory/972-130-0x0000000000000000-mapping.dmp
    • memory/1120-81-0x0000000000000000-mapping.dmp
    • memory/1324-132-0x0000000000000000-mapping.dmp
    • memory/1472-54-0x0000000074F21000-0x0000000074F23000-memory.dmp
      Filesize

      8KB

    • memory/1552-112-0x0000000000000000-mapping.dmp
    • memory/1664-136-0x0000000000000000-mapping.dmp
    • memory/1740-96-0x0000000000000000-mapping.dmp
    • memory/1832-128-0x00000000009A0000-0x00000000009A8000-memory.dmp
      Filesize

      32KB

    • memory/1832-131-0x00000000009B0000-0x00000000009B8000-memory.dmp
      Filesize

      32KB

    • memory/1832-60-0x0000000000000000-mapping.dmp
    • memory/1832-111-0x0000000005130000-0x000000000558A000-memory.dmp
      Filesize

      4.4MB

    • memory/1832-113-0x0000000000850000-0x0000000000860000-memory.dmp
      Filesize

      64KB

    • memory/1832-114-0x0000000000860000-0x000000000086A000-memory.dmp
      Filesize

      40KB

    • memory/1832-115-0x0000000000870000-0x000000000087A000-memory.dmp
      Filesize

      40KB

    • memory/1832-116-0x00000000008A0000-0x00000000008AA000-memory.dmp
      Filesize

      40KB

    • memory/1832-117-0x000000006EE80000-0x000000006EF7C000-memory.dmp
      Filesize

      1008KB

    • memory/1832-118-0x00000000008B0000-0x00000000008B8000-memory.dmp
      Filesize

      32KB

    • memory/1832-119-0x0000000000900000-0x000000000090E000-memory.dmp
      Filesize

      56KB

    • memory/1832-120-0x0000000000910000-0x0000000000918000-memory.dmp
      Filesize

      32KB

    • memory/1832-121-0x0000000000920000-0x0000000000928000-memory.dmp
      Filesize

      32KB

    • memory/1832-122-0x0000000000930000-0x0000000000938000-memory.dmp
      Filesize

      32KB

    • memory/1832-123-0x000000006E280000-0x000000006E9BE000-memory.dmp
      Filesize

      7.2MB

    • memory/1832-151-0x000000006EE80000-0x000000006EF7C000-memory.dmp
      Filesize

      1008KB

    • memory/1832-125-0x0000000000940000-0x0000000000948000-memory.dmp
      Filesize

      32KB

    • memory/1832-150-0x00000000739C0000-0x0000000073BB4000-memory.dmp
      Filesize

      2.0MB

    • memory/1832-99-0x0000000070290000-0x0000000070E3E000-memory.dmp
      Filesize

      11.7MB

    • memory/1832-149-0x000000006EF80000-0x0000000070287000-memory.dmp
      Filesize

      19.0MB

    • memory/1832-97-0x0000000000600000-0x000000000060A000-memory.dmp
      Filesize

      40KB

    • memory/1832-89-0x0000000070E40000-0x0000000071233000-memory.dmp
      Filesize

      3.9MB

    • memory/1832-98-0x00000000739C0000-0x0000000073BB4000-memory.dmp
      Filesize

      2.0MB

    • memory/1832-148-0x0000000070290000-0x0000000070E3E000-memory.dmp
      Filesize

      11.7MB

    • memory/1832-82-0x0000000071240000-0x0000000071A20000-memory.dmp
      Filesize

      7.9MB

    • memory/1832-147-0x0000000070E40000-0x0000000071233000-memory.dmp
      Filesize

      3.9MB

    • memory/1832-105-0x000000006EF80000-0x0000000070287000-memory.dmp
      Filesize

      19.0MB

    • memory/1832-79-0x0000000071A20000-0x0000000072430000-memory.dmp
      Filesize

      10.1MB

    • memory/1832-146-0x0000000071240000-0x0000000071A20000-memory.dmp
      Filesize

      7.9MB

    • memory/1832-145-0x0000000071A20000-0x0000000072430000-memory.dmp
      Filesize

      10.1MB

    • memory/1832-72-0x0000000072430000-0x00000000737BF000-memory.dmp
      Filesize

      19.6MB

    • memory/1832-70-0x00000000002E0000-0x00000000005E8000-memory.dmp
      Filesize

      3.0MB

    • memory/1832-142-0x0000000072430000-0x00000000737BF000-memory.dmp
      Filesize

      19.6MB

    • memory/1856-133-0x0000000000000000-mapping.dmp
    • memory/1880-71-0x0000000001D80000-0x0000000001E45000-memory.dmp
      Filesize

      788KB

    • memory/1880-63-0x0000000000000000-mapping.dmp
    • memory/1880-75-0x0000000001D80000-0x0000000001E14000-memory.dmp
      Filesize

      592KB

    • memory/1880-80-0x0000000000400000-0x0000000000520000-memory.dmp
      Filesize

      1.1MB

    • memory/1880-83-0x0000000000400000-0x0000000000520000-memory.dmp
      Filesize

      1.1MB

    • memory/2016-77-0x0000000000000000-mapping.dmp
    • memory/2016-94-0x0000000001D10000-0x0000000001DA4000-memory.dmp
      Filesize

      592KB

    • memory/2016-85-0x0000000001D10000-0x0000000001DD5000-memory.dmp
      Filesize

      788KB

    • memory/2016-95-0x0000000000400000-0x0000000000520000-memory.dmp
      Filesize

      1.1MB