Analysis

  • max time kernel
    127s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-09-2024 19:25

General

  • Target

    file.exe

  • Size

    282KB

  • MD5

    6a6554a97cabd9a8c53fd82631dabc4d

  • SHA1

    0b3c17ed215157d1c5a9d93bb27d00b81c52c4f1

  • SHA256

    1de1d42113064dace922eed0089dd22a9c83f1d03040f9b1e787145603ab02b2

  • SHA512

    31198a4aa9df63777b3e9db8b2e9d78ae50f87cd0ad055c388331fc47338107a46f363ccc34e67e73cebc505b05418d285ca889f0ae91cb4a7d7b67ba86ed084

  • SSDEEP

    6144:T4uGqsk9IG4IshEvObSgEG/3EkAfG2eU5uG7EO:kC9DTvNgf/3rAfTeouIEO

Malware Config

Extracted

Family

vidar

C2

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Signatures

  • Detect Vidar Stealer 18 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1844
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Checks computer location settings
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4792
      • C:\ProgramData\AKECBFBAEB.exe
        "C:\ProgramData\AKECBFBAEB.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2252
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2104
      • C:\ProgramData\KEHJKJDGCG.exe
        "C:\ProgramData\KEHJKJDGCG.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2868
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
            PID:816
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
              PID:872
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
              • Checks computer location settings
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:5032
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminBGIJDGCAEB.exe"
                5⤵
                • System Location Discovery: System Language Discovery
                PID:4444
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminHDAAAAFIIJ.exe"
                5⤵
                • System Location Discovery: System Language Discovery
                PID:4772
          • C:\ProgramData\GIEHJDHCBA.exe
            "C:\ProgramData\GIEHJDHCBA.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3384
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
                PID:3772
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                4⤵
                • System Location Discovery: System Language Discovery
                PID:1096
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\FIJECAEHJJJK" & exit
              3⤵
                PID:1168
                • C:\Windows\SysWOW64\timeout.exe
                  timeout /t 10
                  4⤵
                  • Delays execution with timeout.exe
                  PID:4212

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\AKECBFBAEB.exe

            Filesize

            321KB

            MD5

            c54262d9605b19cd8d417ad7bc075c11

            SHA1

            4c99d7bf05ac22bed6007ea3db6104f2472601fd

            SHA256

            de3f08aad971888269c60afcf81dc61f2158ca08cd32c9f5dd400e07d1517b54

            SHA512

            9c3086190bcb6ac9dd1ce22e69cfaf814d4acb60140fbe9e0cb220216d068d17151cb79f8acf89567c9a7b93960479ce19ea7b86020d939f56d6fc24e4d29a3f

          • C:\ProgramData\FBKJKEHI

            Filesize

            116KB

            MD5

            f70aa3fa04f0536280f872ad17973c3d

            SHA1

            50a7b889329a92de1b272d0ecf5fce87395d3123

            SHA256

            8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

            SHA512

            30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

          • C:\ProgramData\GIEHJDHCBA.exe

            Filesize

            282KB

            MD5

            5dd74b81e1e9f3ab155e1603a2fa793b

            SHA1

            653cdaf8617c7fdec6f39db3334e858bec9a2d66

            SHA256

            5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26

            SHA512

            9017f6797f998423e3cd88dcf1086f6e555797a9e6414ffd714dcb394cfd3f2b2fb5432c9ba38792021b5ba9e421454385f509c9363cedb7d3ac5919f66035fa

          • C:\ProgramData\HJEHIJEB

            Filesize

            114KB

            MD5

            3cfabadfcb05a77b204fe1a6b09a5c90

            SHA1

            f106b5ed22265e64bc61dc5cf1e2d33ed12ec18d

            SHA256

            693617c470d7472e751d872341061cfb663f22ee95bdb42f9db01f02cb90df9c

            SHA512

            d5502023a17213919e2e991f5ba2d0d2c08223fd489d876a47a37239b637d03ace9cb9b92deb71460ae4030194ca49ce9e9752e0bf2ccbcd297dc5afe62a4e7b

