Analysis

  • max time kernel
    19s
  • max time network
    142s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15-09-2024 12:58

General

  • Target

    a672db5e7e34e662bbf17075a2076dc0b3479f75a49982c77e575077813ace94.exe

  • Size

    252KB

  • MD5

    19206462deb8093a24b063f75c0f88a0

  • SHA1

    294b76a6e7dceadde162e682c69115151edd8d73

  • SHA256

    a672db5e7e34e662bbf17075a2076dc0b3479f75a49982c77e575077813ace94

  • SHA512

    426db34d5128e3071f766bf937b04959b90016448311789b97fb8b39d214f4129818e2b24e4c068eb3d1d1ef45be82bd16139f2db0eecb7c6d7b2c57001f06e8

  • SSDEEP

    6144:nlyZp/utgGyrEqNZIoIYmAta12F2Eq80aTh3EO:nlu9u0EqNZ7a12E80aTh3EO

Malware Config

Extracted

Family

vidar

Version

10.8

Botnet

1f3c236c672ff2ffe017b396f834c66e

C2

http://147.45.68.138:80

https://steamcommunity.com/profiles/76561199761128941

https://t.me/iyigunl

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Extracted

Family

vidar

C2

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Signatures

  • Detect Vidar Stealer 22 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a672db5e7e34e662bbf17075a2076dc0b3479f75a49982c77e575077813ace94.exe
    "C:\Users\Admin\AppData\Local\Temp\a672db5e7e34e662bbf17075a2076dc0b3479f75a49982c77e575077813ace94.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2800
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:2576
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3548
        • C:\ProgramData\IJJJKEGHJK.exe
          "C:\ProgramData\IJJJKEGHJK.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3512
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
              PID:1160
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              PID:1716
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminIDBGHDGHCG.exe"
                5⤵
                  PID:4992
                  • C:\Users\AdminIDBGHDGHCG.exe
                    "C:\Users\AdminIDBGHDGHCG.exe"
                    6⤵
                      PID:128
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        7⤵
                          PID:2264
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminEBAKEBAECG.exe"
                      5⤵
                        PID:1496
                        • C:\Users\AdminEBAKEBAECG.exe
                          "C:\Users\AdminEBAKEBAECG.exe"
                          6⤵
                            PID:2436
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                              7⤵
                                PID:3248
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                7⤵
                                  PID:4356
                        • C:\ProgramData\AEBAFBGIDH.exe
                          "C:\ProgramData\AEBAFBGIDH.exe"
                          3⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:472
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            4⤵
                              PID:3472
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:1892
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\HJDHCFCBGIDG" & exit
                            3⤵
                              PID:2008
                              • C:\Windows\SysWOW64\timeout.exe
                                timeout /t 10
                                4⤵
                                • Delays execution with timeout.exe
                                PID:4436

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\ProgramData\AAFIJKKEHJDH\KKKKEH

                          Filesize

                          160KB

                          MD5

                          f310cf1ff562ae14449e0167a3e1fe46

                          SHA1

                          85c58afa9049467031c6c2b17f5c12ca73bb2788

                          SHA256

                          e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

                          SHA512

                          1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

                        • C:\ProgramData\AAFIJKKEHJDH\KKKKEH

                          Filesize

                          40KB

                          MD5

                          a182561a527f929489bf4b8f74f65cd7

                          SHA1

                          8cd6866594759711ea1836e86a5b7ca64ee8911f

                          SHA256

                          42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                          SHA512

                          9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                        • C:\ProgramData\AAFIJKKEHJDH\KKKKEH

                          Filesize

                          20KB

                          MD5

                          a603e09d617fea7517059b4924b1df93

                          SHA1

                          31d66e1496e0229c6a312f8be05da3f813b3fa9e

                          SHA256

                          ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7

                          SHA512

                          eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc

                        • C:\ProgramData\AEBAFBGIDH.exe

                          Filesize

                          283KB

                          MD5

                          c252b6cf66b0de7e3b34c180bab3b0fa

                          SHA1

                          cba15dad617651223885f6c032b65cd598dcce5c

                          SHA256

                          7fc6bc7f2cb710cf14da22c9e40b8407dbbe523ba7f8a91f8d67f5bce413d5c5

                          SHA512

                          95e7dd1377d0baebe0a7a22901dcfa77d4f562c88e88b0133c03edac36bc7b058522465c03ee792743022a20c639e306b1ecb25b3910650233ecbc6f281f3617

