Analysis

  • max time kernel
    80s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-09-2024 07:24

General

  • Target

    6a29ad0875e10f90cc6f55458e76f60b06a02da68ed6dcd8c9f856872ab2f053.exe

  • Size

    293KB

  • MD5

    2cc2bd304829360c40a79c5156173cc5

  • SHA1

    d998655a0863734b4922c51209435333d7a7b940

  • SHA256

    6a29ad0875e10f90cc6f55458e76f60b06a02da68ed6dcd8c9f856872ab2f053

  • SHA512

    06b9e2844a9332f135542ed3dfcd356225d7c1fe987a919a0df11fd5209242edc751a5ac181aafcfaa487b8e59f81f9f07af70f0f59f6bd1b8d2c131b0060f44

  • SSDEEP

    6144:kgBofTlaXr7498jq34VVgKzIZ8GkQ15OcqZwRyOEhqDmPyUgW7M9UhrEW/IEO:kdfZaXEyVgKqoQ15OcqZ+5E8cgcmjWwt

Malware Config

Extracted

Family

vidar

C2

https://t.me/fneogr

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Signatures

  • Detect Vidar Stealer 22 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 5 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a29ad0875e10f90cc6f55458e76f60b06a02da68ed6dcd8c9f856872ab2f053.exe
    "C:\Users\Admin\AppData\Local\Temp\6a29ad0875e10f90cc6f55458e76f60b06a02da68ed6dcd8c9f856872ab2f053.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4592
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Checks computer location settings
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\ProgramData\KJKJKFCBKK.exe
        "C:\ProgramData\KJKJKFCBKK.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3160
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • Checks computer location settings
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3224
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminBAAAAKJKJE.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3976
            • C:\Users\AdminBAAAAKJKJE.exe
              "C:\Users\AdminBAAAAKJKJE.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2756
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                7⤵
                  PID:3404
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  7⤵
                  • System Location Discovery: System Language Discovery
                  PID:5068
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminFCBAECGIEB.exe"
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3288
              • C:\Users\AdminFCBAECGIEB.exe
                "C:\Users\AdminFCBAECGIEB.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                PID:2800
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Checks processor information in registry
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3640
        • C:\ProgramData\EBFBKFBGII.exe
          "C:\ProgramData\EBFBKFBGII.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1424
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:2400
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\IIIEBGCBGIDH" & exit
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:620
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 10
            4⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:2960

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\AFIDGDBGCAAF\DBKEGC

      Filesize

      20KB

      MD5

      a603e09d617fea7517059b4924b1df93

      SHA1

      31d66e1496e0229c6a312f8be05da3f813b3fa9e

      SHA256

      ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7

      SHA512

      eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc

    • C:\ProgramData\AFIDGDBGCAAF\DBKEGC

      Filesize

      160KB

      MD5

      f310cf1ff562ae14449e0167a3e1fe46

      SHA1

      85c58afa9049467031c6c2b17f5c12ca73bb2788

      SHA256

      e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

      SHA512

      1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

    • C:\ProgramData\AFIDGDBGCAAF\KFHJJJ

      Filesize

      40KB

      MD5

      a182561a527f929489bf4b8f74f65cd7

      SHA1

      8cd6866594759711ea1836e86a5b7ca64ee8911f

      SHA256

      42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

      SHA512

      9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

    • C:\ProgramData\BGHIDGCAFCBAAAAAFHDA

      Filesize

      11KB

      MD5

      7b0da8a001df899c45e9b55aef1db269

      SHA1

      22026d6dcbc18d91245e4d1005e10262a54b3249

      SHA256

      90af799da7afe122bb55148d682829473726bd1db99928e80f7c193052cbdc5b

      SHA512

      ad5e7f5d887559108de6a32f9fdd3ca564458956d3321effe31968f74980bdf92cff10cecbba7e4cd8f8062f27078a781a1b0aa98e2c98abd06e851948cc0ed1

    • C:\ProgramData\EBFBKFBGII.exe

      Filesize

      283KB

      MD5

      449d3f0970fc9cd91a8f4bea664a0cd6

      SHA1

      2a2624a79afaf0fcb01c44f8106c8bf8933106e0

      SHA256

      33da286e78538e3f5eda7b23c70578a1fda8a5b98069bd269b8a6035babe2b23

      SHA512

      e7888f333695f9fe1cda7db15f154a1261ec7cb1b67e6efb9b5c19183f5b092bea736ca768a60a5f102982a3c8e5ea1bd79035ab15f3db37c104dad9c5a48d33

    • C:\ProgramData\GIIEGHID

      Filesize

      114KB

      MD5

      e110cbe124e96c721e3839076f73aa99

      SHA1

      02c668c17c7fae5613073e9641bc9bcff96c65a0

      SHA256

      a793f3d212f395bfc8973231a22a6013c0e334443aa4172a8b5d611bb0f378a7

      SHA512

      8d91ff245f703e5dbee68085e9ca0de4b2fc044befcf79977f46bb8bfd908fa0e22ec0dd6a2b400e9ff447f888b550635ed82ebda18575d17b1f3d478a45f5dc

    • C:\ProgramData\JKEGDHCF

      Filesize

      116KB

      MD5

      f70aa3fa04f0536280f872ad17973c3d

      SHA1

      50a7b889329a92de1b272d0ecf5fce87395d3123

      SHA256

      8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

      SHA512

      30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

    • C:\ProgramData\KJKJKFCBKK.exe

      Filesize

      207KB

      MD5

      cd6646d9eddb6ed8900b5bd9da0597f2

      SHA1

      d87cb53b2b10d804721c80894bccbc989df5acae

      SHA256

      743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24

      SHA512

      39060c059137fd3fd00405043e97608481bf2035090a0f5aafebec84975c701296e9227f3e61977a14d9767830be4cdf1b2fd36c443643b73ec135f438b8a8b6

    • C:\ProgramData\freebl3.dll

      Filesize

      30KB

      MD5

      d6240f07ecdd0e2af30c116b8baf0ed8

      SHA1

      b8e11742481828d78de2df3bc995d4d519752e19

      SHA256

      2e6947b3386dfa29b4fb34a3d4ff1db1fafb549d079b0fe3d103c65257616a7c

      SHA512

      de0460900645369744773a28dca94015bea6a72be9b90c42e6b21c50797b33fad7b09e200b12b9bb54c10076c3c3ea8e4a6eb15e36c4ccf73473b886daea7573

    • C:\ProgramData\mozglue.dll

      Filesize

      11KB

      MD5

      3016af45a4c7045b394c9a131197754e

      SHA1

      04ddb46a00ec97a965f199fdc80bb5eb1088a5c0

      SHA256

      077707610bbfd5f1e371e5eebbf263de599863ae3fe3c3ca93bbe8a70eb3aedc

      SHA512

      1bae6407a7870c2e0720b548b4e9b5855d2a1b155ad13be48173fb3625abe4141b94d1fbbbc32f177b5646dfe929de863e9bd68794c344cda5b304e927b01244

    • C:\ProgramData\mozglue.dll

      Filesize

      593KB

      MD5

      c8fd9be83bc728cc04beffafc2907fe9

      SHA1

      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

      SHA256

      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

      SHA512

      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

    • C:\ProgramData\msvcp140.dll

      Filesize

      185KB

      MD5

      7e48e0175209d2215f076d61ec25eb76

      SHA1

      aea491255f7522d38c683013fbbc4a15e77979af

      SHA256

      3cd2089889c83ed1af3bef1d428037a4d415b15d501a0ad4f3f2ed62ce7a8cb2

      SHA512

      5a0f7d295d5d739df171accb893f6577be090da17ccdac1ae996f9fad0b0f55d356e112369f372be7c71769ab4ee40d6fbe57575a93d3d628fe51f4594142879

    • C:\ProgramData\nss3.dll

      Filesize

      6KB

      MD5

      1db3b113ea14925949ea3452b564df26

      SHA1

      7b93c9ae6f741e2b7351b222a279aa9a45b3c86d

      SHA256

      61bd0e9e6cee5cfdbe5c56816e87fa00bb58561b654271357a6acaf351036c5f

      SHA512

      59975ae510fa57fd5105878f06943ddef5924a5cb42bfefb5b2816b2ec8adb12b4767d95784f7c476dabfaef66f8bf6f5413b0bc373987df6e4cb47d14448d69

    • C:\ProgramData\nss3.dll

      Filesize

      2.0MB

      MD5

      1cc453cdf74f31e4d913ff9c10acdde2

      SHA1

      6e85eae544d6e965f15fa5c39700fa7202f3aafe

      SHA256

      ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

      SHA512

      dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

    • C:\Users\AdminBAAAAKJKJE.exe

      Filesize

      321KB

      MD5

      5831ebced7b72207603126ed67601c28

      SHA1

      2ba46b54074675cc132b2c4eb6f310b21c7d7041

      SHA256

      02097348db100eb22d46dc474a1078b5ddbb56ee916cc81f24fadd0a6938ac58

      SHA512

      a9924ef2373851156d981bc3c5b5d533e8b510abf6c3f12e62af0c019e740f0d077efb8f7f93699d797335df33013c72fd9ead3b2253dd82f14b7b330faacb8e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

      Filesize

      717B

      MD5

      822467b728b7a66b081c91795373789a

      SHA1

      d8f2f02e1eef62485a9feffd59ce837511749865

      SHA256

      af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

      SHA512

      bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

      Filesize

      2KB

      MD5

      375415776602c95039b112490beef7b8

      SHA1

      60c665ce93548d1634b3b86419a0b31ed2ef267d

      SHA256

      7adb9f2f9214814e7d669a867636b029862d5840cbfde3805be93d04f37a8939

      SHA512

      f6f26f2b52be8f8815f354da5e1fd50de93e6b40a79ca6535b055e03db7cf01ef3a5017e1d857f2a3b8f5ec27103e3f053f613ec7343da1d3fb008894db73939

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

      Filesize

      2KB

      MD5

      4f28f91cf083663dc10c8c83d7fec78a

      SHA1

      4874e9a130dfa66257800c7e4c53f370fd29db84

      SHA256

      fa6b9ac9ae1c57705c63fb5fe4cb721582f236dde25668a5f63a59769cb99287

      SHA512

      e27e3df78d6c0bd6dde4479ef8538e7da4d907fcb2c31ae792b4bb7190465ff6a8f4651281a9a2bbad4939b4d0288feb22666945675b51f99b35611e2c8a8244

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B84E13677C80694CBFF0221DAF79ACF3

      Filesize

      504B

      MD5

      86950f5a653e1624573277324dd5f88b

      SHA1

      771a75f62e942505dd4eb449dd8f090d2ee04183

      SHA256

      77595f3804a8300e7712e3f88ab1dd47bea3596ec5f63178dedadb21da21af7b

      SHA512

      3678d88496e446a04ffc5103e0a08b250b256729d93c68f26e6840d455c5bf084baf99ea506d27f0f63fb3ef0a2849179dd53032a5f5fa8b46b9da97d3c18b1d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

      Filesize

      1KB

      MD5

      39dd18b819ba32ca53632f479d93e548

      SHA1

      f4948bf5fe935263f25bd254d17f193f42eac43b

      SHA256

      5fb8bb665baa6b5a09f0962d71661f6cad2c8276f89bd10783b36ccab0f468a1

      SHA512

      49966211cc26a738cb1442f8fc24f37a28ff1563f37df959ebe3588684a3c4bacd79ffc361c678c6fee015b99c909450e16592efd6896d13e7a7d6d5234ff750

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

      Filesize

      192B

      MD5

      fc6aa34c8f4d8226981b4fbe2b6f69b5

      SHA1

      4a4e8da0433b424f20f0c230e6f3c0b446f74fe9

      SHA256

      1284b979012305f3041312ca84cf29540dc772af5b3da963c926b252590a5ab8

      SHA512

      8872af563d7d79bb5f4debec1bee6e4fa5fde4e3e0ed43dd8ecc139822a317d9d41bf047077a4873251cc0a3669c1714dc3c0484520abae35082540ecdfe3964

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

      Filesize

      458B

      MD5

      371540b483adfcfe3782b434c8d3caaa

      SHA1

      38419e2d850d43579358bc4edfd7453dc85afd3f

      SHA256

      b007932d5738eff3ad4b37ade7a4631712710ead4ca74b585a246df029fc314e

      SHA512

      01621322fac3bdbcf015d5dc56965cef888bbfb764764fab3aec6c1b242a4c8811bac242ccf0359bbf2010db9f7fa11057fe7714339311510fac43f21ff743a1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

