Analysis

  • max time kernel
    303s
  • max time network
    165s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01-02-2024 04:58

General

  • Target

    c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe

  • Size

    680KB

  • MD5

    422a2d14300bd479e24d7fbb9eaf44dc

  • SHA1

    24b6005299fd8a3de98a1c5586ea7bf58e1ae528

  • SHA256

    c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6

  • SHA512

    2e60f8690eaaa047f0ef283db87ec930c12769b2581e4cf8ddeedcf8bf101ef6546e91a18bc6d674a7a8a15da032162522a1574ac4a2b29bf4e7c4af6dbd601d

  • SSDEEP

    12288:pUGSQNEnmEK1IfCivcDDLEn+ImsVXVoLz1O4DxFqSsI26CdW7/InwbFNbCnp:pYSEnmET7k3wmaYz1bP8W7xbvkp

Malware Config

Extracted

Family

djvu

C2

http://habrafa.com/test1/get.php

Attributes
  • extension

    .cdcc

  • offline_id

    LBxKKiegnAy53rpqH3Pj2j46vwldiEt9kqHSuMt1

  • payload_url

    http://brusuax.com/dl/build2.exe

    http://habrafa.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-iVcrVFVRqu Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0846ASdw

rsa_pubkey.plain

Extracted

Family

vidar

Version

7.6

Botnet

1b9d7ec5a25ab9d78c31777a0016a097

C2

https://t.me/tvrugrats

https://steamcommunity.com/profiles/76561199627279110

Attributes
  • profile_id_v2

    1b9d7ec5a25ab9d78c31777a0016a097

Signatures

  • Detect Vidar Stealer 5 IoCs
  • Detected Djvu ransomware 14 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 11 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe
    "C:\Users\Admin\AppData\Local\Temp\c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1280
    • C:\Users\Admin\AppData\Local\Temp\c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe
      "C:\Users\Admin\AppData\Local\Temp\c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2200
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\7b44613e-bc08-4ad8-8340-ba266b68f9d4" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:2600
      • C:\Users\Admin\AppData\Local\Temp\c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe
        "C:\Users\Admin\AppData\Local\Temp\c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2528
        • C:\Users\Admin\AppData\Local\Temp\c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe
          "C:\Users\Admin\AppData\Local\Temp\c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2520
          • C:\Users\Admin\AppData\Local\b885e183-b0ff-4d1a-9b9b-f9bc1818c474\build2.exe
            "C:\Users\Admin\AppData\Local\b885e183-b0ff-4d1a-9b9b-f9bc1818c474\build2.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2056
            • C:\Users\Admin\AppData\Local\b885e183-b0ff-4d1a-9b9b-f9bc1818c474\build2.exe
              "C:\Users\Admin\AppData\Local\b885e183-b0ff-4d1a-9b9b-f9bc1818c474\build2.exe"
              6⤵
              • Executes dropped EXE
              • Modifies system certificate store
              • Suspicious use of WriteProcessMemory
              PID:536
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 536 -s 1456
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2700
          • C:\Users\Admin\AppData\Local\b885e183-b0ff-4d1a-9b9b-f9bc1818c474\build3.exe
            "C:\Users\Admin\AppData\Local\b885e183-b0ff-4d1a-9b9b-f9bc1818c474\build3.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1676
            • C:\Users\Admin\AppData\Local\b885e183-b0ff-4d1a-9b9b-f9bc1818c474\build3.exe
              "C:\Users\Admin\AppData\Local\b885e183-b0ff-4d1a-9b9b-f9bc1818c474\build3.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2828
              • C:\Windows\SysWOW64\schtasks.exe
                /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                7⤵
                • Creates scheduled task(s)
                PID:3068
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {703B81F3-450C-4CCF-B02F-A04BAE671011} S-1-5-21-3308111660-3636268597-2291490419-1000:JUBFGPHD\Admin:Interactive:[1]
    1⤵
      PID:320
      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:840
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          3⤵
          • Executes dropped EXE
          PID:2796
          • C:\Windows\SysWOW64\schtasks.exe
            /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
            4⤵
            • Creates scheduled task(s)
            PID:268
      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:944
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          3⤵
          • Executes dropped EXE
          PID:300
      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:968
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          3⤵
          • Executes dropped EXE
          PID:1812
      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:2732
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          3⤵
          • Executes dropped EXE
          PID:2020
      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        2⤵
        • Executes dropped EXE
        PID:1520

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Scheduled Task/Job

    1
    T1053

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Scheduled Task/Job

    1
    T1053

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Scheduled Task/Job

    1
    T1053

    Defense Evasion

    File and Directory Permissions Modification

    1
    T1222

    Modify Registry

    2
    T1112

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
      Filesize

      1KB

      MD5

      8112ab2a9d7578692e66734917d00015

      SHA1

      5dc1f7cb2c66c925d195fb98784917d108a001dd

      SHA256

      919561b1927726f5218e79f21184c4bf7117db4466686fc93d3d5dbc1380033b

      SHA512

      538f1f36b44d628d2ade163cc40deb58b50cb7fbd56019d9526c8233c30771db8542ed5786d311322dfd2e9d44e979da9513c4a0bbc7416b47bb7beca90013d1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
      Filesize

      724B

      MD5

      8202a1cd02e7d69597995cabbe881a12

      SHA1

      8858d9d934b7aa9330ee73de6c476acf19929ff6

      SHA256

      58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

      SHA512

      97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
      Filesize

      410B

      MD5

      8e941f05eb953f89f05f54dd6142ba9a

      SHA1

      e00ccee35a264f7d30e2eb978414495fc99f9675

      SHA256

      1d763ebebdf72c37ff90ffa268e66a93c8ef08b1f9215a32650123534b542ab1

      SHA512

      fdbe3abc3704a9cde66c3c290d51d191396a11a16a9681e1f1c4677ec4bea1cc347c86b81e5c191d2a9cedb3c28b7021234eb9dc65263c2694c645a0e258da5e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      138c10e10b200018183a04497430f8ec

      SHA1

      e3132edb34bd0c8ad39c43b9aba010ab94829021

      SHA256

      94231c3fc72326e2b0bf6a826d09afb7add7c7bfa85d0dcc5598e849567c5e54

      SHA512

      52960981bf0494f5550de189968551901fdcc72628fe7139995c3b2f6f8ca69e726f4d0d9d8a8ec2d340cf50374a50d14bccb5c12fc2a96194a376d7b5b92019

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      21b8b880012b4d88c5515f2283e3ce2f

      SHA1

      3d45ccec98f13ebe09f01cbac8679150425ecb7a

      SHA256

      00a06ab10678708f3004f1c7df44a2eed24e432d19ea50002da9895216fe81e8

      SHA512

      4fedcb020a4e39e6086f634b80bbf45e276c54ef6ee32cf7c7ac605f8729022b3eb38b04ada9baabeb3777f790c5c4d34c49a1372105bf2700bedb05aa4630aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
      Filesize

      392B

      MD5

      7736f0b4a99fc9c2a38cde7e36232135

      SHA1

      db1d039315ff773e4deb8f7a386ce1d876d8e4ea

      SHA256

      adcd9322496ed6480b5f1726abced9ed25aa3c97518f24eeadcefc6771dd8980

      SHA512

      a4d691ada8aa98c396d2a530745b318b831c14b8574c8b1c3604feb2fed9f3cbfbaa653e3de8ab3f6586ef38b7978a43e50a9c3d20436b09fbd22a1f41a1103d

    • C:\Users\Admin\AppData\Local\7b44613e-bc08-4ad8-8340-ba266b68f9d4\c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe
      Filesize

      680KB

      MD5

      422a2d14300bd479e24d7fbb9eaf44dc

      SHA1

      24b6005299fd8a3de98a1c5586ea7bf58e1ae528

      SHA256

      c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6

      SHA512

      2e60f8690eaaa047f0ef283db87ec930c12769b2581e4cf8ddeedcf8bf101ef6546e91a18bc6d674a7a8a15da032162522a1574ac4a2b29bf4e7c4af6dbd601d

    • C:\Users\Admin\AppData\Local\Temp\Cab8BEB.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\TarB211.tmp
      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\AppData\Local\b885e183-b0ff-4d1a-9b9b-f9bc1818c474\build2.exe
      Filesize

      219KB

      MD5

      fa0bb73dddce292ebd3a3acb805ba77b

      SHA1

      31039948e6fcb98d12b78520bd42278c77e74744

      SHA256

      d24fde9c3dd6a0070987a2f1ed1393fc1d6a27c7a7338d8674fe59d82adcd0ef

      SHA512

      bee59374d0d27477c438a9185963012976857446625dc167ba5c18e6ac522c12200cd94060ef0c7622a1de2222ca84eaf329b75d2966626c6bf21aa2c6c8bf9f

    • C:\Users\Admin\AppData\Local\b885e183-b0ff-4d1a-9b9b-f9bc1818c474\build2.exe
      Filesize

      202KB

      MD5

      f9e5060799a017b05e2825f4c61f278b

      SHA1

      da3c0a34f2a88982f809886f6235155940a4c7d5

      SHA256

      8b865b86276d308e41acf8171f14b7da87ce2f7cde24fe4c5b54d96a9d228dfd

      SHA512

      4eb5943d6454c02ab5587788c254994a419c9f59a300a48b28489e7e166e212dca9adf8cc880b5f20ceb3ff78557e7fcecd6a7038de17d866f297bffe760f894

    • C:\Users\Admin\AppData\Local\b885e183-b0ff-4d1a-9b9b-f9bc1818c474\build2.exe
      Filesize

      201KB

      MD5

      c63b12e02fbebb39dea4bbac49a35ad3

      SHA1

      7e60df7195c15b84cfc065a917ae0c4c82866601

      SHA256

      c785569a2fcf0e8c17bd7535e0d0c7d731a7055d7d4ea23a752fd1fa0d5f1eb8

      SHA512

      6aab46953c676f958100b4adb3002966493f3df46fa64d1a1224c854cd6e1f6c3f2921e6c8a6f47182fd6eaf89079f9a7d8a09204e8910dfd88b1232239f23cc

    • C:\Users\Admin\AppData\Local\b885e183-b0ff-4d1a-9b9b-f9bc1818c474\build3.exe
      Filesize

      64KB

      MD5

      8b6a819c6926597dfa7529b692d7a6cc

      SHA1

      50c535e9cca464afd3a589d2231d87ce417d4312

      SHA256

      b9cb5501cc2d257e049e1757062523c7f9ee5a85d57d46538fe492125befd26c

      SHA512

      dfd28b270d99ad89f8ce1df9750b92ff558f73fe2448bf182b5c1c05c7b180bb29175eeaf5a7c918791d64b36167fc1a6044f1aaff838e02e878782f5f6c0ba9

    • C:\Users\Admin\AppData\Local\b885e183-b0ff-4d1a-9b9b-f9bc1818c474\build3.exe
      Filesize

      19KB

      MD5

      c61c82f968b03f1edb0886efcc3c57bf

      SHA1

      41b0480e1e0182da72a848ec9430fb49e0ae3d2e

      SHA256

      0eb48334567323a7f79bcf60b91acb1c507cfc508dcbc501a354df2763e7ed7e

      SHA512

      a8a4bf21477608380432f301a15ac5babeeb676180b6397e9f04a5beaed39789f930c986ab614b9b42f5c1595176f2edf20123124e96c92a9d4db9ad5beaa24f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      Filesize

      128KB

      MD5

      53bc6c328281928e94ac312f63f13f05

      SHA1

      d49275ca0cd7f367733a365323b466ad588e5ce0

      SHA256

      7278f0c920ff8dad67e62751745e858817abb1c5b461414162311e57eb833e7c

      SHA512

      48e55739728038066eeb2fca5c20e5c6c25587860b2ac7f021218e66fe7c77894c09e0301c4ceb78b72ebc19d85203d8bd66e8c15a1e1aed9eee58c6d465fb77

    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      Filesize

      131KB

      MD5

      5766479333e897378690c348b283b806

      SHA1

      84498e905309908750fbd2cbe976a8e722cbc80a

      SHA256

      8bf311a065f245c41ed8a4946308c9bee253975bb5b3cdc28fc9381ee8cb2a5e

      SHA512

      1d3a7764a1042c4b10cd8649e3c2973e04f1a749aff3a94672740cc91bf1332064a8acf315bcadef54372ac667f6a6ebbb681b2bd1d5010ba2d8080f76d81d3d

    • \Users\Admin\AppData\Local\b885e183-b0ff-4d1a-9b9b-f9bc1818c474\build2.exe
      Filesize

      385KB

      MD5

      63e4a9cd7a8b37335b5f18cefc5dd9d2

      SHA1

      c781a30935afc452b108cc78724b60f389b78874

      SHA256

      c1e75efde3fd1da605135e5c3ffab0073299c80632d136f8eeba9d4a7c98c70f

      SHA512

      3818b5966938704c5830acb5426db7791f6ae476853248d8984b1aff35a6722a0684bea54a53ef6ded1f301f6de9ed044d45f007457a9c0f3a7ea3afc7bf0ecc

    • \Users\Admin\AppData\Local\b885e183-b0ff-4d1a-9b9b-f9bc1818c474\build3.exe
      Filesize

      299KB

      MD5

      41b883a061c95e9b9cb17d4ca50de770

      SHA1

      1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

      SHA256

      fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

      SHA512

      cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

    • \Users\Admin\AppData\Local\b885e183-b0ff-4d1a-9b9b-f9bc1818c474\build3.exe
      Filesize

      256KB

      MD5

      164bc11a628ff1722c833c8e2642aca5

      SHA1

      56d2d17695a85b876b736933a7f1cd5cf2acfdb1

      SHA256

      e76e2fa66070991fff3747fd12185ec795651b8506f290a3f1214b0eab40d330

      SHA512

      099d1715e47a2c4ea346b432f186ffb6fcd94f9ec6b28ffcf5047a57b686a0135e765db75150ac14420cb9285fb02c8d390751b239a2a9446219da587a89ce9b

    • memory/536-167-0x0000000000400000-0x0000000000643000-memory.dmp
      Filesize

      2.3MB

    • memory/536-166-0x0000000000400000-0x0000000000643000-memory.dmp
      Filesize

      2.3MB

    • memory/536-317-0x0000000000400000-0x0000000000643000-memory.dmp
      Filesize

      2.3MB

    • memory/536-163-0x0000000000400000-0x0000000000643000-memory.dmp
      Filesize

      2.3MB

    • memory/536-160-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/840-326-0x0000000000250000-0x0000000000350000-memory.dmp
      Filesize

      1024KB

    • memory/944-358-0x0000000000952000-0x0000000000962000-memory.dmp
      Filesize

      64KB

    • memory/968-383-0x00000000008B0000-0x00000000009B0000-memory.dmp
      Filesize

      1024KB

    • memory/1280-2-0x00000000045A0000-0x00000000046BB000-memory.dmp
      Filesize

      1.1MB

    • memory/1280-0-0x0000000000310000-0x00000000003A2000-memory.dmp
      Filesize

      584KB

    • memory/1280-7-0x0000000000310000-0x00000000003A2000-memory.dmp
      Filesize

      584KB

    • memory/1280-1-0x0000000000310000-0x00000000003A2000-memory.dmp
      Filesize

      584KB

    • memory/1676-299-0x0000000000980000-0x0000000000A80000-memory.dmp
      Filesize

      1024KB

    • memory/1676-300-0x0000000000220000-0x0000000000224000-memory.dmp
      Filesize

      16KB

    • memory/2056-162-0x0000000000230000-0x0000000000260000-memory.dmp
      Filesize

      192KB

    • memory/2056-159-0x0000000000540000-0x0000000000640000-memory.dmp
      Filesize

      1024KB

    • memory/2200-8-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2200-5-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2200-3-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/2200-9-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2200-27-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2520-144-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2520-141-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2520-260-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2520-40-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2520-150-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2520-136-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2520-137-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2520-143-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2520-123-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2528-28-0x0000000002B90000-0x0000000002C22000-memory.dmp
      Filesize

      584KB

    • memory/2528-39-0x0000000002B90000-0x0000000002C22000-memory.dmp
      Filesize

      584KB

    • memory/2732-414-0x00000000002B2000-0x00000000002C2000-memory.dmp
      Filesize

      64KB

    • memory/2828-307-0x0000000000400000-0x0000000000406000-memory.dmp
      Filesize

      24KB

    • memory/2828-305-0x0000000000400000-0x0000000000406000-memory.dmp
      Filesize

      24KB

    • memory/2828-302-0x0000000000400000-0x0000000000406000-memory.dmp
      Filesize

      24KB