                        • C:\ProgramData\EBFHJEGD

                          Filesize

                          112KB

                          MD5

                          87210e9e528a4ddb09c6b671937c79c6

                          SHA1

                          3c75314714619f5b55e25769e0985d497f0062f2

                          SHA256

                          eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1

                          SHA512

                          f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0

                        • C:\ProgramData\IDBGHDGH

                          Filesize

                          114KB

                          MD5

                          6205160b38ce34c90456d967715ca941

                          SHA1

                          fce483a831467c4f8b8cf9558ff753d1f1d4d340

                          SHA256

                          5df07863dae25402f552f8cb599367a9e5d0f7e913648c07c163c1a4ff656407

                          SHA512

                          9249ccfe3272002224f348bbffac93b59d1f207237a12e07e694ab38d3ecd198ea470596cb0114e6b29aedd7d90879c1ebddfe6c370be8eff401948c8345b7fb

                        • C:\ProgramData\IJDGIIEBFCBAAAAKKEGH

                          Filesize

                          10KB

                          MD5

                          a1fbfda78f0b3e9af187486e0bda4337

                          SHA1

                          901302dec7346739c12bb415fc03d7db1f1e3c00

                          SHA256

                          0936f76d0259c24c107556d05209aae6931b7d914b990db9b527dc2c0d5a39e4

                          SHA512

                          0dfbeb3ef3f40bafedea3c77af058d8b5a03bebaa966776f949aaeab2375cbc2dacba461626b63de50e3ed67e6e48ded34508cc1b58bb4af086ccc0c30b673d2

                        • C:\ProgramData\IJJJKEGHJK.exe

                          Filesize

                          207KB

                          MD5

                          b20dff2e59e94e48d6449fb22ec6411b

                          SHA1

                          07a0dc8735b048696d8db42ad689ba8c9bbbccc9

                          SHA256

                          5afff322d4b56afbe4429c6fd83aa2d699c51dbf4f5495b08ac104f07da8c49d

                          SHA512

                          2119e9b24c133d556d3e9e293914e720b012e5dfd492e90dcec1c4ae75f29b01a38037f4741cd5ec1d4bda3e4c24f81627f7f39d140d82aab168c44942d55a3b

                        • C:\ProgramData\freebl3.dll

                          Filesize

                          36KB

                          MD5

                          dbd3d9d59f6d2dde15f3e9aed8f4a55f

                          SHA1

                          152fed5cf6ae66356a109677e6ef592864e740c1

                          SHA256

                          e0e77ac61908ce88766708e7f84c3ae7a0fcf4ab55d0e52864e22c0253dfa20a

                          SHA512

                          3b46b909d7634274e5676a1ff62699d7d41862f7a3753edb65db2e1c59f2f329da23eea26c79b81477197cd4c8c9acf9358a62643bc4ce92132176f742173f01

                        • C:\ProgramData\mozglue.dll

                          Filesize

                          593KB

                          MD5

                          c8fd9be83bc728cc04beffafc2907fe9

                          SHA1

                          95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                          SHA256

                          ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                          SHA512

                          fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                        • C:\ProgramData\msvcp140.dll

                          Filesize

                          13KB

                          MD5

                          e416a22acaeff6cec5aa36a72becbede

                          SHA1

                          9fefce2eafd2e79ce0f0c60e2174b0052bfd0d2f

                          SHA256

                          edc0250d8dfe5b4049a64b6171d12ad701784f4650484d35315ab5286384e79e

                          SHA512

                          8ab549504e9c7f787e4ace97bcce5eed5bd9758b8cc223eae537e5ba3dc0f22ddd84802b1c43c2e947aa0a97742793b8cd09a5563ccd21820fa00bb5c1294421

                        • C:\ProgramData\nss3.dll

                          Filesize

                          2.0MB

                          MD5

                          1cc453cdf74f31e4d913ff9c10acdde2

                          SHA1

                          6e85eae544d6e965f15fa5c39700fa7202f3aafe

                          SHA256

                          ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                          SHA512

                          dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                        • C:\ProgramData\softokn3.dll

                          Filesize

                          51KB

                          MD5

                          ff088b492b3498455d72a226239a574e

                          SHA1

                          76c7e45de7c821e97cbe8b232dfec41dd8ea6183

                          SHA256

                          9d992bf3f8a5b82ddc3a9f92cc80614d728c298f3c7c5cabd605185cfb7e7688

                          SHA512

                          9deb4ad513342a5a5b7a03faf39e9ab022cfbedf304aaec8087c0ef387bd10c3c917872a792b0b9515687df4470cd2fb8f1d2b2f5b9a381d5350332c353059c0

                        • C:\Users\AdminIDBGHDGHCG.exe

                          Filesize

                          321KB

                          MD5

                          5831ebced7b72207603126ed67601c28

                          SHA1

                          2ba46b54074675cc132b2c4eb6f310b21c7d7041

                          SHA256

                          02097348db100eb22d46dc474a1078b5ddbb56ee916cc81f24fadd0a6938ac58

                          SHA512

                          a9924ef2373851156d981bc3c5b5d533e8b510abf6c3f12e62af0c019e740f0d077efb8f7f93699d797335df33013c72fd9ead3b2253dd82f14b7b330faacb8e

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                          Filesize

                          717B

                          MD5

                          822467b728b7a66b081c91795373789a

                          SHA1

                          d8f2f02e1eef62485a9feffd59ce837511749865

                          SHA256

                          af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

                          SHA512

                          bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

                          Filesize

                          2KB

                          MD5

                          be866b8cac2ee4ef9f82b89eac8e4c16

                          SHA1

                          46e0ea958226322baac1c9d83ae1dde09c9c3119

                          SHA256

                          8c2a88d2c06d851ec946fd5c6b7b7746824357edcd315938c96f59d5cd71fc39

                          SHA512

                          b8fc299d1c723ea0ddc1a91b59ef92f5d55875de02e1c7281577281a9b8ef93020cd1615321507750d550768b4d0bacc30ba4153fbc9eac1cd7026d13fd662bf

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

                          Filesize

                          2KB

                          MD5

                          d9b99d63755d3b61ef98e5ce4a2c5360

                          SHA1

                          3c6deb91e5634ead4fafe02c9094a84c728dd7d7

                          SHA256

                          18c144d485c6f38e0e79f083cf75e04615aa7066eb6ce0582b164acbdb0a0e80

                          SHA512

                          ee89dfb6b741ae6cda197f99fcfd8c99ff5b3a06b3fadcb6f128777a7bd31a76100d1234943f3365117ec27d6ae83e57357e69d5956b67cbd3dc94efcd8903fc

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

                          Filesize

                          1KB

                          MD5

                          30bbf79a5d8e291a526458c43603682c

                          SHA1

                          0d9a5f1a13a800b416cb803da570a1e82a2e40c1

                          SHA256

                          1c045ef45ff87b7422faef763da35e239c0d278f0d3d8fefa86f44d3b753da21

                          SHA512

                          2a415850423404cca839f5202a74799f17ab25f623d3b8d9e622e97488b769ced88f72ff1f2fc8101b0c7dc299d6329c10442b247b4c0a408cace5428f97e98a

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                          Filesize

                          192B

                          MD5

                          4c798a26a56bb40041d09f2a9f10da96

                          SHA1

                          4f4f4d8ac298adb093323836de664b8d0a835e4f

                          SHA256

                          6fbf54a401e4eca24d80d7144b454cec2878d1d589826dc978c256a90b7beb60

                          SHA512

                          f58e2f6baab0de7590e653b58f49f1266c55dc79ccb6e6bde1aec4fec062e03aa2e8feb336da6a32a3ed5c7790f371ce7770b0b63347ff685b78f50ac3e2f2ea

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

                          Filesize

                          458B

                          MD5

                          1b2ad9cd21be080d582ead62b3337777

                          SHA1

                          22c1b4a423761c2c2182bd6bc5c38104e1495fcb

                          SHA256

                          0c336ccb1e1cc5a019d8c492384e208f71b07221a9c67c58688f0330acd4feb1

                          SHA512

                          780af8e2f16d1b3888db4dc5ba57a5b8e9919fb85a53ec234a19c9a67c1b9ec0376c54ca48d287c3a09a2b1878d80eef498f1cb4a5fb49347b6685f2a15cdf88

