Analysis

  • max time kernel
    119s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    24-07-2022 17:34

General

  • Target

    a4983faa6bc1743bd7607fc5f8204694e6852af052a2bb8db7af6e24fe71267a.exe

  • Size

    4.3MB

  • MD5

    c8659d50dd2e24fb509377114355aa36

  • SHA1

    0a3d5ba3e3cb94c89c2007c68ba11ba97674c67a

  • SHA256

    a4983faa6bc1743bd7607fc5f8204694e6852af052a2bb8db7af6e24fe71267a

  • SHA512

    3ff3d3aee31f76f3bee725740b803331439602b92791e6aea5f62dcf112689caab262f4a8d7bee45c0f70ff4ccc6d29a24802d8705e8032c17fd26a54a790d5a

Malware Config

Extracted

Family

vidar

Version

9.9

Botnet

231

C2

http://rapidbtcinvest.com/

Attributes
  • profile_id

    231

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

    suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

  • Vidar Stealer 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4983faa6bc1743bd7607fc5f8204694e6852af052a2bb8db7af6e24fe71267a.exe
    "C:\Users\Admin\AppData\Local\Temp\a4983faa6bc1743bd7607fc5f8204694e6852af052a2bb8db7af6e24fe71267a.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1140
    • C:\Program Files (x86)\LetsSee!\busshost.exe
      "C:\Program Files (x86)\LetsSee!\busshost.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:624
    • C:\Program Files (x86)\LetsSee!\YTLoader.exe
      "C:\Program Files (x86)\LetsSee!\YTLoader.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:1216
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 1164
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1912
    • C:\Program Files (x86)\LetsSee!\conf.exe
      "C:\Program Files (x86)\LetsSee!\conf.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1180
      • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1892
        • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\\.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1624
          • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
            C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:872
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c SchTasks /create /SC MINUTE /TN 7ZipUnis /TR C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\volumfix.exe
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1180
              • C:\Windows\SysWOW64\schtasks.exe
                SchTasks /create /SC MINUTE /TN 7ZipUnis /TR C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\volumfix.exe
                7⤵
                • Creates scheduled task(s)
                PID:1076
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c SchTasks /create /SC HOURLY /TN FlashServis /TR C:\ProgramData\FlashSys\CurlMSI.exe
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1724
              • C:\Windows\SysWOW64\schtasks.exe
                SchTasks /create /SC HOURLY /TN FlashServis /TR C:\ProgramData\FlashSys\CurlMSI.exe
                7⤵
                • Creates scheduled task(s)
                PID:908
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k ping -n 2 localhost < nul & del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1364
            • C:\Windows\SysWOW64\PING.EXE
              ping -n 2 localhost
              6⤵
              • Runs ping.exe
              PID:1888
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k ping -n 2 localhost < nul & del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:952
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 2 localhost
            5⤵
            • Runs ping.exe
            PID:560
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k ping -n 2 localhost < nul & del /F /Q "C:\Program Files (x86)\LetsSee!\conf.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:364
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 2 localhost
          4⤵
          • Runs ping.exe
          PID:1076
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {324D9A36-4DFF-45B9-B048-3C00B37BF126} S-1-5-21-4084403625-2215941253-1760665084-1000:LDLTPJLN\Admin:Interactive:[1]
    1⤵
      PID:1548

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Credential Access

    Credentials in Files

    4
    T1081

    Discovery

    Query Registry

    3
    T1012

    System Information Discovery

    3
    T1082

    Remote System Discovery

    1
    T1018

    Collection

    Data from Local System

    4
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\LetsSee!\YTLoader.exe
      Filesize

