Analysis

  • max time kernel
    91s
  • max time network
    126s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15-09-2024 13:03

General

  • Target

    e3b383702d5791f228ce52895b00856b5ef50d5cba3b952389d3e64c8064d435.exe

  • Size

    283KB

  • MD5

    95e56babf9f2cb4e5465bd164fd0e916

  • SHA1

    90bda3978469565133e4766396bb56159f3ade25

  • SHA256

    e3b383702d5791f228ce52895b00856b5ef50d5cba3b952389d3e64c8064d435

  • SHA512

    918b3f3d66c61f7f43c556aebd135ca0f2095758989dea43e5d9590ee1b01579be6705b36bae7ed0281c6ac291624c82e872a34845bb46d373402f85190df0ae

  • SSDEEP

    6144:m7pXySSZ7xMdOHynz0lkPix5xZ/XooaMgH9JndOrEJ96+g+AS3aImJ3jEO:wpXySCQwlkarjoH3dOrEJg+nqIyTEO

Malware Config

Extracted

Family

vidar

C2

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Signatures

  • Detect Vidar Stealer 22 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 5 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3b383702d5791f228ce52895b00856b5ef50d5cba3b952389d3e64c8064d435.exe
    "C:\Users\Admin\AppData\Local\Temp\e3b383702d5791f228ce52895b00856b5ef50d5cba3b952389d3e64c8064d435.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4688
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4056
      • C:\ProgramData\IIJDBAKKKF.exe
        "C:\ProgramData\IIJDBAKKKF.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4220
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
            PID:2156
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1944
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminJJJDGIECFC.exe"
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:988
              • C:\Users\AdminJJJDGIECFC.exe
                "C:\Users\AdminJJJDGIECFC.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:956
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  7⤵
                  • System Location Discovery: System Language Discovery
                  PID:3808
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminIJDHCBGHJE.exe"
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2100
              • C:\Users\AdminIJDHCBGHJE.exe
                "C:\Users\AdminIJDHCBGHJE.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                PID:428
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  7⤵
                    PID:4484
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Checks processor information in registry
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3164
          • C:\ProgramData\KJKJJEGIDB.exe
            "C:\ProgramData\KJKJJEGIDB.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2604
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              PID:4816
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\DHCFIDAKJDHI" & exit
            3⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4536
            • C:\Windows\SysWOW64\timeout.exe
              timeout /t 10
              4⤵
              • System Location Discovery: System Language Discovery
              • Delays execution with timeout.exe
              PID:3160

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\CAAEBFHJJDAAKFIECGDB

        Filesize

        10KB

        MD5

        36142f09b81a1165d7f0cff6a8277bd2

        SHA1

        e8a5c6322f9e9078d822dc60679c5be9660946e7

        SHA256

        74d9880009ad847651e972b91c6f43614707a4cd02c3509279524ed28698d949

        SHA512

        9663f4ed1af195d698fa72802aac275684a5e4781fc495fcbf5b31d3573c80d4ac5f4873a6aa41584eeabb2fa88c467213443edd81f9814b3437541393992ace

      • C:\ProgramData\IDBKKKKKFBGD\FBFHJJ

        Filesize

        160KB

        MD5

        f310cf1ff562ae14449e0167a3e1fe46

        SHA1

        85c58afa9049467031c6c2b17f5c12ca73bb2788

        SHA256

        e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

        SHA512

        1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

      • C:\ProgramData\IDBKKKKKFBGD\IEHCAK

        Filesize

        40KB

        MD5

        a182561a527f929489bf4b8f74f65cd7

        SHA1

        8cd6866594759711ea1836e86a5b7ca64ee8911f

        SHA256

        42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

        SHA512

        9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

      • C:\ProgramData\IDBKKKKKFBGD\IJKFCF

        Filesize

        20KB

        MD5

        a603e09d617fea7517059b4924b1df93

        SHA1

        31d66e1496e0229c6a312f8be05da3f813b3fa9e

        SHA256

        ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7

        SHA512

        eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc

      • C:\ProgramData\IECGHJKK

        Filesize

        112KB

        MD5

        87210e9e528a4ddb09c6b671937c79c6

        SHA1

        3c75314714619f5b55e25769e0985d497f0062f2

        SHA256

        eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1

        SHA512

        f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0

      • C:\ProgramData\IIJDBAKKKF.exe

        Filesize

        207KB

        MD5

        b20dff2e59e94e48d6449fb22ec6411b

        SHA1

        07a0dc8735b048696d8db42ad689ba8c9bbbccc9

        SHA256

        5afff322d4b56afbe4429c6fd83aa2d699c51dbf4f5495b08ac104f07da8c49d

        SHA512

        2119e9b24c133d556d3e9e293914e720b012e5dfd492e90dcec1c4ae75f29b01a38037f4741cd5ec1d4bda3e4c24f81627f7f39d140d82aab168c44942d55a3b

