Analysis

  • max time kernel
    32s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2024 01:38

General

  • Target

    6b11a91599104b307955a4cde5942d89ed2aa29e833fa229e21368a73139186d.exe

  • Size

    283KB

  • MD5

    d264213f54193475ffd0301f7d92639f

  • SHA1

    8e494a7d4b3d54e03a3b27c8dfde51295bb56737

  • SHA256

    6b11a91599104b307955a4cde5942d89ed2aa29e833fa229e21368a73139186d

  • SHA512

    1a699be3bb71083c35d5c0bbbcb862fdacb71f67fc8c4e34cfa68c52e7ed1b4360c1975ba290d14d95dee8233558e6dfc1b10e628d5da97a2faffced2bb14f92

  • SSDEEP

    6144:wsBdXzlQZTJm2CMA8E0pNdx651jzTqR0noaLKRUEO:wsBtzloTJm2CMA8qLPm0noaGRUEO

Malware Config

Extracted

Family

vidar

C2

http://147.45.126.10:80

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Signatures

  • Detect Vidar Stealer 14 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 16 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b11a91599104b307955a4cde5942d89ed2aa29e833fa229e21368a73139186d.exe
    "C:\Users\Admin\AppData\Local\Temp\6b11a91599104b307955a4cde5942d89ed2aa29e833fa229e21368a73139186d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1544
      • C:\ProgramData\JKJEHJKJEB.exe
        "C:\ProgramData\JKJEHJKJEB.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2116
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1116
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 252
            5⤵
            • Program crash
            PID:3068
      • C:\ProgramData\AEHIJKKFHI.exe
        "C:\ProgramData\AEHIJKKFHI.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1572
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          PID:2344
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminAKKEGDGCGD.exe"
            5⤵
              PID:2228
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminAFHJJEHIEB.exe"
              5⤵
                PID:1616
          • C:\ProgramData\EBAAAFBGDB.exe
            "C:\ProgramData\EBAAAFBGDB.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2820
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
              • System Location Discovery: System Language Discovery
              PID:2008
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\HDAAAAFIIJDB" & exit
            3⤵
              PID:1712
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 10
                4⤵
                • Delays execution with timeout.exe
                PID:2260

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\JEBKECAF

          Filesize

          92KB

          MD5

          ae2cd96016ba8a9d0c675d9d9badbee7

          SHA1

          fd9df8750aacb0e75b2463c285c09f3bbd518a69

          SHA256

          dd0ea2f02d850df691183602f62284445e4871e26a61d9ea72ff1c23c0b0ba04

          SHA512

          7e0e86980b7f928ea847a097545fa07b0c554617768760d4db9afe448568b97d1536a824b7a1b6c1f3fb1bf14153be07ef32676f878fb63a167d47e3136b5d1d

        • C:\ProgramData\JEGHCBAFBFHI\EHCGIJ

          Filesize

          46KB

          MD5

          02d2c46697e3714e49f46b680b9a6b83

          SHA1

          84f98b56d49f01e9b6b76a4e21accf64fd319140

          SHA256

          522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

          SHA512

          60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

        • C:\ProgramData\JEGHCBAFBFHI\EHJKFC

          Filesize

          20KB

          MD5

          c9ff7748d8fcef4cf84a5501e996a641

          SHA1

          02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

          SHA256

          4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

          SHA512

          d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

        • C:\ProgramData\JJDBGDHIIDAEBFHJJDBF

          Filesize

          6KB

          MD5

          e4dcd101c3c52978ede8006612e1a3ae

          SHA1

          7b771b1d3bb5b3e3e7e5265ad38edb5ad1eb21b1

          SHA256

          c8f153b143eb5af4abc777ccc344e45f804d09e3d2fd20ee47adbbb40a213ffd

          SHA512

          5a85d35b72028c4e360ebcb59b406821380a0f79fdea3d4b3811b57ad33442323f5ac4134183865d19dd0783373ba70ce8d1657a7703027d8955c73c5344dd63

        • C:\ProgramData\freebl3.dll

          Filesize

          120KB

          MD5

          5d249bb76a3cb92513d6c1242e7dc2e9

          SHA1

          41c9a53c0e124d41d125c4e838d3ea9213a99da5

          SHA256

          f07e3bd1420995c531f0a651e26fb8008c1f99589487b976a0c2f7119342aa6f

          SHA512

          471912b25a67a04fb8c34b3e012d6286ebbae748744ae722dd8bbed6c75ab27dc2056425b1a0b91da7f2f21991376090cf2c5694599ee405e490fdb8de6a95d9