      3.0MB

      MD5

      adc9db2753fa3daa6a8156254ba2a5f1

      SHA1

      50ff27e2e1c4acc35768b93b73c03f7630027f04

      SHA256

      f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde

      SHA512

      5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

    • C:\Program Files (x86)\LetsSee!\YTLoader.exe
      Filesize

      3.0MB

      MD5

      adc9db2753fa3daa6a8156254ba2a5f1

      SHA1

      50ff27e2e1c4acc35768b93b73c03f7630027f04

      SHA256

      f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde

      SHA512

      5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

    • C:\Program Files (x86)\LetsSee!\busshost.exe
      Filesize

      914KB

      MD5

      658e674811ebff49dd8ff5b2e5fc03d3

      SHA1

      fe08e682ea246fb054afa1d5b4c81276d39b77a1

      SHA256

      e929aba5f2630f537cc5c9d4067556aa426d9974ee48722de5b0217e16aeb3ed

      SHA512

      30e09260bc878487c19f7b539603b11eeb4132786485077ddda84a423b8445a5971ac7bde761a4c9464b218fa058442d27f5f740ee8c8660f88273aa12e8b2e7

    • C:\Program Files (x86)\LetsSee!\conf.exe
      Filesize

      1.3MB

      MD5

      6aa46c5f2770d99294bbb45dfb79bf22

      SHA1

      06b16891d85dba6f5e761bf1c82f10cf54438495

      SHA256

      3a81ec0e539c4f9ad5bbc7c31ec3996f88ca97f234fe0cf7a36d64fa645002ad

      SHA512

      7f1ca4dd1ea15435950170e16c103761cc71ad38bf1075e2696aa3e2bae1a1668f7d107c3e4a24407631153351605397ff11ce6a057d9bb752c9af56b852c515

    • C:\Program Files (x86)\LetsSee!\conf.exe
      Filesize

      1.3MB

      MD5

      6aa46c5f2770d99294bbb45dfb79bf22

      SHA1

      06b16891d85dba6f5e761bf1c82f10cf54438495

      SHA256

      3a81ec0e539c4f9ad5bbc7c31ec3996f88ca97f234fe0cf7a36d64fa645002ad

      SHA512

      7f1ca4dd1ea15435950170e16c103761cc71ad38bf1075e2696aa3e2bae1a1668f7d107c3e4a24407631153351605397ff11ce6a057d9bb752c9af56b852c515

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\win.ini
      Filesize

      199B

      MD5

      3d68da5fd157231843a13667676de3f2

      SHA1

      206082eb56a40f38ba1e852ffcde4cd6e23cc338

      SHA256

      f5c9d294b9c805e38bebe17ac7150bf591df5b28f28db56dc2a1a9e609331759

      SHA512

      e136ed0cc3f47c52b439d72d39fcde3724852ec106e145c5e0dbb6d4d6e69209da7d160e3cc7c7ad51370230ffd4403477a65cd334cf71965473b847db0584a5

    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\.exe
      Filesize

      1.3MB

      MD5

      6aa46c5f2770d99294bbb45dfb79bf22

      SHA1

      06b16891d85dba6f5e761bf1c82f10cf54438495

      SHA256

      3a81ec0e539c4f9ad5bbc7c31ec3996f88ca97f234fe0cf7a36d64fa645002ad

      SHA512

      7f1ca4dd1ea15435950170e16c103761cc71ad38bf1075e2696aa3e2bae1a1668f7d107c3e4a24407631153351605397ff11ce6a057d9bb752c9af56b852c515

    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\.exe
      Filesize

      1.3MB

      MD5

      6aa46c5f2770d99294bbb45dfb79bf22

      SHA1

      06b16891d85dba6f5e761bf1c82f10cf54438495

      SHA256

      3a81ec0e539c4f9ad5bbc7c31ec3996f88ca97f234fe0cf7a36d64fa645002ad

      SHA512

      7f1ca4dd1ea15435950170e16c103761cc71ad38bf1075e2696aa3e2bae1a1668f7d107c3e4a24407631153351605397ff11ce6a057d9bb752c9af56b852c515

    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
      Filesize

      1.3MB

      MD5

      6aa46c5f2770d99294bbb45dfb79bf22

      SHA1

      06b16891d85dba6f5e761bf1c82f10cf54438495

      SHA256

      3a81ec0e539c4f9ad5bbc7c31ec3996f88ca97f234fe0cf7a36d64fa645002ad

      SHA512

      7f1ca4dd1ea15435950170e16c103761cc71ad38bf1075e2696aa3e2bae1a1668f7d107c3e4a24407631153351605397ff11ce6a057d9bb752c9af56b852c515