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

                          Filesize

                          450B

                          MD5

                          a0aed525e415925df302439cb02a3569

                          SHA1

                          c2b548b79e5dfd9756293712696872756d60c765

                          SHA256

                          510083ccbec80e92840e2b9a1a0e543166047f5931052183c498f0ed5d5426cd

                          SHA512

                          571c4d9055fee7955f0ddee2209d8ccaf713f1228847bbb84f705612a362ef89f6f0a42d9213b6b42ace88ad0f1f1cefac4d9ac43df42ba8658869762fa05823

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

                          Filesize

                          458B

                          MD5

                          44799b6dd9ce81193404b25af60c640c

                          SHA1

                          21edce47ba83a0e88e467a73ee3b10243c29da24

                          SHA256

                          da09ceaa90f35ec88f22882bb2efc267af86559fea3ac64abb57389b9e93b65f

                          SHA512

                          52d526deb6974788db0f77a978212d89ab10fdce504229ba1881782a0d7fdca75c843e8fcc28f508f97bf4864673d81ffa73456c1f01a0550971e60c306ceb33

                        • memory/128-226-0x0000000000390000-0x00000000003E4000-memory.dmp

                          Filesize

                          336KB

                        • memory/472-131-0x0000000000E80000-0x0000000000ECA000-memory.dmp

                          Filesize

                          296KB

                        • memory/1716-242-0x0000000000400000-0x0000000000643000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/1716-111-0x0000000000400000-0x0000000000643000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/1716-114-0x0000000000400000-0x0000000000643000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/1716-116-0x0000000000400000-0x0000000000643000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/1716-140-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                          Filesize

                          972KB

                        • memory/1716-241-0x0000000000400000-0x0000000000643000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/1892-251-0x0000000000400000-0x0000000000657000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/1892-268-0x0000000000400000-0x0000000000657000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/1892-135-0x0000000000400000-0x0000000000657000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/1892-133-0x0000000000400000-0x0000000000657000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/1892-137-0x0000000000400000-0x0000000000657000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/1892-252-0x0000000000400000-0x0000000000657000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/1892-253-0x00000000222F0000-0x000000002254F000-memory.dmp

                          Filesize

                          2.4MB

                        • memory/1892-267-0x0000000000400000-0x0000000000657000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/2264-233-0x0000000000400000-0x0000000000458000-memory.dmp

                          Filesize

                          352KB

                        • memory/2264-231-0x0000000000400000-0x0000000000458000-memory.dmp

                          Filesize

                          352KB

                        • memory/2264-229-0x0000000000400000-0x0000000000458000-memory.dmp

                          Filesize

                          352KB

                        • memory/2800-1-0x0000000000F80000-0x0000000000FC4000-memory.dmp

                          Filesize

                          272KB

                        • memory/2800-79-0x00000000743A0000-0x0000000074B51000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/2800-11-0x00000000743A0000-0x0000000074B51000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/2800-0-0x00000000743AE000-0x00000000743AF000-memory.dmp

                          Filesize

                          4KB

                        • memory/3512-108-0x0000000000230000-0x0000000000268000-memory.dmp

                          Filesize

                          224KB

                        • memory/3512-107-0x000000007116E000-0x000000007116F000-memory.dmp

                          Filesize

                          4KB

                        • memory/3512-109-0x0000000005080000-0x0000000005626000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/3512-117-0x0000000071160000-0x0000000071911000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/3512-115-0x0000000071160000-0x0000000071911000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/3548-31-0x0000000000400000-0x0000000000641000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/3548-47-0x0000000000400000-0x0000000000641000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/3548-48-0x0000000000400000-0x0000000000641000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/3548-30-0x0000000000400000-0x0000000000641000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/3548-78-0x0000000000400000-0x0000000000641000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/3548-15-0x000000001D650000-0x000000001D8AF000-memory.dmp

                          Filesize

                          2.4MB

                        • memory/3548-13-0x0000000000400000-0x0000000000641000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/3548-80-0x0000000000400000-0x0000000000641000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/3548-12-0x0000000000400000-0x0000000000641000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/3548-6-0x0000000000400000-0x0000000000641000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/3548-87-0x0000000000400000-0x0000000000641000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/3548-8-0x0000000000400000-0x0000000000641000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/3548-3-0x0000000000400000-0x0000000000641000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/3548-88-0x0000000000400000-0x0000000000641000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/4356-275-0x0000000000400000-0x0000000000657000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/4356-276-0x0000000000400000-0x0000000000657000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/4356-277-0x0000000022180000-0x00000000223DF000-memory.dmp

                          Filesize

                          2.4MB