        • C:\ProgramData\msvcp140.dll

          Filesize

          13KB

          MD5

          e416a22acaeff6cec5aa36a72becbede

          SHA1

          9fefce2eafd2e79ce0f0c60e2174b0052bfd0d2f

          SHA256

          edc0250d8dfe5b4049a64b6171d12ad701784f4650484d35315ab5286384e79e

          SHA512

          8ab549504e9c7f787e4ace97bcce5eed5bd9758b8cc223eae537e5ba3dc0f22ddd84802b1c43c2e947aa0a97742793b8cd09a5563ccd21820fa00bb5c1294421

        • C:\ProgramData\softokn3.dll

          Filesize

          39KB

          MD5

          1f1aa00a2d160ce959e0ac0c004abfcd

          SHA1

          d362ea0a7c66195f99a22b8e9a450be1618e0127

          SHA256

          83e5cea6e50f2a2f5aa6b9b3e09bdbf43e259126561959675e971f2a39fd27da

          SHA512

          718f5b6009a40dac032ccb656e639d01765537e7994983fe2daf6328f7a90af98e72723eb4f5fd7e3a472cba8cbca25705075d9ab3e8a2b542dfca7d07f2e3aa

        • C:\ProgramData\vcruntime140.dll

          Filesize

          73KB

          MD5

          c3dfe0f04109b4b5f2bdb1939aee16f2

          SHA1

          fd0118b8676cd0a5204bfcb4ab826aea49dc9eeb

          SHA256

          4153be654d718becbda7785029d6679ce0705f5da5eb78b910c760ceee3f6516

          SHA512

          5970b9d2b4a8cdb6faf38b1d2d28ea3a96bb06d47dc36e00684fa16e6d9d5eb51305eca0b246a8415dd8518d992b130b2c4707087936e5bbe9a53e3aa80c4c77

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0255CEC2C51D081EFF40366512890989_A2266F534D44FEE6BC8E990C542C69B4

          Filesize

          471B

          MD5

          a3a730aee52549b673746d0dbbc59531

          SHA1

          deb5b7d626272c1bc7b88f3476caaf1d64534972

          SHA256

          94ed1105931e5f86b887032ceb8b4f61e6f275487b7fa36220fd9ec520b82493

          SHA512

          354b4558b2a187117635e91d8d360c752c11844757be413349e5e701b1fa10294f55ea70053d49f46401bc4e7218991bde096d6c7179070963e636e3fccd3cd2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

          Filesize

          2KB

          MD5

          ffec8069cabce0949aaee67665624e67

          SHA1

          d449a98b34103a9e80740ed9d7593c8115c3dc75

          SHA256

          340d048d7f46e25d83d97affa98d53d773e83e070b28ed67ea3472362a0a2993

          SHA512

          770d7b72772940699b4fb66ededa53a02fe580c5fcc5e050e2798e8e065c7a3505886d91d3ce05172e1d5c942069297934dd3c8c52f9e3d2be8f5d0c1ab851d3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

          Filesize

          1KB

          MD5

          67db8c5d484fe0b60abd574b0480e4c9

          SHA1

          bafea8ad167114a72854bfe78095155bb7c44f89

          SHA256

          5d2c8933104167dece16b77357813d01c861d0c00176057ab8fe93222b51141d

          SHA512

          5d71a6271cfdcbef50f51c083f1665baaa59e7d927051ec96086bc68ceb2334227d620ee777237fccb3954ae1a1691f79d7f73335e7c95179591a1cdd0e9c844

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0255CEC2C51D081EFF40366512890989_A2266F534D44FEE6BC8E990C542C69B4

          Filesize

          490B

          MD5

          2b7a69682d394f6294d8cc6ba97a61c2

          SHA1

          10884410c439b8f81afb71e6ac2f7b86cf3485ed

          SHA256

          f5debbffc493b9c29fc052d5f9e640ba55dc9629af41ed66a643e988ed0cc4af

          SHA512

          1ab8d5c67ad0d6d89476d3ebab30c67113bf16c695a87c6059ef48dbed0967d440c6234465c1e1c8ef2368fbd39b5e6d6b609a79c527b1c535673f93ccab2aac

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

          Filesize

          482B

          MD5

          2e36f25efc4da881df1e5688f45c9b6a

          SHA1

          711449bf34c7fffcadea70e920aaa0c8799120ac

          SHA256

          cfe0f5734f3d0f8d79b655f4fc57d04147c437dfd0ed316b61fcea8946fec9bf

          SHA512

          e7f772d5b0887906fe5e42a8889ce7581aa7aca70ef22aa93cf959e112ec7284c8e5eb2ea3749af3022ec6d479c49813fbfabb658d10d0840b5c0bbe0f76feb3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c03b6467536caa70994216f25ad5fb6b

          SHA1

          e8bfcd0c3e2134db7ae523daf0ae23021b3d6929

          SHA256

          1fd13f29d0bdb865960b1d091ab991464039e8733af18d130d83e72aa8f2fe33

          SHA512

          65d47df5b318e313155678aca762e1f68a1054919682ca22279bd8556d5f38790c66aaaa3b63a7564730ac5451029d542986e0242098cd9ba45460c8c01a4cd1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ece8ee3b1f9baf49e432792d3c0ae282

          SHA1

          4f708c45b309a6d3d6819fa83eca2374b0ea5ffb

          SHA256

          aceefd958083c9015c29d9f229a9bc25c4b30ccc71cacdaea2b81850ae497151

          SHA512

          aa68788349d96256bea1b223a5937e1ba8647e4f1ae07c9c89f602e3558ba97310e19de8f61c82e65ef137924529dab389be029f2ff9f3d1dce69c10bbe196f5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          97751838376a2f504213e637278fdcda

          SHA1

          d9b8953b3abfcc0d035c24004c26f9fb8a70a16d

          SHA256

          af5c268ae9c80bedc78d9db590e53f983dab2c8c5fd23613e1d29afc4df512d9

          SHA512

          3f2da6857479ed18ccc878547b0d2c2080ae431a00fbf0b253cd539e147333cb48ac85889f017906aa3f7c467fb23d16c1c0e600fd7165f8906b3fd7ae61ac15

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

          Filesize

          486B

          MD5

          f0653784b9863332951b439bc849eab4

          SHA1

          36bfc17a9d36dc9fed769bf2dd8f1a00a7ed9b31

          SHA256

          406de6780f276b52d43235fb61b64f78b1336d9088088ff2f7aeffdbb2b0f6ff

          SHA512

          cd2dbc1963f0e992a615970900e4247b5d6fd354d7aa1a61c710dbff8328bcb84d5d0e3b13741a9caf3dfa6e41e28d47620d2dd70ebd582f47c06b0a33800fd1

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\76561199768374681[1].htm

          Filesize

          33KB

          MD5

          73023fa2743d762695c912c6c2e1dfc7

          SHA1

          4dc46bd03a7776abe509bd1625cb46899cfa9c24

          SHA256

          80c0bb1781bec350bf5b7e98549e4d52d135385b18dba55159d42e30081cdd31

          SHA512

          8555ae03c231f3b58ce5ceb7e42e155c802c8bed17f2f4d277742050a5aa5f153807ba12039a14f2b5f61ed7be241c0d26f7dd6130db25685fa224c94edf2b65

        • C:\Users\Admin\AppData\Local\Temp\CabEE28.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarEE4A.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • \ProgramData\AEHIJKKFHI.exe

          Filesize

          205KB

          MD5

          003978c8812e39ddb74bf9d5005cb028

          SHA1

          126f73c30469a1b7e9a04a670c35185b5df628bc

          SHA256

          06510b52e07e89b5781f4ee3c7b4d94ff84c03931b3d7d93224294860feaccf4

          SHA512

          7c0b7ec7dfe18f99cf850c80c3228f52537d5565b2950d4f0ef8cbbb7b19d1f5e2d128f3766dcede41711b4d3c5631c7f758dd61697b1e5978d596f98f54c31d

        • \ProgramData\EBAAAFBGDB.exe

          Filesize

          282KB

          MD5

          5dd74b81e1e9f3ab155e1603a2fa793b

          SHA1

          653cdaf8617c7fdec6f39db3334e858bec9a2d66

          SHA256

          5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26

          SHA512

          9017f6797f998423e3cd88dcf1086f6e555797a9e6414ffd714dcb394cfd3f2b2fb5432c9ba38792021b5ba9e421454385f509c9363cedb7d3ac5919f66035fa