    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
      Filesize

      1.3MB

      MD5

      6aa46c5f2770d99294bbb45dfb79bf22

      SHA1

      06b16891d85dba6f5e761bf1c82f10cf54438495

      SHA256

      3a81ec0e539c4f9ad5bbc7c31ec3996f88ca97f234fe0cf7a36d64fa645002ad

      SHA512

      7f1ca4dd1ea15435950170e16c103761cc71ad38bf1075e2696aa3e2bae1a1668f7d107c3e4a24407631153351605397ff11ce6a057d9bb752c9af56b852c515

    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
      Filesize

      1.3MB

      MD5

      6aa46c5f2770d99294bbb45dfb79bf22

      SHA1

      06b16891d85dba6f5e761bf1c82f10cf54438495

      SHA256

      3a81ec0e539c4f9ad5bbc7c31ec3996f88ca97f234fe0cf7a36d64fa645002ad

      SHA512

      7f1ca4dd1ea15435950170e16c103761cc71ad38bf1075e2696aa3e2bae1a1668f7d107c3e4a24407631153351605397ff11ce6a057d9bb752c9af56b852c515

    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
      Filesize

      1.3MB

      MD5

      6aa46c5f2770d99294bbb45dfb79bf22

      SHA1

      06b16891d85dba6f5e761bf1c82f10cf54438495

      SHA256

      3a81ec0e539c4f9ad5bbc7c31ec3996f88ca97f234fe0cf7a36d64fa645002ad

      SHA512

      7f1ca4dd1ea15435950170e16c103761cc71ad38bf1075e2696aa3e2bae1a1668f7d107c3e4a24407631153351605397ff11ce6a057d9bb752c9af56b852c515

    • \Program Files (x86)\LetsSee!\YTLoader.exe
      Filesize

      3.0MB

      MD5

      adc9db2753fa3daa6a8156254ba2a5f1

      SHA1

      50ff27e2e1c4acc35768b93b73c03f7630027f04

      SHA256

      f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde

      SHA512

      5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

    • \Program Files (x86)\LetsSee!\YTLoader.exe
      Filesize

      3.0MB

      MD5

      adc9db2753fa3daa6a8156254ba2a5f1

      SHA1

      50ff27e2e1c4acc35768b93b73c03f7630027f04

      SHA256

      f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde

      SHA512

      5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

    • \Program Files (x86)\LetsSee!\YTLoader.exe
      Filesize

      3.0MB

      MD5

      adc9db2753fa3daa6a8156254ba2a5f1

      SHA1

      50ff27e2e1c4acc35768b93b73c03f7630027f04

      SHA256

      f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde

      SHA512

      5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

    • \Program Files (x86)\LetsSee!\YTLoader.exe
      Filesize

      3.0MB

      MD5

      adc9db2753fa3daa6a8156254ba2a5f1

      SHA1

      50ff27e2e1c4acc35768b93b73c03f7630027f04

      SHA256

      f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde

      SHA512

      5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

    • \Program Files (x86)\LetsSee!\YTLoader.exe
      Filesize

      3.0MB

      MD5

      adc9db2753fa3daa6a8156254ba2a5f1

      SHA1

      50ff27e2e1c4acc35768b93b73c03f7630027f04

      SHA256

      f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde

      SHA512

      5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

    • \Program Files (x86)\LetsSee!\YTLoader.exe
      Filesize

      3.0MB

      MD5

      adc9db2753fa3daa6a8156254ba2a5f1

      SHA1

      50ff27e2e1c4acc35768b93b73c03f7630027f04

      SHA256

      f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde

      SHA512

      5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

    • \Program Files (x86)\LetsSee!\busshost.exe
      Filesize

      914KB

      MD5

      658e674811ebff49dd8ff5b2e5fc03d3

      SHA1

      fe08e682ea246fb054afa1d5b4c81276d39b77a1

      SHA256

      e929aba5f2630f537cc5c9d4067556aa426d9974ee48722de5b0217e16aeb3ed

      SHA512

      30e09260bc878487c19f7b539603b11eeb4132786485077ddda84a423b8445a5971ac7bde761a4c9464b218fa058442d27f5f740ee8c8660f88273aa12e8b2e7

    • \Program Files (x86)\LetsSee!\busshost.exe
      Filesize

      914KB

      MD5

      658e674811ebff49dd8ff5b2e5fc03d3

      SHA1

      fe08e682ea246fb054afa1d5b4c81276d39b77a1

      SHA256

      e929aba5f2630f537cc5c9d4067556aa426d9974ee48722de5b0217e16aeb3ed

      SHA512

      30e09260bc878487c19f7b539603b11eeb4132786485077ddda84a423b8445a5971ac7bde761a4c9464b218fa058442d27f5f740ee8c8660f88273aa12e8b2e7

    • \Program Files (x86)\LetsSee!\conf.exe
      Filesize

      1.3MB

      MD5

      6aa46c5f2770d99294bbb45dfb79bf22

      SHA1

      06b16891d85dba6f5e761bf1c82f10cf54438495

      SHA256

      3a81ec0e539c4f9ad5bbc7c31ec3996f88ca97f234fe0cf7a36d64fa645002ad

      SHA512

      7f1ca4dd1ea15435950170e16c103761cc71ad38bf1075e2696aa3e2bae1a1668f7d107c3e4a24407631153351605397ff11ce6a057d9bb752c9af56b852c515

    • \Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\.exe
      Filesize

      1.3MB

      MD5

      6aa46c5f2770d99294bbb45dfb79bf22

      SHA1

      06b16891d85dba6f5e761bf1c82f10cf54438495

      SHA256

      3a81ec0e539c4f9ad5bbc7c31ec3996f88ca97f234fe0cf7a36d64fa645002ad

      SHA512

      7f1ca4dd1ea15435950170e16c103761cc71ad38bf1075e2696aa3e2bae1a1668f7d107c3e4a24407631153351605397ff11ce6a057d9bb752c9af56b852c515

    • \Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\7ZipArchiver\attachmentphoto.exe
      Filesize

      1.3MB

      MD5

      6aa46c5f2770d99294bbb45dfb79bf22

      SHA1

      06b16891d85dba6f5e761bf1c82f10cf54438495

      SHA256

      3a81ec0e539c4f9ad5bbc7c31ec3996f88ca97f234fe0cf7a36d64fa645002ad

      SHA512

      7f1ca4dd1ea15435950170e16c103761cc71ad38bf1075e2696aa3e2bae1a1668f7d107c3e4a24407631153351605397ff11ce6a057d9bb752c9af56b852c515

    • memory/364-94-0x0000000000000000-mapping.dmp
    • memory/560-108-0x0000000000000000-mapping.dmp
    • memory/624-75-0x0000000001C60000-0x0000000001D60000-memory.dmp
      Filesize

      1024KB

    • memory/624-57-0x0000000000000000-mapping.dmp
    • memory/624-128-0x0000000001C60000-0x0000000001D60000-memory.dmp
      Filesize

      1024KB

    • memory/624-129-0x0000000000400000-0x0000000000538000-memory.dmp
      Filesize

      1.2MB

    • memory/624-76-0x0000000000400000-0x0000000000538000-memory.dmp
      Filesize

      1.2MB

    • memory/872-119-0x0000000001DE0000-0x0000000001EA5000-memory.dmp
      Filesize

      788KB

    • memory/872-114-0x0000000000000000-mapping.dmp
    • memory/872-126-0x0000000001DE0000-0x0000000001E74000-memory.dmp
      Filesize

      592KB

    • memory/872-127-0x0000000000400000-0x0000000000595000-memory.dmp
      Filesize

      1.6MB

    • memory/872-136-0x0000000000400000-0x0000000000595000-memory.dmp
      Filesize

      1.6MB

    • memory/908-125-0x0000000000000000-mapping.dmp
    • memory/952-106-0x0000000000000000-mapping.dmp
    • memory/1076-96-0x0000000000000000-mapping.dmp
    • memory/1076-124-0x0000000000000000-mapping.dmp
    • memory/1140-54-0x0000000074D61000-0x0000000074D63000-memory.dmp
      Filesize

