Analysis

  • max time kernel
    105s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 21:42

General

  • Target

    67042f0de57638c97d125bf1c9897fdfa295566761fe17c80bfe05e19461a98e.exe

  • Size

    282KB

  • MD5

    80d8b1bfdaf8085595c83d95e1b50a4a

  • SHA1

    c4a9c9765d296159c0b882ee952418f4208a8f6b

  • SHA256

    67042f0de57638c97d125bf1c9897fdfa295566761fe17c80bfe05e19461a98e

  • SHA512

    e124f0303de3e4bc9519ec6d9c0fbb19bacafd4bc52aeb7ae04e0c2cf3db845a9e3d8504223da7f910453b58041913b8165aa5ebdd87e73499cbcf27e897ecbe

  • SSDEEP

    6144:KCjGhD5daDWqd+wQG5u1x5miq6gXGG07ejs0uK0HuEO:1IDH7wQkuD5GRGG0KA0uKUuEO

Malware Config

Extracted

Family

vidar

C2

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Signatures

  • Detect Vidar Stealer 14 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 14 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67042f0de57638c97d125bf1c9897fdfa295566761fe17c80bfe05e19461a98e.exe
    "C:\Users\Admin\AppData\Local\Temp\67042f0de57638c97d125bf1c9897fdfa295566761fe17c80bfe05e19461a98e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2220
      • C:\ProgramData\IEHDBAAFID.exe
        "C:\ProgramData\IEHDBAAFID.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2848
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:904
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 904 -s 256
            5⤵
            • Program crash
            PID:2772
      • C:\ProgramData\AKJKFBAFID.exe
        "C:\ProgramData\AKJKFBAFID.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2700
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          PID:2944
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminIEGCAAKFBA.exe"
            5⤵
              PID:2424
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminJKFHIIEHIE.exe"
              5⤵
                PID:2080
          • C:\ProgramData\KKKEBKJJDG.exe
            "C:\ProgramData\KKKEBKJJDG.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:592
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
                PID:1912
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                4⤵
                • System Location Discovery: System Language Discovery
                PID:1516
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\DAEBFHJKJEBF" & exit
              3⤵
                PID:1652
                • C:\Windows\SysWOW64\timeout.exe
                  timeout /t 10
                  4⤵
                  • Delays execution with timeout.exe
                  PID:2272

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\DGHIDHCAAKECGCBFIJDB

            Filesize

            6KB

            MD5

            0e0a2a5f9c98afc3dd8c5484fcd6535d

            SHA1

            6a3ca204ebf41d7ee95b34174f2ab8a1fe0b3181

            SHA256

            6223c75e566b54d15e08af23b991b900f6c094028e9f0ea5a338692898eb641c

            SHA512

            41d89b4969146b4787999d71491800f84630797e0ff89ddcb215f71c38275ab9060f81b10c609e78fd992b0e8618a3626c6afc745c3a80aadf4e1fc662d0c290

          • C:\ProgramData\JKJDAEBFCBKE\AFBAKK

            Filesize

            148KB

            MD5

            90a1d4b55edf36fa8b4cc6974ed7d4c4

            SHA1

            aba1b8d0e05421e7df5982899f626211c3c4b5c1

            SHA256

            7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

            SHA512

            ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

          • C:\ProgramData\JKJDAEBFCBKE\AFBAKK

            Filesize

            46KB

            MD5

            02d2c46697e3714e49f46b680b9a6b83

            SHA1

            84f98b56d49f01e9b6b76a4e21accf64fd319140

            SHA256

            522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

            SHA512

            60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

          • C:\ProgramData\JKJDAEBFCBKE\FCGIJK

            Filesize

            20KB

            MD5

            c9ff7748d8fcef4cf84a5501e996a641

            SHA1

            02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

            SHA256

            4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

            SHA512

            d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

          • C:\ProgramData\KKFHJJDH

            Filesize

            92KB

            MD5

            e248975fcae2fff4649630d9421bd44e

            SHA1

            283f382e83b0767a0cd6b2d54bce3c1c315c60d6

            SHA256

            2e7470ccd25b6d7e9606f29643dbda3e3a4ef3f0575b2d074986c80cf8b148d2

            SHA512

            9bd5cf49a7773811d72be905cc8dfc2310f82899553c6f598a52b5dc261fc26191462855fdba8b3a83c8a317faed71a1a134df83f338c6c9442ee792cdf7428f