          • C:\ProgramData\JEBKECAFIDAFIECBKEHD

            Filesize

            11KB

            MD5

            72e86dbdd1803a2861b62cd5e0af3d68

            SHA1

            74e6988ab99610c223fce523d94d71743532623c

            SHA256

            8e0f753634813abbe5d3997622766ab7c3ae9837a1b71febe12f2fc6a7c7bc44

            SHA512

            16430023a67d497871210274dc60238b63fcb2dd455c33126ce6e3281e6c8497de4e9a589c13bdda756e481171a5a422bd49aaca9978e627d5b0cf798a7dabfd

          • C:\ProgramData\KEHJKJDGCG.exe

            Filesize

            205KB

            MD5

            003978c8812e39ddb74bf9d5005cb028

            SHA1

            126f73c30469a1b7e9a04a670c35185b5df628bc

            SHA256

            06510b52e07e89b5781f4ee3c7b4d94ff84c03931b3d7d93224294860feaccf4

            SHA512

            7c0b7ec7dfe18f99cf850c80c3228f52537d5565b2950d4f0ef8cbbb7b19d1f5e2d128f3766dcede41711b4d3c5631c7f758dd61697b1e5978d596f98f54c31d

          • C:\ProgramData\freebl3.dll

            Filesize

            121KB

            MD5

            42241612e237c80ac44058a17964ce92

            SHA1

            423aeffa85207a12bb71473df8bdfed4f36ff0d0

            SHA256

            723cdcc3c1611ad392a70076a460790aefcabccdeba4059760060d396b6bea54

            SHA512

            2d9f8e02f070202bcbe664e7dc9753bbcdce16d47d625167d21e4d39fa3e25ffb6d165182c899d21b8fb90b6d18e4c333deee408e0ff57419f4a2b4ae1f30be6

          • C:\ProgramData\mozglue.dll

            Filesize

            593KB

            MD5

            c8fd9be83bc728cc04beffafc2907fe9

            SHA1

            95ab9f701e0024cedfbd312bcfe4e726744c4f2e

            SHA256

            ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

            SHA512

            fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

          • C:\ProgramData\msvcp140.dll

            Filesize

            1024B

            MD5

            458532781441ed7f121a3cc4e6f63b14

            SHA1

            f3e84e6a4179fb84f0b0a008f858fd878a1d35b5

            SHA256

            be23585ccb1f4d5389af6747a03cb83f4508e333ea885027d04045fb7c6b5a5c

            SHA512

            3b823102f72d45527c51ad39de238cb4dc38a1b6bfa25c0087aa35d65f3628c4f0f2b718bdd8dc7abf4c69f67944d63ca2b7f402047946ce5d7950a961aefb56

          • C:\ProgramData\nss3.dll

            Filesize

            2.0MB

            MD5

            1cc453cdf74f31e4d913ff9c10acdde2

            SHA1

            6e85eae544d6e965f15fa5c39700fa7202f3aafe

            SHA256

            ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

            SHA512

            dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

          • C:\ProgramData\softokn3.dll

            Filesize

            4KB

            MD5

            8c49c037824664b50743959d08a62cf9

            SHA1

            5a4a65ca453f72fb47979bf93ffa3086923a7383

            SHA256

            f4e3fabda42981ece37397a4a3a574b0f76ede8ce9f50d00a2a1994ccc9c2e88

            SHA512

            f9957696722b7126ecfb64e351ec026a1e8ccc1098807680a87f20de9f31119cd059ee4909f6f1be14db1160064596a709ecfaa877ea46a572b5c2fe6f682d8e

          • C:\Users\AdminHDAAAAFIIJ.exe

            Filesize

            1KB

            MD5

            c6a5abb575f4c14729b299058539998f

            SHA1

            90a8e0cfc7695944c9d28f3cf908ecbeb3367d0c

            SHA256

            7271dd5c11fb9a1052a5e91a09afbe7d148fd3388dc51c338df62a0a16f06739

            SHA512

            80fa0b7d01774d4a68e42ffd4b874c60a129684d86af168699905342e95af7ff7bc84559ea5a2619a600d75346b41664522b621b7bbe3fc7b5d14448568865af

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0255CEC2C51D081EFF40366512890989_A2266F534D44FEE6BC8E990C542C69B4

            Filesize

            471B

            MD5

            a3a730aee52549b673746d0dbbc59531

            SHA1

            deb5b7d626272c1bc7b88f3476caaf1d64534972

            SHA256

            94ed1105931e5f86b887032ceb8b4f61e6f275487b7fa36220fd9ec520b82493

            SHA512

            354b4558b2a187117635e91d8d360c752c11844757be413349e5e701b1fa10294f55ea70053d49f46401bc4e7218991bde096d6c7179070963e636e3fccd3cd2

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

            Filesize

            2KB

            MD5

            499fb781218e91f17ceb95c95b2540af

            SHA1

            7eaa6a1efec6586520b78e140efdb3e223ac9a5f

            SHA256

            490b98a7d88b0805c5e90caf89aece53f21997ad060734cea5ec7d38ff02bff5

            SHA512

            65dcbd4af9aafd6fc88f5e941e60802a2adb03db22164cbbefbd3cec83f066c3ff5381b323eed658af75e097b542b51d95f66ab9b36a597e19ad19cba2d807ed

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

            Filesize

            2KB

            MD5

            8647fa3218bfe81a6208ddf38d3f62b2

            SHA1

            0f4b0ec7df5f949ce3363e73587e632c223ef09c

            SHA256

            17d9aff1230b821ca5a4899b410c7a395fdbdd4efeb4eef7637aa94eda100cd1

            SHA512

            085963090453894146c66499f13079db408af57ae615f1c3237da4d3af6bd56542c95a54aa9e3df13c2c53c2a5e8eb9c460cc54b3ecc7107fbc810f09fc2aab8

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

            Filesize

            2KB

            MD5

            ffec8069cabce0949aaee67665624e67

            SHA1

            d449a98b34103a9e80740ed9d7593c8115c3dc75

            SHA256

            340d048d7f46e25d83d97affa98d53d773e83e070b28ed67ea3472362a0a2993

            SHA512

            770d7b72772940699b4fb66ededa53a02fe580c5fcc5e050e2798e8e065c7a3505886d91d3ce05172e1d5c942069297934dd3c8c52f9e3d2be8f5d0c1ab851d3

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

            Filesize

            1KB

            MD5

            67db8c5d484fe0b60abd574b0480e4c9

            SHA1

            bafea8ad167114a72854bfe78095155bb7c44f89

            SHA256

            5d2c8933104167dece16b77357813d01c861d0c00176057ab8fe93222b51141d

            SHA512

            5d71a6271cfdcbef50f51c083f1665baaa59e7d927051ec96086bc68ceb2334227d620ee777237fccb3954ae1a1691f79d7f73335e7c95179591a1cdd0e9c844

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

            Filesize

            1KB

            MD5

            409753e064ef8537c278c361a2b1ebbc

            SHA1

            a28aa7a82427968cb8b2c0d91675e8374b087fe4

            SHA256

            c69ca82fa2695413ca28bc6e087ba57e9754e60d26dff82f5cc04fd1467c7ede

            SHA512

            b57b32aaf8a431ad5d9bb66ab23fbd37df5cf7ab6079e82f384cd8a367a9d92ad3b94c57c1f1310c15d321964f8757f1391d73e034e34efe113dbb674dd277a8

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0255CEC2C51D081EFF40366512890989_A2266F534D44FEE6BC8E990C542C69B4

            Filesize

            490B

            MD5

            6d6084112eb7cb7105d0788b46e48eab

            SHA1

            bdc34854ab3a6b9bc15606b199ffa05017002944

            SHA256

            a1a1f4b85a9ce3b353371755af73bff04093b6a82b2e0c4bdced1f287f09683e

            SHA512

            12ea7b98b3a4a577f438af213f3306fe0cd056dfcc538b3f33803bac7cf2d3bb7245f390982da7a6dc57c9ba470ee5bc0fd7349d418b9e458644c2b3d114eb37

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

            Filesize

            458B

            MD5

            afb068b9ad66b679040cfb5d5ed58d84

            SHA1

            19545377a63b0484b89148773c05c555249778fb

            SHA256

            9484d58cc94450597921e709a654c674d8dd3ba6e31739f67b932080d39f80bf

            SHA512

            7b09535e66abd962311c12fdfe4aa63b31b417503d84b6eb72aca4de2b3d3bde82ab9085dc88aba316dc0b5141f3bd3985b236bfd67eb18f1bd7c831c0db2a6a

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

            Filesize

            450B

            MD5

            2e12e2cb2b7b527b165372ec0b4967a0

            SHA1

            3763639ec29693ed0f558658a54d3532a22ac1a5

            SHA256

            e42f9a6882b3c2bbf7e72847689e37f5a46e6925df5b9b51bb0b9e4b3e93719c

            SHA512

            2f3e7a010ba7155202a57991c8f6ff7aa41524361e74842ff9421635a0300b10208179ac594001baecc0084624cecab70985d555fab5ee0d3525299f08992607

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

            Filesize

            482B

            MD5

            f4122405d723d21a27ff772f5f499c75

            SHA1

            deb6aa57091aa71a910c0df07a84dc318a4e5575

            SHA256

            644b22962a2985b39eaa3cbc6b3ee7d48d8faa29a9e0170d44baa680f8ab93bf

            SHA512

            261b442c7b70b3bd8b223760d5c4aded62e446d5a781d2f8599ef9651acf16dda7bb59991e40fbbb72528f33b08e50e38dc45f0282fe62f1b337af238f8a7a81

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

            Filesize

            486B

            MD5

            9484c64e6dbfb0782f29c78766cafca2

            SHA1

            3b4065dae9a33d48fc6436f50731ea4d56cd6cfc

            SHA256

            7d330dd6befe7c77c092188f987eeaa96e493c22e73734f90ef57e7a4e97c6c2

            SHA512

            19fa7724d171d6f4bc96787308e857b0e6fd41c7d6b9708861f7f95f2c8371d23cbdaabf7a6af13dc599d29b3acbafafe2e3457af075a526a5f1282695c5cef2

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

            Filesize

            458B

            MD5

            4c57235cd448e18e8d0d9e37d67db3c4

            SHA1

            232c2eb00d217d0b1a44c91520d2d25636061622

            SHA256

            64a7757d77e363e15a98e7a9bd4e8d4a66318ba406a87edf8672ecd954d8c32c

            SHA512

            df5a66313cd7ec1a8a2f24b2e01ce4ae39b386b40dabbd2b834bf146dd5240571a5e6cc3f81f76dd33b6d07fc501637a6a8c9574bf9c769ccea8a8c6e78e1ce4

          • memory/1096-254-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/1096-239-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/1096-253-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/1096-243-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/1096-241-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/1844-0-0x0000000074B4E000-0x0000000074B4F000-memory.dmp

            Filesize

            4KB

          • memory/1844-27-0x0000000074B40000-0x00000000752F0000-memory.dmp

            Filesize

            7.7MB

          • memory/1844-1-0x00000000003B0000-0x00000000003FA000-memory.dmp

            Filesize

            296KB

          • memory/1844-13-0x0000000074B40000-0x00000000752F0000-memory.dmp

            Filesize

            7.7MB

          • memory/2104-124-0x0000000000400000-0x0000000000458000-memory.dmp

            Filesize

            352KB

          • memory/2104-128-0x0000000000400000-0x0000000000458000-memory.dmp

            Filesize

            352KB

          • memory/2104-121-0x0000000000400000-0x0000000000458000-memory.dmp

            Filesize

            352KB

          • memory/2252-117-0x00000000734AE000-0x00000000734AF000-memory.dmp

            Filesize

            4KB

          • memory/2252-149-0x00000000734A0000-0x0000000073C50000-memory.dmp

            Filesize

            7.7MB

          • memory/2252-118-0x0000000000BA0000-0x0000000000BF4000-memory.dmp

            Filesize

            336KB

          • memory/2252-127-0x00000000734A0000-0x0000000073C50000-memory.dmp

            Filesize

            7.7MB

          • memory/2868-142-0x00000000009A0000-0x00000000009D8000-memory.dmp

            Filesize

            224KB

          • memory/3384-236-0x0000000000310000-0x000000000035A000-memory.dmp

            Filesize

            296KB

          • memory/4792-43-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/4792-28-0x0000000022810000-0x0000000022A6F000-memory.dmp

            Filesize

            2.4MB

          • memory/4792-44-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/4792-26-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/4792-25-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/4792-60-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/4792-67-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/4792-85-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/4792-92-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/4792-93-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/4792-7-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/4792-4-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/4792-10-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/4792-94-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/5032-150-0x0000000061E00000-0x0000000061EF3000-memory.dmp

            Filesize

            972KB

          • memory/5032-147-0x0000000000400000-0x0000000000643000-memory.dmp

            Filesize

            2.3MB

          • memory/5032-145-0x0000000000400000-0x0000000000643000-memory.dmp

            Filesize

            2.3MB