      8KB

    • memory/1180-95-0x0000000000400000-0x0000000000595000-memory.dmp
      Filesize

      1.6MB

    • memory/1180-122-0x0000000000000000-mapping.dmp
    • memory/1180-63-0x0000000000000000-mapping.dmp
    • memory/1180-71-0x0000000001DC0000-0x0000000001E85000-memory.dmp
      Filesize

      788KB

    • memory/1180-77-0x0000000001DC0000-0x0000000001E54000-memory.dmp
      Filesize

      592KB

    • memory/1180-78-0x0000000000400000-0x0000000000595000-memory.dmp
      Filesize

      1.6MB

    • memory/1216-80-0x00000000007C0000-0x00000000007CA000-memory.dmp
      Filesize

      40KB

    • memory/1216-72-0x00000000051F0000-0x000000000564A000-memory.dmp
      Filesize

      4.4MB

    • memory/1216-60-0x0000000000000000-mapping.dmp
    • memory/1216-88-0x00000000008A0000-0x00000000008A8000-memory.dmp
      Filesize

      32KB

    • memory/1216-66-0x0000000000330000-0x0000000000638000-memory.dmp
      Filesize

      3.0MB

    • memory/1216-87-0x0000000000890000-0x0000000000898000-memory.dmp
      Filesize

      32KB

    • memory/1216-69-0x0000000000220000-0x000000000022A000-memory.dmp
      Filesize

      40KB

    • memory/1216-82-0x0000000000800000-0x000000000080A000-memory.dmp
      Filesize

      40KB

    • memory/1216-89-0x00000000008C0000-0x00000000008C8000-memory.dmp
      Filesize

      32KB

    • memory/1216-86-0x0000000000880000-0x0000000000888000-memory.dmp
      Filesize

      32KB

    • memory/1216-85-0x0000000000870000-0x0000000000878000-memory.dmp
      Filesize

      32KB

    • memory/1216-79-0x0000000000640000-0x0000000000650000-memory.dmp
      Filesize

      64KB

    • memory/1216-81-0x00000000007E0000-0x00000000007EA000-memory.dmp
      Filesize

      40KB

    • memory/1216-84-0x0000000000820000-0x000000000082E000-memory.dmp
      Filesize

      56KB

    • memory/1216-83-0x0000000000810000-0x0000000000818000-memory.dmp
      Filesize

      32KB

    • memory/1216-90-0x00000000008D0000-0x00000000008D8000-memory.dmp
      Filesize

      32KB

    • memory/1364-116-0x0000000000000000-mapping.dmp
    • memory/1624-112-0x0000000001EB0000-0x0000000001F44000-memory.dmp
      Filesize

      592KB

    • memory/1624-117-0x0000000000400000-0x0000000000595000-memory.dmp
      Filesize

      1.6MB

    • memory/1624-104-0x0000000000000000-mapping.dmp
    • memory/1624-113-0x0000000000400000-0x0000000000595000-memory.dmp
      Filesize

      1.6MB

    • memory/1624-109-0x0000000001EB0000-0x0000000001F75000-memory.dmp
      Filesize

      788KB

    • memory/1724-123-0x0000000000000000-mapping.dmp
    • memory/1888-118-0x0000000000000000-mapping.dmp
    • memory/1892-97-0x0000000001E00000-0x0000000001EC5000-memory.dmp
      Filesize

      788KB

    • memory/1892-92-0x0000000000000000-mapping.dmp
    • memory/1892-102-0x0000000000400000-0x0000000000595000-memory.dmp
      Filesize

      1.6MB

    • memory/1892-101-0x0000000001E00000-0x0000000001E94000-memory.dmp
      Filesize

      592KB

    • memory/1892-107-0x0000000000400000-0x0000000000595000-memory.dmp
      Filesize

      1.6MB

    • memory/1912-130-0x0000000000000000-mapping.dmp