        • \ProgramData\JKJEHJKJEB.exe

          Filesize

          321KB

          MD5

          c54262d9605b19cd8d417ad7bc075c11

          SHA1

          4c99d7bf05ac22bed6007ea3db6104f2472601fd

          SHA256

          de3f08aad971888269c60afcf81dc61f2158ca08cd32c9f5dd400e07d1517b54

          SHA512

          9c3086190bcb6ac9dd1ce22e69cfaf814d4acb60140fbe9e0cb220216d068d17151cb79f8acf89567c9a7b93960479ce19ea7b86020d939f56d6fc24e4d29a3f

        • \ProgramData\mozglue.dll

          Filesize

          593KB

          MD5

          c8fd9be83bc728cc04beffafc2907fe9

          SHA1

          95ab9f701e0024cedfbd312bcfe4e726744c4f2e

          SHA256

          ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

          SHA512

          fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

        • \ProgramData\nss3.dll

          Filesize

          2.0MB

          MD5

          1cc453cdf74f31e4d913ff9c10acdde2

          SHA1

          6e85eae544d6e965f15fa5c39700fa7202f3aafe

          SHA256

          ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

          SHA512

          dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

        • memory/1116-556-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/1116-557-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/1116-558-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/1116-564-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/1116-560-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/1116-562-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/1116-569-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/1116-566-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/1544-191-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/1544-18-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/1544-3-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/1544-5-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/1544-434-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/1544-415-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/1544-414-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/1544-8-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/1544-353-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/1544-10-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/1544-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/1544-14-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/1544-15-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/1544-9-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/1544-7-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/1544-154-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/1544-193-0x000000001DD50000-0x000000001DFAF000-memory.dmp

          Filesize

          2.4MB

        • memory/1544-203-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/1544-222-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/1572-599-0x0000000000B20000-0x0000000000B58000-memory.dmp

          Filesize

          224KB

        • memory/1756-16-0x0000000074050000-0x000000007473E000-memory.dmp

          Filesize

          6.9MB

        • memory/1756-1-0x0000000001250000-0x000000000129A000-memory.dmp

          Filesize

          296KB

        • memory/1756-0-0x000000007405E000-0x000000007405F000-memory.dmp

          Filesize

          4KB

        • memory/1756-6-0x0000000074050000-0x000000007473E000-memory.dmp

          Filesize

          6.9MB

        • memory/2116-581-0x0000000072890000-0x0000000072F7E000-memory.dmp

          Filesize

          6.9MB

        • memory/2116-544-0x0000000000B70000-0x0000000000BC4000-memory.dmp

          Filesize

          336KB

        • memory/2116-543-0x000000007289E000-0x000000007289F000-memory.dmp

          Filesize

          4KB

        • memory/2116-555-0x0000000072890000-0x0000000072F7E000-memory.dmp

          Filesize

          6.9MB

        • memory/2344-616-0x0000000000400000-0x0000000000643000-memory.dmp

          Filesize

          2.3MB

        • memory/2344-610-0x0000000000400000-0x0000000000643000-memory.dmp

          Filesize

          2.3MB

        • memory/2344-613-0x0000000000400000-0x0000000000643000-memory.dmp

          Filesize

          2.3MB

        • memory/2344-612-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2344-604-0x0000000000400000-0x0000000000643000-memory.dmp

          Filesize

          2.3MB

        • memory/2344-606-0x0000000000400000-0x0000000000643000-memory.dmp

          Filesize

          2.3MB

        • memory/2344-603-0x0000000000400000-0x0000000000643000-memory.dmp

          Filesize

          2.3MB

        • memory/2344-654-0x0000000061E00000-0x0000000061EF3000-memory.dmp

          Filesize

          972KB

        • memory/2344-614-0x0000000000400000-0x0000000000643000-memory.dmp

          Filesize

          2.3MB

        • memory/2344-608-0x0000000000400000-0x0000000000643000-memory.dmp

          Filesize

          2.3MB

        • memory/2820-653-0x00000000012B0000-0x00000000012FA000-memory.dmp

          Filesize

          296KB