      • C:\ProgramData\JJJDGIEC

        Filesize

        114KB

        MD5

        b90a70d7e385373c8edebf0c3ff549f0

        SHA1

        cdf4fb34071fc79c144fbd3a4d4a58c703701841

        SHA256

        51e234c09098ea32dd1422ce8304a043ace2962e24528988df220cc4f5358191

        SHA512

        b7c2f2a46d624148629e306b7298b4ed6eb5742c79458f84c5d70dd8e9159fd72996556988156bf6649d00e90b98cd9311ae037733a14abd7adb3eed8327ac3e

      • C:\ProgramData\KJKJJEGIDB.exe

        Filesize

        283KB

        MD5

        c252b6cf66b0de7e3b34c180bab3b0fa

        SHA1

        cba15dad617651223885f6c032b65cd598dcce5c

        SHA256

        7fc6bc7f2cb710cf14da22c9e40b8407dbbe523ba7f8a91f8d67f5bce413d5c5

        SHA512

        95e7dd1377d0baebe0a7a22901dcfa77d4f562c88e88b0133c03edac36bc7b058522465c03ee792743022a20c639e306b1ecb25b3910650233ecbc6f281f3617

      • C:\ProgramData\freebl3.dll

        Filesize

        13KB

        MD5

        bb1dcddc7b08e7b683da9426d2895d3a

        SHA1

        69ce635788997b1ee4b7d69fa70765a66cd6a71f

        SHA256

        cb46725d09ec7238ed21005d54c6e89c680cf0877953f6c9856833133f935867

        SHA512

        3c64779607766e09594294510b597c06ce750698918ad8aa1f811b54d736d9ddeb6ce362490b3b91e28cb0cc9a3aef177699812440374b34d5aa1afd10e5f1e3

      • C:\ProgramData\mozglue.dll

        Filesize

        13KB

        MD5

        e0973c851cf715d6c7c37b730e16fe3b

        SHA1

        d3522f811f0510da0dc9d2339f1c171d0fa8f92c

        SHA256

        0ebb504f59b4c052440547d106d0d35afb603ebf624b56719ad5834deba0d0b5

        SHA512

        e4d48d5be1ac03a667e7a7c52f3c28e194fd6a8d3f2c76de56345fa22c91bbc10a283dd85b6cf8e44d16343e3a8e08f0fa8bbb1cd92eddde265d92abcf8c3e36

      • C:\ProgramData\mozglue.dll

        Filesize

        593KB

        MD5

        c8fd9be83bc728cc04beffafc2907fe9

        SHA1

        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

        SHA256

        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

        SHA512

        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

      • C:\ProgramData\msvcp140.dll

        Filesize

        15KB

        MD5

        996c5144b83215564c01a43416b00b19

        SHA1

        d9af8421046324573d5e777125f30fa46d22dee4

        SHA256

        44df496a9a92dd48b167a50f701f61f9dff90aa5c17aa3dce544b08fab4b1ec2

        SHA512

        33ecb9e9f37a7fb495bdde5a436c3e536ea258065a52b26172b5f5e9c9c788e76e5ab3534f4590d418b2277c758574a77d72d80ee8b427b0a1e364dbec2d04dd

      • C:\ProgramData\nss3.dll

        Filesize

        18KB

        MD5

        7642e524fff03e9503adcb4300f251d2

        SHA1

        8b1c256de7f81e21b88c87073914366f7b3cf5e2

        SHA256

        65114a89a13c3316e8b4844605378260ce92e55092703fbbd3fcbad0ea3d2cc3

        SHA512

        b89f477be0eb80b437062fe95d101a130be854235f50298130da95b911b4a4ce5bd6e8d63230caa31f65ff8a4039b092e3e0c3748925d54b57b51d97dfef4345

