Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    24s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16/09/2024, 11:11

General

  • Target

    file.exe

  • Size

    283KB

  • MD5

    3817c947e0d26bde329f7481b6d76709

  • SHA1

    8f1003d9bd8194b486634df3bbe6dbd64b923e9f

  • SHA256

    a1d7a27d0db33680df06c7b7ac1a58ba17c18843af52782f57ec7f94bb023a75

  • SHA512

    79cff23f8fad0c1ad2cfcda5f7ab1e4b618c4d49fb4a488cb986b1f708ebe94fb0751f9a6d99e4acebef4a70e4c101bb60db85455bdfbeaa66b5246672698017

  • SSDEEP

    6144:J4C2lKti9a/UIPZHrk6BcHvJ1rOjMmmqAZMzLswInEO:J4iwerk6qHrCMmbEyABEO

Malware Config

Extracted

Family

vidar

C2

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Signatures

  • Detect Vidar Stealer 20 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 14 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1404
      • C:\ProgramData\GDHIDHIEGI.exe
        "C:\ProgramData\GDHIDHIEGI.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2884
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          PID:2160
      • C:\ProgramData\FIDHIEBAAK.exe
        "C:\ProgramData\FIDHIEBAAK.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1764
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1920
      • C:\ProgramData\JDGCFBAFBF.exe
        "C:\ProgramData\JDGCFBAFBF.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2696
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
            PID:2360
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:1684
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c start "" "C:\ProgramData\BKJKJEHJJD.exe"
              5⤵
                PID:1892
                • C:\ProgramData\BKJKJEHJJD.exe
                  "C:\ProgramData\BKJKJEHJJD.exe"
                  6⤵
                    PID:3048
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      7⤵
                        PID:1076
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c start "" "C:\ProgramData\BAKKEGCAAE.exe"
                    5⤵
                      PID:2268
                      • C:\ProgramData\BAKKEGCAAE.exe
                        "C:\ProgramData\BAKKEGCAAE.exe"
                        6⤵
                          PID:756
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            7⤵
                              PID:1632
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\AKFHCAKJDBKK" & exit
                      3⤵
                        PID:304
                        • C:\Windows\SysWOW64\timeout.exe
                          timeout /t 10
                          4⤵
                          • Delays execution with timeout.exe
                          PID:3052

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\ProgramData\FIDHIEBAAK.exe

                    Filesize

                    283KB

                    MD5

                    ac7314c596e766b8f4f368579e2e0f8f

                    SHA1

                    0e4941e5e4299d04b9408194542c7362bcabcd2f

                    SHA256

                    be442a04bc031b4dc72835efeeeb025e9a103c8012382173965fba30bd3a96b9

                    SHA512

                    4258b6d15cd1c87d1787507f9132e5cf2caebfbf46dd055950dec8bb55faa094571d5b88cc58078adbab49f72fd3439f14ccae04de3d4bde672a540699a49428

                  • C:\ProgramData\JDGCFBAFBF.exe

                    Filesize

                    207KB

                    MD5

                    b1394501c618f78b74c3ca0c2d81a33b

                    SHA1

                    73707a6facef7e1750fb6d47f3aa840558b17a30

                    SHA256

                    32d0ae27d9ae49a224785cd08bae82b0ec4e944145cb2f106873f70fc2908fe7

                    SHA512

                    0b3aff6484ee73136fd3bf36afad78f126e520b599def3c76b2e83e150fc919d484fd18d7bce0e006abae554db50ef566a6d13ac349c32fae67ea8e8796ce121

                  • C:\ProgramData\JJEGIJEGDBFHDGCAFCAE

                    Filesize

                    6KB

                    MD5

                    1af6a4fceca8cf9b1456af5963f37d18

                    SHA1

                    7ff50958391c008363e35bde7b52bc7f2b4fb9cb

                    SHA256

                    b38b259112b6b354faf5d8ee38e661c6c9dc81d94966b60b4424db4b63f4bfb2

                    SHA512

                    dbd7d1af5f2de7e4a3e809b2ca5c8b92f9a974a725961284017c40c6e3c92d5670b075a734814dccf894165faa7d755c4baf7feb70a6184d63576f6a5389aa79

                  • C:\ProgramData\KEGCBKKJDHJJ\IDHIIJ

                    Filesize

                    20KB

                    MD5

                    c9ff7748d8fcef4cf84a5501e996a641

                    SHA1

                    02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

                    SHA256

                    4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

                    SHA512

                    d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

                  • C:\ProgramData\KEGCBKKJDHJJ\JKFIDG

                    Filesize

                    46KB

                    MD5

                    02d2c46697e3714e49f46b680b9a6b83

                    SHA1

                    84f98b56d49f01e9b6b76a4e21accf64fd319140

                    SHA256

                    522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                    SHA512

                    60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                  • C:\ProgramData\KJEHDHIE

                    Filesize

                    92KB

                    MD5

                    102841a614a648b375e94e751611b38f

                    SHA1

                    1368e0d6d73fa3cee946bdbf474f577afffe2a43

                    SHA256

                    c82ee2a0dc2518cb1771e07ce4b91f5ef763dd3dd006819aece867e82a139264

                    SHA512

                    ca18a888dca452c6b08ad9f14b4936eb9223346c45c96629c3ee4dd6742e947b6825662b42e793135e205af77ad35e6765ac6a2b42cefed94781b3463a811f0a

                  • C:\ProgramData\freebl3.dll

                    Filesize

                    219KB

                    MD5

                    28c4d0e3cdd4f30edfc99baf5225394b

                    SHA1

                    85878e1839471f6e23e0613574883fe71d147909

                    SHA256

                    2b34103f9ffacd451640ce78aa026a2a3175c38a5405e1b875959a8c5be0baaa

                    SHA512

                    e74980d4a2860ba3051410e92166ce9343948a7a5e68069289f1fdeee2c8171c3218f8dbda8b08363223b67faa3f781716ae902aa4a7842a51edfae126bf69ba

                  • C:\ProgramData\msvcp140.dll

                    Filesize

                    13KB

                    MD5

                    e416a22acaeff6cec5aa36a72becbede

                    SHA1

                    9fefce2eafd2e79ce0f0c60e2174b0052bfd0d2f

                    SHA256

                    edc0250d8dfe5b4049a64b6171d12ad701784f4650484d35315ab5286384e79e

                    SHA512

                    8ab549504e9c7f787e4ace97bcce5eed5bd9758b8cc223eae537e5ba3dc0f22ddd84802b1c43c2e947aa0a97742793b8cd09a5563ccd21820fa00bb5c1294421

                  • C:\ProgramData\softokn3.dll

                    Filesize

                    157KB

                    MD5

                    9b02ef1fa48110db8f7e8bee437d67ee

                    SHA1

                    b71c3d92b5bd74d4344025326e17671e53bb4c99

                    SHA256

                    b618543f27e25591a999d037ce31261c3fc01d3e6246f80a79704949678c4992

                    SHA512

                    9e97d3c4ecb84873406432422ac5dd1311b37d71afe3da7709e18e7bf92d8b96b3b1fca2500f5ebfee66a8a881790bd36d2f46caf1e6ea71392c36ad947f4436

                  • C:\ProgramData\vcruntime140.dll

                    Filesize

                    78KB

                    MD5

                    a37ee36b536409056a86f50e67777dd7

                    SHA1

                    1cafa159292aa736fc595fc04e16325b27cd6750

                    SHA256

                    8934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825

                    SHA512

                    3a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                    Filesize

                    717B

                    MD5

                    822467b728b7a66b081c91795373789a

                    SHA1

                    d8f2f02e1eef62485a9feffd59ce837511749865

                    SHA256

                    af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

                    SHA512

                    bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0B0E2398AAEC29C6B80CB11B0A298FD

                    Filesize

                    504B

                    MD5

                    0fa6525234cdeaa5f3b77aa6c6fa80f4

                    SHA1

                    8ac7f58d7bfc8075ed6f838ab6258d1971718e60

                    SHA256

                    becff27a14d620e204d5e94104940baf284090af69434f3e1220c657c5737f82

                    SHA512

                    e7a343e508e126a003fd73ac1750081d46e84859a145792ed69cecf88150515b4f1a63074e9775d7bd24b0ba72835d69ef7a87993a16f5b1f613471453a3a25e

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

                    Filesize

                    471B

                    MD5

                    c1588d04597ff6ef2986ff7e8c236fd9

                    SHA1

                    d433792785b9cf2ea6f4a0cf52811e3e8ba0c51e

                    SHA256

                    48655dcd73a09d4eb2c2e4fa394016d6776b819ba5a3ff1472ff7fccb1c46066

                    SHA512

                    306801673868b2a7e2bc9884f9d9a9735cd878de888536dfa26faec0a0dccc9d230ddbf2d98253c6cef2aef52384f8b4bd56b061c7148decbab33b3f649cc909

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                    Filesize

                    192B

                    MD5

                    2a0bf7469790e2290d4a9772cdd6da1b

                    SHA1

                    dc52bf7a2a896b92b118fcda245a906a6aac15f1

                    SHA256

                    445807f0add850e31d38d8425e2365f82e153a4ac009b464b714d8e0a8786e6f

                    SHA512

                    42c0fee4046a0666b5226198c843dcca3d1d86f6c19e66c7a3b47045f1d7e62946fd70faef9f115c02e41f5f606c52b974dc05c68f546f98daf4b01745652ab3

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    fd7dab4b8380dd8c11a4730dd54cedd0

                    SHA1

                    d892bfe1ab76d91a105c69111d949b4cf2dac86c

                    SHA256

                    0f83c1c13372691990d2aa38d6611edd63cb609493b4d5d377574927ecebe4dd

                    SHA512

                    dc2ff6b07cb24d8ee14cc0d88edf60f5fc6ea7ac1aefa029296b9e49661679a57ea75e257b2408b8858dec15bcd4b370e461fe6e277d50bed4fc9fdf23224c6e

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    8a2be535e21b73688d3a52d472d944b6

                    SHA1

                    5c59b6d48c271f4349770cb38772eb0804406163

                    SHA256

                    3a14fddb89f0e7621ec0eb22533dc7556d32b834bead48b79126a3ff5d3bfd06

                    SHA512

                    a457cb779023bd462490b13949160dca980ec99aacf362d3f57c29f672083de52cf2a7d6a68aa0e9cbcbc2f8984c9868b78d8b149bd9ea0b29b11a9f4fc7a7dc

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    4836cec1b8974ae1f9d49d41087ebcc1

                    SHA1

                    200366061f661330976fb649c16d58c9f6c1d71c

                    SHA256

                    8dc4fd09061ff832c5b5c9ca323b65a66e95784ecc9d91c69d94f630ddcc6f29

                    SHA512

                    534f8e854c2c5b97686b320930dad221c48dedc194518e9cbdc6afc65e51400e98335c13a32cd3607d80701eaed06ea067eb4ede60b998915da297aa214ab9b5

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0B0E2398AAEC29C6B80CB11B0A298FD

                    Filesize

                    546B

                    MD5

                    89d248dd819a86bd1bf5e0a0d11feb7d

                    SHA1

                    f2e29f8d846246b8cadb833540490f6c61f2d1bc

                    SHA256

                    12ab94444829a462529aef4f99dbdb32b2efb75b21edbc79fdf1b1dfee4ee59b

                    SHA512

                    c5e7d484fcfdfdc4fe41691d1ade91a6dced257f15d9e78f20fcd98b7dc8065389e9460f603fc634c2733e1663e180d3bfcde450d885343e7247b3ec5b219f05

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

                    Filesize

                    400B

                    MD5

                    ec01552e024310ca0ee02f64eb19c544

                    SHA1

                    4fb058be2a1362141dc6c1c80fa02f3b826e8653

                    SHA256

                    2eff2cbbdc1373aa1ea0585e967a812044f86840b0b3358f4ed0e77c5c7d88e3

                    SHA512

                    489dea7f75f4e865df4ddf1a269e6a83c9bbdbb21a9c9a63a25130c523fe9ea727118d0481a287d907b24fd5206fe786ed7d9659d1adda5690d31cca459e8f49

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\76561199768374681[1].htm

                    Filesize

                    33KB

                    MD5

                    81ed3931739561cbb1dd1bfbfae752f9

                    SHA1

                    5173af8cb0843425c2eafa280f24f51171f0ec12

                    SHA256

                    1bf4d9ef093cc5e627d4e44ffbe15cd1451c9b8cbc88cd034f4831adbdd596cf

                    SHA512

                    69dca71b8fd635f3706c6ae202ad8fcbf20af149beb8f670be48e969ba1607dcd213a63378a584286fcbef0ad1573bcdf19a3624ad4709f67b2637376f1b997e

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S8GI6B9B\76561199768374681[1].htm

                    Filesize

                    33KB

                    MD5

                    45360d3f1a2657e1f1bed0ceddbea00f

                    SHA1

                    6dc8cf526ab3f35c0ff0f77d9416550f63fbe7dc

                    SHA256

                    e85ba2f1ea01af662121562185f2f78549f11875effefd9e9d9fd1eb95082164

                    SHA512

                    22c81492f4db6e72b1edd63c2752180a8ba57858be37a97f597084fbecfce7a8ed065c28000ad06e24d1c13110501e335291530c423ab843936b2cf8e0471894

                  • C:\Users\Admin\AppData\Local\Temp\CabACD5.tmp

                    Filesize

                    70KB

                    MD5

                    49aebf8cbd62d92ac215b2923fb1b9f5

                    SHA1

                    1723be06719828dda65ad804298d0431f6aff976

                    SHA256

                    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                    SHA512

                    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                  • C:\Users\Admin\AppData\Local\Temp\TarACF7.tmp

                    Filesize

                    181KB

                    MD5

                    4ea6026cf93ec6338144661bf1202cd1

                    SHA1

                    a1dec9044f750ad887935a01430bf49322fbdcb7

                    SHA256

                    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                    SHA512

                    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                  • \ProgramData\GDHIDHIEGI.exe

                    Filesize

                    322KB

                    MD5

                    23f66b62580e25c71d847802432019f5

                    SHA1

                    f1da07d11332465fbf5c456660d756350dbff889

                    SHA256

                    7bf0a7a8bf646c29d39ad64c36b6baae45572cee1ef7695bff3923aa3726705c

                    SHA512

                    e59e8581e8df58672ce1780f25d330793522ee450717e7ef3d96501474760ac3fc728f954ca8df0dbbd8d23fc9705d8afdc64e1476738598ce93cc5adefc2efc

                  • \ProgramData\mozglue.dll

                    Filesize

                    593KB

                    MD5

                    c8fd9be83bc728cc04beffafc2907fe9

                    SHA1

                    95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                    SHA256

                    ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                    SHA512

                    fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                  • \ProgramData\nss3.dll

                    Filesize

                    2.0MB

                    MD5

                    1cc453cdf74f31e4d913ff9c10acdde2

                    SHA1

                    6e85eae544d6e965f15fa5c39700fa7202f3aafe

                    SHA256

                    ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                    SHA512

                    dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                  • memory/756-793-0x0000000000200000-0x0000000000254000-memory.dmp

                    Filesize

                    336KB

                  • memory/1404-226-0x0000000000400000-0x0000000000657000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1404-420-0x0000000000400000-0x0000000000657000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1404-4-0x0000000000400000-0x0000000000657000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1404-3-0x0000000000400000-0x0000000000657000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1404-15-0x0000000000400000-0x0000000000657000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1404-12-0x0000000000400000-0x0000000000657000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1404-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                    Filesize

                    4KB

                  • memory/1404-9-0x0000000000400000-0x0000000000657000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1404-8-0x0000000000400000-0x0000000000657000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1404-6-0x0000000000400000-0x0000000000657000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1404-5-0x0000000000400000-0x0000000000657000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1404-17-0x0000000000400000-0x0000000000657000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1404-439-0x0000000000400000-0x0000000000657000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1404-158-0x0000000000400000-0x0000000000657000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1404-177-0x0000000000400000-0x0000000000657000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1404-197-0x000000001DD90000-0x000000001DFEF000-memory.dmp

                    Filesize

                    2.4MB

                  • memory/1404-207-0x0000000000400000-0x0000000000657000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1404-358-0x0000000000400000-0x0000000000657000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1404-377-0x0000000000400000-0x0000000000657000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1684-620-0x0000000000400000-0x0000000000643000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1684-622-0x0000000000400000-0x0000000000643000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1684-616-0x0000000000400000-0x0000000000643000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1684-618-0x0000000000400000-0x0000000000643000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1764-558-0x0000000000D50000-0x0000000000D9A000-memory.dmp

                    Filesize

                    296KB

                  • memory/1920-583-0x0000000000400000-0x0000000000657000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1920-574-0x0000000000400000-0x0000000000657000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1920-572-0x0000000000400000-0x0000000000657000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1920-576-0x0000000000400000-0x0000000000657000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1920-578-0x0000000000400000-0x0000000000657000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1920-580-0x0000000000400000-0x0000000000657000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1920-586-0x0000000000400000-0x0000000000657000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1920-584-0x0000000000400000-0x0000000000657000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/2160-527-0x0000000000400000-0x0000000000458000-memory.dmp

                    Filesize

                    352KB

                  • memory/2160-529-0x0000000000400000-0x0000000000458000-memory.dmp

                    Filesize

                    352KB

                  • memory/2160-524-0x0000000000400000-0x0000000000458000-memory.dmp

                    Filesize

                    352KB

                  • memory/2160-532-0x0000000000400000-0x0000000000458000-memory.dmp

                    Filesize

                    352KB

                  • memory/2160-520-0x0000000000400000-0x0000000000458000-memory.dmp

                    Filesize

                    352KB

                  • memory/2160-521-0x0000000000400000-0x0000000000458000-memory.dmp

                    Filesize

                    352KB

                  • memory/2160-522-0x0000000000400000-0x0000000000458000-memory.dmp

                    Filesize

                    352KB

                  • memory/2160-523-0x0000000000400000-0x0000000000458000-memory.dmp

                    Filesize

                    352KB

                  • memory/2364-0-0x000000007477E000-0x000000007477F000-memory.dmp

                    Filesize

                    4KB

                  • memory/2364-243-0x0000000074770000-0x0000000074E5E000-memory.dmp

                    Filesize

                    6.9MB

                  • memory/2364-13-0x0000000074770000-0x0000000074E5E000-memory.dmp

                    Filesize

                    6.9MB

                  • memory/2364-1-0x0000000000220000-0x000000000026A000-memory.dmp

                    Filesize

                    296KB

                  • memory/2696-606-0x0000000000120000-0x0000000000158000-memory.dmp

                    Filesize

                    224KB

                  • memory/2884-499-0x000000007302E000-0x000000007302F000-memory.dmp

                    Filesize

                    4KB

                  • memory/2884-531-0x0000000073020000-0x000000007370E000-memory.dmp

                    Filesize

                    6.9MB

                  • memory/2884-500-0x0000000000CE0000-0x0000000000D34000-memory.dmp

                    Filesize

                    336KB

                  • memory/3048-758-0x0000000001290000-0x00000000012DA000-memory.dmp

                    Filesize

                    296KB