          • C:\ProgramData\freebl3.dll

            Filesize

            223KB

            MD5

            5273ad745196b2280862c6fbade15480

            SHA1

            de85134352daf8516986592e1f1116b673dbd7c3

            SHA256

            548740f557478c48e360e90597e3572c04736f8c18a80102db54ab4c982a63a1

            SHA512

            d0535174d6a76fb336bcdf8102dad65fb61f9fe2c2348a09f8853282248ac195385e13796e0213d41bfa83e04da0fda37ec25221ff7989cd26d0d8de7d96e4db

          • C:\ProgramData\msvcp140.dll

            Filesize

            13KB

            MD5

            e416a22acaeff6cec5aa36a72becbede

            SHA1

            9fefce2eafd2e79ce0f0c60e2174b0052bfd0d2f

            SHA256

            edc0250d8dfe5b4049a64b6171d12ad701784f4650484d35315ab5286384e79e

            SHA512

            8ab549504e9c7f787e4ace97bcce5eed5bd9758b8cc223eae537e5ba3dc0f22ddd84802b1c43c2e947aa0a97742793b8cd09a5563ccd21820fa00bb5c1294421

          • C:\ProgramData\softokn3.dll

            Filesize

            13KB

            MD5

            16c75e764a9b70ca06fe062d5367abba

            SHA1

            b69856703cc2633f6703368ada943f2ce1e1d722

            SHA256

            3ef27598650d34ccca435d9eb54db0a0ba7c25d6325e17665d7905dfa2423f9f

            SHA512

            edd7391aea11ca27b88c84046e1e88623998f638a0ab7d978aec98e36d7d773f19acbf3c55fefa9ccdaa19adb28124c80431309d21dab2deec152ca2e356aec5

          • C:\ProgramData\vcruntime140.dll

            Filesize

            63KB

            MD5

            f5f6a51ddd9cd474116b0ac2d9b2f047

            SHA1

            4de17ba4a182b1a8f0456682fc69fd097ecd1523

            SHA256

            2aad82c388b351728ee63f4c5eab3e3761cad6bcb5fea7c43f1836d2f6bde3d7

            SHA512

            b0edaa113390a7ac69f9fcd1de1773f109bd645aa4e4e6609f555ba4a7f928b60304ab93861f1e439ab563ba461eb96c6f45914776077ab613806a5a4cb300bb

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0255CEC2C51D081EFF40366512890989_A2266F534D44FEE6BC8E990C542C69B4

            Filesize

            471B

            MD5

            a3a730aee52549b673746d0dbbc59531

            SHA1

            deb5b7d626272c1bc7b88f3476caaf1d64534972

            SHA256

            94ed1105931e5f86b887032ceb8b4f61e6f275487b7fa36220fd9ec520b82493

            SHA512

            354b4558b2a187117635e91d8d360c752c11844757be413349e5e701b1fa10294f55ea70053d49f46401bc4e7218991bde096d6c7179070963e636e3fccd3cd2

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

            Filesize

            2KB

            MD5

            ffec8069cabce0949aaee67665624e67

            SHA1

            d449a98b34103a9e80740ed9d7593c8115c3dc75

            SHA256

            340d048d7f46e25d83d97affa98d53d773e83e070b28ed67ea3472362a0a2993

            SHA512

            770d7b72772940699b4fb66ededa53a02fe580c5fcc5e050e2798e8e065c7a3505886d91d3ce05172e1d5c942069297934dd3c8c52f9e3d2be8f5d0c1ab851d3

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

            Filesize

            1KB

            MD5

            67db8c5d484fe0b60abd574b0480e4c9

            SHA1

            bafea8ad167114a72854bfe78095155bb7c44f89

            SHA256

            5d2c8933104167dece16b77357813d01c861d0c00176057ab8fe93222b51141d

            SHA512

            5d71a6271cfdcbef50f51c083f1665baaa59e7d927051ec96086bc68ceb2334227d620ee777237fccb3954ae1a1691f79d7f73335e7c95179591a1cdd0e9c844

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

            Filesize

            471B

            MD5

            35f4645a65bbee6d2b856a052ca1dbb7

            SHA1

            749ebeff180ba4554820a1e96c03bf4537729e0e

            SHA256

            3f1d823e5a04b742f7eb127a87e99aaeba4342c7d899d4ec8f719ab9ae10c989

            SHA512

            74543df0b14a18766d001cf1752f416dae69ee25d16e87f49f91ed5528a418176d89a648edbc555d1fa127126cbc258fb1d9aaf652e9944cb20853c9bf9abf7b

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0255CEC2C51D081EFF40366512890989_A2266F534D44FEE6BC8E990C542C69B4

            Filesize

            490B

            MD5

            a296a368f97297543b78d07325f86bc8

            SHA1

            b82b3bc038d3185884f20f92a68c6df846d4a8a1

            SHA256

            9a86786cb00bbedd6b34556acf2a72a92f8783321aef896005b8b61fefaef0f9

            SHA512

            529ef947298e666c3670584d7efc36617f9f93369a7c2ff2ee277737a394e2fa0b7f8618c108fb678839817972635005c2a03102996c80c4d0acbeeb84608a2a

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

            Filesize

            482B

            MD5

            6f961d5ad09bd1fa872a8dc334853f93

            SHA1

            0b28173ade41a34fa6fa2499d70d23e103988fd3

            SHA256

            5e3de2acb186cd4b1faa713ac04ddb3f7ce11a45a0a809d64bfe11a817f21387

            SHA512

            6e6b7c5dbd34cd184d66e9af07d9634c9a764d448f54b3a05c0f61495fe4e6ee0f85bb217fa56ec2010f95d22f17a48b4fab4c212dc62fd8062d4358fa867253

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            8e8bbc5501962b7739e5c0b8f6bec0fe

            SHA1

            a3a0eadd7a2bb9d96ae80f40827a40df073d2080

            SHA256

            062a48056c9f47943d5cf96a7848ab4ea21bf854f6b8f970298e3a82eafaed62

            SHA512

            f0f3d9de4997487ac0fc30ac74f787956102a71d1fbf16f981e73f882b4b2be3b0911462b48dbfd78d3def5a80141f0978afc89b1bd68da9b40d51e07c5d6ef3

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            b9072f4c7a774ce4d6e8a0302517a902

            SHA1

            f346435b827de665619614e003ea5cf7d8445174

            SHA256

            ab8b1648fe7619063466c5bc7672ae6f613a38b2b96d5dbe6de41f64e04eef9d

            SHA512

            01dae48b13834aa8d1dbe25d38d91fdd5522dd146d3312b733d86665ec7cb56752930133e5ca3b0fc319dc834923efea90722f599f52a5da1b6b475d00245beb

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

            Filesize

            486B

            MD5

            3497fbe8dc93b6d12b93016579fd8056

            SHA1

            dc39f9b219fe54e1e36a5eef8bcbbcf57033ca44

            SHA256

            be3e81f29c49bbb35e75a7c4f94b1c2bb9ca975d3c44b0d09c64bdfa4c1f3d5e

            SHA512

            02ba3918cb843fe8df46b94f42622452dc820f5f2e1ca028789599f50df8cc259cadc5ca8ce2be822822fa77ae8b02a71f8315fcc653127798d53f9bcdd158bc

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

            Filesize

            400B

            MD5

            fc496592b294eb6eeb9d2db07cbd00f7

            SHA1

            470e73a59ddbec9a431a5b95649d4de287352000

            SHA256

            0a1a5c5760f4d5239c2199acb9e6e9a0424f4cd0e6df9def0c96d5fee51e4fbc

            SHA512

            9283d950dd35ffd613273ca79b6c6ee4f99257bd6cc3757deff73508e914e49509f15a09e8596b3934cd2675ad881f415a66f9f8a43407518fc2c9fcff680984

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\56KJ964X\76561199768374681[1].htm

            Filesize

            33KB

            MD5

            5fde3c62d71a0adba982233b94535a30

            SHA1

            2dbc9a2749881e9053ec8ad2ff98af7ce94f12b1

            SHA256

            ec53ee1e0b13bc683a5881920b3db28d3f822f76d92c7e537108d662693ba1c5

            SHA512

            2d653d742981346337cd57910eaaa4767c1f0a92543fc360cd519d8b5543ed041e106b1da0139680704b647195bfdb40048d404a52eb37b0c11d6bfb672f780a

          • C:\Users\Admin\AppData\Local\Temp\CabB176.tmp

            Filesize

            70KB

            MD5

            49aebf8cbd62d92ac215b2923fb1b9f5

            SHA1

            1723be06719828dda65ad804298d0431f6aff976

            SHA256

            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

            SHA512

            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

          • C:\Users\Admin\AppData\Local\Temp\TarB1E6.tmp

            Filesize

            181KB

            MD5

            4ea6026cf93ec6338144661bf1202cd1

            SHA1

            a1dec9044f750ad887935a01430bf49322fbdcb7

            SHA256

            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

            SHA512

            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

          • \ProgramData\AKJKFBAFID.exe

            Filesize

            205KB

            MD5

            003978c8812e39ddb74bf9d5005cb028

            SHA1

            126f73c30469a1b7e9a04a670c35185b5df628bc

            SHA256

            06510b52e07e89b5781f4ee3c7b4d94ff84c03931b3d7d93224294860feaccf4

            SHA512

            7c0b7ec7dfe18f99cf850c80c3228f52537d5565b2950d4f0ef8cbbb7b19d1f5e2d128f3766dcede41711b4d3c5631c7f758dd61697b1e5978d596f98f54c31d

          • \ProgramData\IEHDBAAFID.exe

            Filesize

            321KB

            MD5

            c54262d9605b19cd8d417ad7bc075c11

            SHA1

            4c99d7bf05ac22bed6007ea3db6104f2472601fd

            SHA256

            de3f08aad971888269c60afcf81dc61f2158ca08cd32c9f5dd400e07d1517b54

            SHA512

            9c3086190bcb6ac9dd1ce22e69cfaf814d4acb60140fbe9e0cb220216d068d17151cb79f8acf89567c9a7b93960479ce19ea7b86020d939f56d6fc24e4d29a3f

          • \ProgramData\KKKEBKJJDG.exe

            Filesize

            282KB

            MD5

            5dd74b81e1e9f3ab155e1603a2fa793b

            SHA1

            653cdaf8617c7fdec6f39db3334e858bec9a2d66

            SHA256

            5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26

            SHA512

            9017f6797f998423e3cd88dcf1086f6e555797a9e6414ffd714dcb394cfd3f2b2fb5432c9ba38792021b5ba9e421454385f509c9363cedb7d3ac5919f66035fa

          • \ProgramData\mozglue.dll

            Filesize

            593KB

            MD5

            c8fd9be83bc728cc04beffafc2907fe9

            SHA1

            95ab9f701e0024cedfbd312bcfe4e726744c4f2e

            SHA256

            ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

            SHA512

            fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

          • \ProgramData\nss3.dll

            Filesize

            2.0MB

            MD5

            1cc453cdf74f31e4d913ff9c10acdde2

            SHA1

            6e85eae544d6e965f15fa5c39700fa7202f3aafe

            SHA256

            ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

            SHA512

            dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

          • memory/592-685-0x0000000000DA0000-0x0000000000DEA000-memory.dmp

            Filesize

            296KB

          • memory/904-557-0x0000000000400000-0x0000000000458000-memory.dmp

            Filesize

            352KB

          • memory/904-567-0x0000000000400000-0x0000000000458000-memory.dmp

            Filesize

            352KB

          • memory/904-565-0x0000000000400000-0x0000000000458000-memory.dmp

            Filesize

            352KB

          • memory/904-563-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/904-562-0x0000000000400000-0x0000000000458000-memory.dmp

            Filesize

            352KB

          • memory/904-560-0x0000000000400000-0x0000000000458000-memory.dmp

            Filesize

            352KB

          • memory/904-558-0x0000000000400000-0x0000000000458000-memory.dmp

            Filesize

            352KB

          • memory/904-556-0x0000000000400000-0x0000000000458000-memory.dmp

            Filesize

            352KB

          • memory/2068-21-0x00000000748C0000-0x0000000074FAE000-memory.dmp

            Filesize

            6.9MB

          • memory/2068-0-0x00000000748CE000-0x00000000748CF000-memory.dmp

            Filesize

            4KB

          • memory/2068-1-0x00000000008A0000-0x00000000008EA000-memory.dmp

            Filesize

            296KB

          • memory/2068-14-0x00000000748C0000-0x0000000074FAE000-memory.dmp

            Filesize

            6.9MB

          • memory/2220-12-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/2220-198-0x0000000017770000-0x00000000179CF000-memory.dmp

            Filesize

            2.4MB

          • memory/2220-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/2220-4-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/2220-7-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/2220-8-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/2220-9-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/2220-16-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/2220-18-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/2220-444-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/2220-6-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/2220-425-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/2220-397-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/2220-363-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/2220-247-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/2220-213-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/2220-5-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/2220-160-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/2220-197-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/2700-615-0x0000000001050000-0x0000000001088000-memory.dmp

            Filesize

            224KB

          • memory/2848-762-0x00000000730F0000-0x00000000737DE000-memory.dmp

            Filesize

            6.9MB

          • memory/2848-570-0x00000000730F0000-0x00000000737DE000-memory.dmp

            Filesize

            6.9MB

          • memory/2848-551-0x0000000000A90000-0x0000000000AE4000-memory.dmp

            Filesize

            336KB

          • memory/2848-552-0x00000000730FE000-0x00000000730FF000-memory.dmp

            Filesize

            4KB

          • memory/2944-618-0x0000000000400000-0x0000000000643000-memory.dmp

            Filesize

            2.3MB

          • memory/2944-630-0x0000000000400000-0x0000000000643000-memory.dmp

            Filesize

            2.3MB

          • memory/2944-622-0x0000000000400000-0x0000000000643000-memory.dmp

            Filesize

            2.3MB

          • memory/2944-624-0x0000000000400000-0x0000000000643000-memory.dmp

            Filesize

            2.3MB

          • memory/2944-626-0x0000000000400000-0x0000000000643000-memory.dmp

            Filesize

            2.3MB

          • memory/2944-633-0x0000000000400000-0x0000000000643000-memory.dmp

            Filesize

            2.3MB

          • memory/2944-620-0x0000000000400000-0x0000000000643000-memory.dmp

            Filesize

            2.3MB

          • memory/2944-629-0x0000000000400000-0x0000000000643000-memory.dmp

            Filesize

            2.3MB

          • memory/2944-667-0x0000000061E00000-0x0000000061EF3000-memory.dmp

            Filesize

            972KB