      • C:\ProgramData\nss3.dll

        Filesize

        2.0MB

        MD5

        1cc453cdf74f31e4d913ff9c10acdde2

        SHA1

        6e85eae544d6e965f15fa5c39700fa7202f3aafe

        SHA256

        ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

        SHA512

        dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

      • C:\ProgramData\softokn3.dll

        Filesize

        18KB

        MD5

        ed630d8999b3e6780f82eb1ec2cf4098

        SHA1

        bb38f8e2027c55b39fdaba21b877ebe9b5c4d5ba

        SHA256

        fc17a31bbf9f268118db6e36194f5931c209db4e6a6edcb7b7baa526a33a1dc2

        SHA512

        8dd30df722f3f717f188ad289eb8d578f1fd1277acaadc68f8c8cbdd34d171079139111b3c54856a95e65ce41233a323c548a0ed14bfab5de90738e5429b342d

      • C:\ProgramData\vcruntime140.dll

        Filesize

        13KB

        MD5

        f1fb3d3bd281c7012ea31a7f86c198b9

        SHA1

        30f6e245e20b786f374337b2fc086d20ee92d4a1

        SHA256

        98121e9e287a57f7b4587a3c93cdc613b6f626e7f8b9178e69d430489aa8f325

        SHA512

        474a0ea6dc9291ed0ff65c4c3caad737330e061a19b3517f76499098c7da550015b6547be7a6be083875ec3f46814ba67b69c500190389fd0fcc8e7f07b5ee89

      • C:\Users\AdminJJJDGIECFC.exe

        Filesize

        321KB

        MD5

        5831ebced7b72207603126ed67601c28

        SHA1

        2ba46b54074675cc132b2c4eb6f310b21c7d7041

        SHA256

        02097348db100eb22d46dc474a1078b5ddbb56ee916cc81f24fadd0a6938ac58

        SHA512

        a9924ef2373851156d981bc3c5b5d533e8b510abf6c3f12e62af0c019e740f0d077efb8f7f93699d797335df33013c72fd9ead3b2253dd82f14b7b330faacb8e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

        Filesize

        717B

        MD5

        822467b728b7a66b081c91795373789a

        SHA1

        d8f2f02e1eef62485a9feffd59ce837511749865

        SHA256

        af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

        SHA512

        bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

        Filesize

        2KB

        MD5

        be866b8cac2ee4ef9f82b89eac8e4c16

        SHA1

        46e0ea958226322baac1c9d83ae1dde09c9c3119

        SHA256

        8c2a88d2c06d851ec946fd5c6b7b7746824357edcd315938c96f59d5cd71fc39

        SHA512

        b8fc299d1c723ea0ddc1a91b59ef92f5d55875de02e1c7281577281a9b8ef93020cd1615321507750d550768b4d0bacc30ba4153fbc9eac1cd7026d13fd662bf

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

        Filesize

        2KB

        MD5

        d9b99d63755d3b61ef98e5ce4a2c5360

        SHA1

        3c6deb91e5634ead4fafe02c9094a84c728dd7d7

        SHA256

        18c144d485c6f38e0e79f083cf75e04615aa7066eb6ce0582b164acbdb0a0e80

        SHA512

        ee89dfb6b741ae6cda197f99fcfd8c99ff5b3a06b3fadcb6f128777a7bd31a76100d1234943f3365117ec27d6ae83e57357e69d5956b67cbd3dc94efcd8903fc

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

        Filesize

        1KB

        MD5

        30bbf79a5d8e291a526458c43603682c

        SHA1

        0d9a5f1a13a800b416cb803da570a1e82a2e40c1

        SHA256

        1c045ef45ff87b7422faef763da35e239c0d278f0d3d8fefa86f44d3b753da21

        SHA512

        2a415850423404cca839f5202a74799f17ab25f623d3b8d9e622e97488b769ced88f72ff1f2fc8101b0c7dc299d6329c10442b247b4c0a408cace5428f97e98a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