      Filesize

      450B

      MD5

      650bff9fd69d69614852ebe0170539b6

      SHA1

      c3c51361867bbd4363ef4ed06787f92cd7aa2c36

      SHA256

      4903c959dfc10a198168a9796698448d6e56d0c611923f7618f373e514f5997d

      SHA512

      38e4bf53e0824e9155ea2bb5734a8f2a50b482211e35c5876af69c9409c561f534aabb20ddcd859c9158a663e4fce7a4574caec4ab48967715f2ba2b15e7fbcf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B84E13677C80694CBFF0221DAF79ACF3

      Filesize

      550B

      MD5

      e273cb9cf928c07e9be1d769b6bbc30d

      SHA1

      542e7b5aa3c6e69b5d1b2f633ad0ab7b36f4f837

      SHA256

      d008a079901e6277ee53e30742a62f59da628a32161e9160039a85567d688e0d

      SHA512

      adfcbaddf9de6553fb116f097b98d9affed6a06dd9078d50406ef5b29c7392cc50f1441809dc4692e1b01ef941faa99a698c49ce2fcb0ed9570f0905e03aeb73

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

      Filesize

      458B

      MD5

      c721dc2207a727b09512281c91a3c237

      SHA1

      563ac6245d1be9f56b8e4cac0a0ddf3faccbd57d

      SHA256

      786170f3b9f99f3744ca4bd9403a96f07cc3160c0dbb2e4eea6455d50926f362

      SHA512

      b807db6f11615361697f16631c9f3874073af96110fc8f861fae5c8fd13fd96701016b4b4453e1fc6829170025d7d2665886446ef92f38465f8c35e7de95df5f

    • memory/1424-137-0x0000000000430000-0x000000000047A000-memory.dmp

      Filesize

      296KB

    • memory/2400-252-0x00000000227C0000-0x0000000022A1F000-memory.dmp

      Filesize

      2.4MB

    • memory/2400-243-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/2400-247-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/2400-139-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/2400-143-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/2400-141-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/2400-266-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/2400-275-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/2484-94-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/2484-43-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/2484-93-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/2484-85-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/2484-86-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/2484-61-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/2484-3-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/2484-7-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/2484-59-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/2484-9-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/2484-42-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/2484-27-0x00000000221F0000-0x000000002244F000-memory.dmp

      Filesize

      2.4MB

    • memory/2484-26-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/2484-25-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/2756-234-0x0000000000EF0000-0x0000000000F44000-memory.dmp

      Filesize

      336KB

    • memory/3160-276-0x00000000720A0000-0x0000000072850000-memory.dmp

      Filesize

      7.7MB

    • memory/3160-114-0x00000000720AE000-0x00000000720AF000-memory.dmp

      Filesize

      4KB

    • memory/3160-122-0x00000000720A0000-0x0000000072850000-memory.dmp

      Filesize

      7.7MB

    • memory/3160-115-0x0000000000ED0000-0x0000000000F08000-memory.dmp

      Filesize

      224KB

    • memory/3160-116-0x0000000005C50000-0x00000000061F4000-memory.dmp

      Filesize

      5.6MB

    • memory/3224-147-0x0000000061E00000-0x0000000061EF3000-memory.dmp

      Filesize

      972KB

    • memory/3224-123-0x0000000000400000-0x0000000000643000-memory.dmp

      Filesize

      2.3MB

    • memory/3224-121-0x0000000000400000-0x0000000000643000-memory.dmp

      Filesize

      2.3MB

    • memory/3224-250-0x0000000000400000-0x0000000000643000-memory.dmp

      Filesize

      2.3MB

    • memory/3224-118-0x0000000000400000-0x0000000000643000-memory.dmp

      Filesize

      2.3MB

    • memory/3640-277-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/3640-278-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/3640-279-0x00000000203A0000-0x00000000205FF000-memory.dmp

      Filesize

      2.4MB

    • memory/4592-0-0x0000000074B4E000-0x0000000074B4F000-memory.dmp

      Filesize

      4KB

    • memory/4592-1-0x0000000000BE0000-0x0000000000C2A000-memory.dmp

      Filesize

      296KB

    • memory/4592-5-0x0000000074B40000-0x00000000752F0000-memory.dmp

      Filesize

      7.7MB

    • memory/4592-60-0x0000000074B40000-0x00000000752F0000-memory.dmp

      Filesize

      7.7MB

    • memory/5068-237-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/5068-241-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/5068-239-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB