Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    03-07-2022 10:14

General

  • Target

    3b9c5ff5adeae8d2cec922ed51eee0c9af43016c25163865480fba723acebff3.exe

  • Size

    4.3MB

  • MD5

    46b161adc6af9bf969eb231c8e0e5964

  • SHA1

    46780442ef9527011809ce33e3ace2ead00495f8

  • SHA256

    3b9c5ff5adeae8d2cec922ed51eee0c9af43016c25163865480fba723acebff3

  • SHA512

    6fb037f2d9d032cd935c81db83204c2b65e6ad0345831f15c352a9290043bc1d0142f4bee67f3560caf951511f4e1534790464180a0e925975a0922e4d4e7755

Malware Config

Extracted

Family

vidar

Version

10.1

Botnet

231

C2

http://tribecaflatstore.com/

Attributes
  • profile_id

    231

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

    suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

  • Vidar Stealer 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Runs ping.exe 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b9c5ff5adeae8d2cec922ed51eee0c9af43016c25163865480fba723acebff3.exe
    "C:\Users\Admin\AppData\Local\Temp\3b9c5ff5adeae8d2cec922ed51eee0c9af43016c25163865480fba723acebff3.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:532
    • C:\Program Files (x86)\LetsSee!\busshost.exe
      "C:\Program Files (x86)\LetsSee!\busshost.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:960
    • C:\Program Files (x86)\LetsSee!\YTLoader.exe
      "C:\Program Files (x86)\LetsSee!\YTLoader.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1524
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1524 -s 1164
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1588
    • C:\Program Files (x86)\LetsSee!\conf.exe
      "C:\Program Files (x86)\LetsSee!\conf.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1328
      • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1256
        • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\\.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1496
          • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
            C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1728
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k ping -n 2 localhost < nul & del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1540
              • C:\Windows\SysWOW64\PING.EXE
                ping -n 2 localhost
                7⤵
                • Runs ping.exe
                PID:1672
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k ping -n 2 localhost < nul & del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:452
            • C:\Windows\SysWOW64\PING.EXE
              ping -n 2 localhost
              6⤵
              • Runs ping.exe
              PID:776
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k ping -n 2 localhost < nul & del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1400
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 2 localhost
            5⤵
            • Runs ping.exe
            PID:1756
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k ping -n 2 localhost < nul & del /F /Q "C:\Program Files (x86)\LetsSee!\conf.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:976
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 2 localhost
          4⤵
          • Runs ping.exe
          PID:1664

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

4
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

4
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\LetsSee!\YTLoader.exe
    Filesize

    3.0MB

    MD5

    adc9db2753fa3daa6a8156254ba2a5f1

    SHA1

    50ff27e2e1c4acc35768b93b73c03f7630027f04

    SHA256

    f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde

    SHA512

    5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

  • C:\Program Files (x86)\LetsSee!\YTLoader.exe
    Filesize

    3.0MB

    MD5

    adc9db2753fa3daa6a8156254ba2a5f1

    SHA1

    50ff27e2e1c4acc35768b93b73c03f7630027f04

    SHA256

    f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde

    SHA512

    5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

  • C:\Program Files (x86)\LetsSee!\busshost.exe
    Filesize

    704KB

    MD5

    66da463b130953a309565ee58d0e1d57

    SHA1

    e67000d3693ad21affa72499057fd793c00e31df

    SHA256

    2dd7c03a83c806bbd6a42b71b16dd3a8a1518ab6478986f18248415a3e3ea81f

    SHA512

    699eda3b9b118d4149f9e8c5e2693e935bb8f86f65d377aec8074c6e884a02e4607bac6bb3b334f7fa0ed259d1aec5d075ec9149e5681e932375475f3ecd4fe4

  • C:\Program Files (x86)\LetsSee!\conf.exe
    Filesize

    1022KB

    MD5

    a451fe7282b81dc74165e3606cc9b48b

    SHA1

    3f7b24bb8a2abd33cc6e4e3e37e2bf7e1d0c6e29

    SHA256

    fda22e8ae696e6bef02a5b2590a79431f41f791428b69cbed48e32b545e9a15e

    SHA512

    27cecda7f7f04b4c814aa77461c2c06e1bfc8426f8a58bb62c25f466cb3a7c3e8796a6cf1700cac89680c7222b068df503dba3c2c71bed6aa5204d397b0abd17

  • C:\Program Files (x86)\LetsSee!\conf.exe
    Filesize

    1022KB

    MD5

    a451fe7282b81dc74165e3606cc9b48b

    SHA1

    3f7b24bb8a2abd33cc6e4e3e37e2bf7e1d0c6e29

    SHA256

    fda22e8ae696e6bef02a5b2590a79431f41f791428b69cbed48e32b545e9a15e

    SHA512

    27cecda7f7f04b4c814aa77461c2c06e1bfc8426f8a58bb62c25f466cb3a7c3e8796a6cf1700cac89680c7222b068df503dba3c2c71bed6aa5204d397b0abd17

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\temp.ini
    Filesize

    199B

    MD5

    3d68da5fd157231843a13667676de3f2

    SHA1

    206082eb56a40f38ba1e852ffcde4cd6e23cc338

    SHA256

    f5c9d294b9c805e38bebe17ac7150bf591df5b28f28db56dc2a1a9e609331759

    SHA512

    e136ed0cc3f47c52b439d72d39fcde3724852ec106e145c5e0dbb6d4d6e69209da7d160e3cc7c7ad51370230ffd4403477a65cd334cf71965473b847db0584a5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\temp.ini
    Filesize

    199B

    MD5

    3d68da5fd157231843a13667676de3f2

    SHA1

    206082eb56a40f38ba1e852ffcde4cd6e23cc338

    SHA256

    f5c9d294b9c805e38bebe17ac7150bf591df5b28f28db56dc2a1a9e609331759

    SHA512

    e136ed0cc3f47c52b439d72d39fcde3724852ec106e145c5e0dbb6d4d6e69209da7d160e3cc7c7ad51370230ffd4403477a65cd334cf71965473b847db0584a5

  • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\.exe
    Filesize

    1022KB

    MD5

    a451fe7282b81dc74165e3606cc9b48b

    SHA1

    3f7b24bb8a2abd33cc6e4e3e37e2bf7e1d0c6e29

    SHA256

    fda22e8ae696e6bef02a5b2590a79431f41f791428b69cbed48e32b545e9a15e

    SHA512

    27cecda7f7f04b4c814aa77461c2c06e1bfc8426f8a58bb62c25f466cb3a7c3e8796a6cf1700cac89680c7222b068df503dba3c2c71bed6aa5204d397b0abd17

  • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\.exe
    Filesize

    1022KB

    MD5

    a451fe7282b81dc74165e3606cc9b48b

    SHA1

    3f7b24bb8a2abd33cc6e4e3e37e2bf7e1d0c6e29

    SHA256

    fda22e8ae696e6bef02a5b2590a79431f41f791428b69cbed48e32b545e9a15e

    SHA512

    27cecda7f7f04b4c814aa77461c2c06e1bfc8426f8a58bb62c25f466cb3a7c3e8796a6cf1700cac89680c7222b068df503dba3c2c71bed6aa5204d397b0abd17

  • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
    Filesize

    1022KB

    MD5

    a451fe7282b81dc74165e3606cc9b48b

    SHA1

    3f7b24bb8a2abd33cc6e4e3e37e2bf7e1d0c6e29

    SHA256

    fda22e8ae696e6bef02a5b2590a79431f41f791428b69cbed48e32b545e9a15e

    SHA512

    27cecda7f7f04b4c814aa77461c2c06e1bfc8426f8a58bb62c25f466cb3a7c3e8796a6cf1700cac89680c7222b068df503dba3c2c71bed6aa5204d397b0abd17

  • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
    Filesize

    1022KB

    MD5

    a451fe7282b81dc74165e3606cc9b48b

    SHA1

    3f7b24bb8a2abd33cc6e4e3e37e2bf7e1d0c6e29

    SHA256

    fda22e8ae696e6bef02a5b2590a79431f41f791428b69cbed48e32b545e9a15e

    SHA512

    27cecda7f7f04b4c814aa77461c2c06e1bfc8426f8a58bb62c25f466cb3a7c3e8796a6cf1700cac89680c7222b068df503dba3c2c71bed6aa5204d397b0abd17

  • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
    Filesize

    1022KB

    MD5

    a451fe7282b81dc74165e3606cc9b48b

    SHA1

    3f7b24bb8a2abd33cc6e4e3e37e2bf7e1d0c6e29

    SHA256

    fda22e8ae696e6bef02a5b2590a79431f41f791428b69cbed48e32b545e9a15e

    SHA512

    27cecda7f7f04b4c814aa77461c2c06e1bfc8426f8a58bb62c25f466cb3a7c3e8796a6cf1700cac89680c7222b068df503dba3c2c71bed6aa5204d397b0abd17

  • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
    Filesize

    1022KB

    MD5

    a451fe7282b81dc74165e3606cc9b48b

    SHA1

    3f7b24bb8a2abd33cc6e4e3e37e2bf7e1d0c6e29

    SHA256

    fda22e8ae696e6bef02a5b2590a79431f41f791428b69cbed48e32b545e9a15e

    SHA512

    27cecda7f7f04b4c814aa77461c2c06e1bfc8426f8a58bb62c25f466cb3a7c3e8796a6cf1700cac89680c7222b068df503dba3c2c71bed6aa5204d397b0abd17

  • \Program Files (x86)\LetsSee!\YTLoader.exe
    Filesize

    3.0MB

    MD5

    adc9db2753fa3daa6a8156254ba2a5f1

    SHA1

    50ff27e2e1c4acc35768b93b73c03f7630027f04

    SHA256

    f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde

    SHA512

    5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

  • \Program Files (x86)\LetsSee!\YTLoader.exe
    Filesize

    3.0MB

    MD5

    adc9db2753fa3daa6a8156254ba2a5f1

    SHA1

    50ff27e2e1c4acc35768b93b73c03f7630027f04

    SHA256

    f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde

    SHA512

    5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

  • \Program Files (x86)\LetsSee!\YTLoader.exe
    Filesize

    3.0MB

    MD5

    adc9db2753fa3daa6a8156254ba2a5f1

    SHA1

    50ff27e2e1c4acc35768b93b73c03f7630027f04

    SHA256

    f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde

    SHA512

    5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

  • \Program Files (x86)\LetsSee!\YTLoader.exe
    Filesize

    3.0MB

    MD5

    adc9db2753fa3daa6a8156254ba2a5f1

    SHA1

    50ff27e2e1c4acc35768b93b73c03f7630027f04

    SHA256

    f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde

    SHA512

    5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

  • \Program Files (x86)\LetsSee!\YTLoader.exe
    Filesize

    3.0MB

    MD5

    adc9db2753fa3daa6a8156254ba2a5f1

    SHA1

    50ff27e2e1c4acc35768b93b73c03f7630027f04

    SHA256

    f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde

    SHA512

    5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

  • \Program Files (x86)\LetsSee!\YTLoader.exe
    Filesize

    3.0MB

    MD5

    adc9db2753fa3daa6a8156254ba2a5f1

    SHA1

    50ff27e2e1c4acc35768b93b73c03f7630027f04

    SHA256

    f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde

    SHA512

    5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

  • \Program Files (x86)\LetsSee!\busshost.exe
    Filesize

    704KB

    MD5

    66da463b130953a309565ee58d0e1d57

    SHA1

    e67000d3693ad21affa72499057fd793c00e31df

    SHA256

    2dd7c03a83c806bbd6a42b71b16dd3a8a1518ab6478986f18248415a3e3ea81f

    SHA512

    699eda3b9b118d4149f9e8c5e2693e935bb8f86f65d377aec8074c6e884a02e4607bac6bb3b334f7fa0ed259d1aec5d075ec9149e5681e932375475f3ecd4fe4

  • \Program Files (x86)\LetsSee!\busshost.exe
    Filesize

    704KB

    MD5

    66da463b130953a309565ee58d0e1d57

    SHA1

    e67000d3693ad21affa72499057fd793c00e31df

    SHA256

    2dd7c03a83c806bbd6a42b71b16dd3a8a1518ab6478986f18248415a3e3ea81f

    SHA512

    699eda3b9b118d4149f9e8c5e2693e935bb8f86f65d377aec8074c6e884a02e4607bac6bb3b334f7fa0ed259d1aec5d075ec9149e5681e932375475f3ecd4fe4

  • \Program Files (x86)\LetsSee!\conf.exe
    Filesize

    1022KB

    MD5

    a451fe7282b81dc74165e3606cc9b48b

    SHA1

    3f7b24bb8a2abd33cc6e4e3e37e2bf7e1d0c6e29

    SHA256

    fda22e8ae696e6bef02a5b2590a79431f41f791428b69cbed48e32b545e9a15e

    SHA512

    27cecda7f7f04b4c814aa77461c2c06e1bfc8426f8a58bb62c25f466cb3a7c3e8796a6cf1700cac89680c7222b068df503dba3c2c71bed6aa5204d397b0abd17

  • \Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\.exe
    Filesize

    1022KB

    MD5

    a451fe7282b81dc74165e3606cc9b48b

    SHA1

    3f7b24bb8a2abd33cc6e4e3e37e2bf7e1d0c6e29

    SHA256

    fda22e8ae696e6bef02a5b2590a79431f41f791428b69cbed48e32b545e9a15e

    SHA512

    27cecda7f7f04b4c814aa77461c2c06e1bfc8426f8a58bb62c25f466cb3a7c3e8796a6cf1700cac89680c7222b068df503dba3c2c71bed6aa5204d397b0abd17

  • \Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
    Filesize

    1022KB

    MD5

    a451fe7282b81dc74165e3606cc9b48b

    SHA1

    3f7b24bb8a2abd33cc6e4e3e37e2bf7e1d0c6e29

    SHA256

    fda22e8ae696e6bef02a5b2590a79431f41f791428b69cbed48e32b545e9a15e

    SHA512

    27cecda7f7f04b4c814aa77461c2c06e1bfc8426f8a58bb62c25f466cb3a7c3e8796a6cf1700cac89680c7222b068df503dba3c2c71bed6aa5204d397b0abd17

  • memory/452-118-0x0000000000000000-mapping.dmp
  • memory/532-54-0x0000000075711000-0x0000000075713000-memory.dmp
    Filesize

    8KB

  • memory/776-120-0x0000000000000000-mapping.dmp
  • memory/960-114-0x00000000002D0000-0x00000000003D0000-memory.dmp
    Filesize

    1024KB

  • memory/960-57-0x0000000000000000-mapping.dmp
  • memory/960-87-0x00000000002D0000-0x00000000003D0000-memory.dmp
    Filesize

    1024KB

  • memory/960-88-0x0000000000400000-0x00000000004D1000-memory.dmp
    Filesize

    836KB

  • memory/960-115-0x0000000000400000-0x00000000004D1000-memory.dmp
    Filesize

    836KB

  • memory/976-94-0x0000000000000000-mapping.dmp
  • memory/1256-104-0x0000000001E50000-0x0000000001EE5000-memory.dmp
    Filesize

    596KB

  • memory/1256-92-0x0000000000000000-mapping.dmp
  • memory/1256-97-0x0000000001E50000-0x0000000001F17000-memory.dmp
    Filesize

    796KB

  • memory/1256-107-0x0000000000400000-0x0000000000521000-memory.dmp
    Filesize

    1.1MB

  • memory/1256-105-0x0000000000400000-0x0000000000521000-memory.dmp
    Filesize

    1.1MB

  • memory/1328-89-0x0000000000530000-0x00000000005C5000-memory.dmp
    Filesize

    596KB

  • memory/1328-84-0x0000000000530000-0x00000000005F7000-memory.dmp
    Filesize

    796KB

  • memory/1328-95-0x0000000000400000-0x0000000000521000-memory.dmp
    Filesize

    1.1MB

  • memory/1328-64-0x0000000000000000-mapping.dmp
  • memory/1328-90-0x0000000000400000-0x0000000000521000-memory.dmp
    Filesize

    1.1MB

  • memory/1400-106-0x0000000000000000-mapping.dmp
  • memory/1496-113-0x0000000000400000-0x0000000000521000-memory.dmp
    Filesize

    1.1MB

  • memory/1496-109-0x0000000001E90000-0x0000000001F57000-memory.dmp
    Filesize

    796KB

  • memory/1496-102-0x0000000000000000-mapping.dmp
  • memory/1496-119-0x0000000000400000-0x0000000000521000-memory.dmp
    Filesize

    1.1MB

  • memory/1496-112-0x0000000001E90000-0x0000000001F25000-memory.dmp
    Filesize

    596KB

  • memory/1524-73-0x0000000000960000-0x000000000096A000-memory.dmp
    Filesize

    40KB

  • memory/1524-75-0x0000000000B20000-0x0000000000B2E000-memory.dmp
    Filesize

    56KB

  • memory/1524-77-0x0000000002180000-0x0000000002188000-memory.dmp
    Filesize

    32KB

  • memory/1524-80-0x0000000002340000-0x0000000002348000-memory.dmp
    Filesize

    32KB

  • memory/1524-81-0x0000000002350000-0x0000000002358000-memory.dmp
    Filesize

    32KB

  • memory/1524-76-0x0000000002170000-0x0000000002178000-memory.dmp
    Filesize

    32KB

  • memory/1524-74-0x0000000000970000-0x0000000000978000-memory.dmp
    Filesize

    32KB

  • memory/1524-60-0x0000000000000000-mapping.dmp
  • memory/1524-79-0x00000000021E0000-0x00000000021E8000-memory.dmp
    Filesize

    32KB

  • memory/1524-69-0x0000000005070000-0x00000000054CA000-memory.dmp
    Filesize

    4.4MB

  • memory/1524-78-0x0000000002190000-0x0000000002198000-memory.dmp
    Filesize

    32KB

  • memory/1524-71-0x00000000008F0000-0x00000000008FA000-memory.dmp
    Filesize

    40KB

  • memory/1524-66-0x00000000001F0000-0x00000000004F8000-memory.dmp
    Filesize

    3.0MB

  • memory/1524-72-0x0000000000940000-0x000000000094A000-memory.dmp
    Filesize

    40KB

  • memory/1524-70-0x00000000008E0000-0x00000000008F0000-memory.dmp
    Filesize

    64KB

  • memory/1524-67-0x00000000005C0000-0x00000000005CA000-memory.dmp
    Filesize

    40KB

  • memory/1540-125-0x0000000000000000-mapping.dmp
  • memory/1588-129-0x0000000000000000-mapping.dmp
  • memory/1664-96-0x0000000000000000-mapping.dmp
  • memory/1672-127-0x0000000000000000-mapping.dmp
  • memory/1728-128-0x0000000000400000-0x0000000000521000-memory.dmp
    Filesize

    1.1MB

  • memory/1728-126-0x0000000001DD0000-0x0000000001E65000-memory.dmp
    Filesize

    596KB

  • memory/1728-121-0x0000000001DD0000-0x0000000001E97000-memory.dmp
    Filesize

    796KB

  • memory/1728-116-0x0000000000000000-mapping.dmp
  • memory/1756-108-0x0000000000000000-mapping.dmp