        Filesize

        192B

        MD5

        b317324e83036aa4527e67c850bbd9c9

        SHA1

        b2e9f1d6248142a36fb823392234c1b40571aa8e

        SHA256

        a4f051399ff9ebffa1fd4ef78ef2492f1e0a737803318a99dfb263cae30ea4bc

        SHA512

        dbc8e549b7ab639db93afe8ffa240ee744c617f2eb14b74f544480a9ab1ce1b6cd3f562a0db3755a9cdded1b2cf8122944fa3b9905ba0f6faa94f3a8f2a535ca

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

        Filesize

        458B

        MD5

        f67f694185c2b9a781ed1b6e43badcb6

        SHA1

        02cc87918ffca27c9420c66c86453a09b342bad9

        SHA256

        49c9e0ceaaccacf28b7f9d3e313528ccda0504de388470bbab130d3209679736

        SHA512

        cf3fab17bcd8636313ee00fb2526a32946df1fffd32cd14e3bea8dc4b698ce007d45dde5d75a97f5b8ada4a4ea0d968f2df3f317286bb6e101dd858ab66b5b06

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

        Filesize

        450B

        MD5

        1f4a77cd1e6cad1b3f71d308259491dd

        SHA1

        bffb7575a52389f3b0aea023cb3e175def976feb

        SHA256

        3294f8387cea6567387320ee0bd39a0a509039284b1b2e512be629aae6586da5

        SHA512

        f1781bd6658dc8507d6f421e2005cec4a81dcc55bb2721ad1e834bf5218b9153b02478fe115bfa525f9643e4bd9041c1933a64b3bc46fd880bdf446124ed6ab6

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

        Filesize

        458B

        MD5

        f064c3b08074a74290c4bc675f71c24e

        SHA1

        03eca5e0cf55abddc6d53e2ec2c19cdf6097a2d6

        SHA256

        9be12b1cae6053f325436df95452271accd7c4c0cf25157e7e17eeb331790eb4

        SHA512

        e9488cfe8c4b973e006ad1468c25b568009a272acb06122d7837a40448d3c2c37a8f49baa2b60260c99c8382d14eabcf62245ae568472772d12db2e40f82927d

      • memory/956-247-0x00000000005C0000-0x0000000000614000-memory.dmp

        Filesize

        336KB

      • memory/1944-118-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/1944-120-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/1944-150-0x0000000061E00000-0x0000000061EF3000-memory.dmp

        Filesize

        972KB

      • memory/1944-115-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/1944-206-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/1944-264-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/2604-135-0x00000000007C0000-0x000000000080A000-memory.dmp

        Filesize

        296KB

      • memory/3164-273-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/3164-274-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/3164-275-0x0000000020170000-0x00000000203CF000-memory.dmp

        Filesize

        2.4MB

      • memory/3808-254-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/3808-252-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/3808-250-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/4056-87-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4056-94-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4056-86-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4056-95-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4056-61-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4056-4-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4056-7-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4056-60-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4056-9-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4056-59-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4056-26-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4056-43-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4056-28-0x000000001FBF0000-0x000000001FE4F000-memory.dmp

        Filesize

        2.4MB

      • memory/4056-27-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4220-112-0x000000007167E000-0x000000007167F000-memory.dmp

        Filesize

        4KB

      • memory/4220-113-0x0000000000E30000-0x0000000000E68000-memory.dmp

        Filesize

        224KB

      • memory/4220-121-0x0000000071670000-0x0000000071E21000-memory.dmp

        Filesize

        7.7MB

      • memory/4220-119-0x0000000071670000-0x0000000071E21000-memory.dmp

        Filesize

        7.7MB

      • memory/4688-12-0x00000000742A0000-0x0000000074A51000-memory.dmp

        Filesize

        7.7MB

      • memory/4688-1-0x0000000000EE0000-0x0000000000F2A000-memory.dmp

        Filesize

        296KB

      • memory/4688-2-0x0000000005E70000-0x0000000006416000-memory.dmp

        Filesize

        5.6MB

      • memory/4688-68-0x00000000742A0000-0x0000000074A51000-memory.dmp

        Filesize

        7.7MB

      • memory/4688-0-0x00000000742AE000-0x00000000742AF000-memory.dmp

        Filesize

        4KB

      • memory/4816-185-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4816-184-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4816-205-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4816-141-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4816-139-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4816-137-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4816-190-0x00000000227D0000-0x0000000022A2F000-memory.dmp

        Filesize

        2.4MB

      • memory/4816-204-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB