Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    78s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/09/2024, 11:11

General

  • Target

    file.exe

  • Size

    283KB

  • MD5

    3817c947e0d26bde329f7481b6d76709

  • SHA1

    8f1003d9bd8194b486634df3bbe6dbd64b923e9f

  • SHA256

    a1d7a27d0db33680df06c7b7ac1a58ba17c18843af52782f57ec7f94bb023a75

  • SHA512

    79cff23f8fad0c1ad2cfcda5f7ab1e4b618c4d49fb4a488cb986b1f708ebe94fb0751f9a6d99e4acebef4a70e4c101bb60db85455bdfbeaa66b5246672698017

  • SSDEEP

    6144:J4C2lKti9a/UIPZHrk6BcHvJ1rOjMmmqAZMzLswInEO:J4iwerk6qHrCMmbEyABEO

Malware Config

Extracted

Family

vidar

C2

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Signatures

  • Detect Vidar Stealer 23 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 6 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4392
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:2960
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
        • Checks computer location settings
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4936
        • C:\ProgramData\DHJECFCGHI.exe
          "C:\ProgramData\DHJECFCGHI.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4924
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1064
        • C:\ProgramData\GHJJDGHCBG.exe
          "C:\ProgramData\GHJJDGHCBG.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4444
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
              PID:2772
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              PID:436
          • C:\ProgramData\AFBKKFBAEG.exe
            "C:\ProgramData\AFBKKFBAEG.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2520
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
              • Checks computer location settings
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3536
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c start "" "C:\ProgramData\JEBKKEGDBF.exe"
                5⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2508
                • C:\ProgramData\JEBKKEGDBF.exe
                  "C:\ProgramData\JEBKKEGDBF.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  PID:1856
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Checks processor information in registry
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4292
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c start "" "C:\ProgramData\EHJDGHJDBF.exe"
                5⤵
                • System Location Discovery: System Language Discovery
                PID:4072
                • C:\ProgramData\EHJDGHJDBF.exe
                  "C:\ProgramData\EHJDGHJDBF.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  PID:2044
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    7⤵
                    • System Location Discovery: System Language Discovery
                    PID:4452
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\EGIJEBGDAFHI" & exit
            3⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1288
            • C:\Windows\SysWOW64\timeout.exe
              timeout /t 10
              4⤵
              • System Location Discovery: System Language Discovery
              • Delays execution with timeout.exe
              PID:1424

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\AFBKKFBAEG.exe

        Filesize

        207KB

        MD5

        b1394501c618f78b74c3ca0c2d81a33b

        SHA1

        73707a6facef7e1750fb6d47f3aa840558b17a30

        SHA256

        32d0ae27d9ae49a224785cd08bae82b0ec4e944145cb2f106873f70fc2908fe7

        SHA512

        0b3aff6484ee73136fd3bf36afad78f126e520b599def3c76b2e83e150fc919d484fd18d7bce0e006abae554db50ef566a6d13ac349c32fae67ea8e8796ce121

      • C:\ProgramData\BKFBAECB

        Filesize

        114KB

        MD5

        2e5b34ca73bac7d39579ae5af5c50268

        SHA1

        910b0865cce750b73e308d0c9314edcdcf4162bb

        SHA256

        79f7541d73ed1744fbc041fdeaf95cae2e2a43cf9d73f6d9476b67a5c2ea9695

        SHA512

        95dcb404558da6bf1b58640440f3e26b13bf53b8fe05932e85b85dea7e629a544f2bfef094fdd23fd2ad0692297aad338e23c9e6e516e5c852d6d7c1c97249fc

      • C:\ProgramData\BKKKFCFIIJJKKFHIEHJK

        Filesize

        11KB

        MD5

        f1c7738e4b49b250a42d23fb9b592b2e

        SHA1

        70e696c5cd02c979c8fefd61846e34af704727f6

        SHA256

        f91be159b19b33e15678ade320ca9d2b08619fd8a0e4e3413eeed2b871ea4bd2

        SHA512

        35aa120ca56c3c0116783737d55febf4549e2726dd4e80abb0eaa8158233cfada0199724dd8ec622dde7a8a45d185f56de165eedf49eff202e4f6ac6b814ef0c

      • C:\ProgramData\DHJECFCGHI.exe

        Filesize

        322KB

        MD5

        23f66b62580e25c71d847802432019f5

        SHA1

        f1da07d11332465fbf5c456660d756350dbff889

        SHA256

        7bf0a7a8bf646c29d39ad64c36b6baae45572cee1ef7695bff3923aa3726705c

        SHA512

        e59e8581e8df58672ce1780f25d330793522ee450717e7ef3d96501474760ac3fc728f954ca8df0dbbd8d23fc9705d8afdc64e1476738598ce93cc5adefc2efc

      • C:\ProgramData\FIJDGIJJ

        Filesize

        116KB

        MD5

        f70aa3fa04f0536280f872ad17973c3d

        SHA1

        50a7b889329a92de1b272d0ecf5fce87395d3123

        SHA256

        8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

        SHA512

        30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

      • C:\ProgramData\GHJJDGHCBG.exe

        Filesize

        283KB

        MD5

        ac7314c596e766b8f4f368579e2e0f8f

        SHA1

        0e4941e5e4299d04b9408194542c7362bcabcd2f

        SHA256

        be442a04bc031b4dc72835efeeeb025e9a103c8012382173965fba30bd3a96b9

        SHA512

        4258b6d15cd1c87d1787507f9132e5cf2caebfbf46dd055950dec8bb55faa094571d5b88cc58078adbab49f72fd3439f14ccae04de3d4bde672a540699a49428

      • C:\ProgramData\JEBKKEGDBFII\EGHCAK

        Filesize

        160KB

        MD5

        f310cf1ff562ae14449e0167a3e1fe46

        SHA1

        85c58afa9049467031c6c2b17f5c12ca73bb2788

        SHA256

        e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

        SHA512

        1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

      • C:\ProgramData\JEBKKEGDBFII\HDBKJE

        Filesize

        20KB

        MD5

        a603e09d617fea7517059b4924b1df93

        SHA1

        31d66e1496e0229c6a312f8be05da3f813b3fa9e

        SHA256

        ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7

        SHA512

        eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc

      • C:\ProgramData\JEBKKEGDBFII\IECGIE

        Filesize

        40KB

        MD5

        a182561a527f929489bf4b8f74f65cd7

        SHA1

        8cd6866594759711ea1836e86a5b7ca64ee8911f

        SHA256

        42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

        SHA512

        9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

      • C:\ProgramData\freebl3.dll

        Filesize

        2KB

        MD5

        f9271e31eea239c6d7751ae0e945ce6c

        SHA1

        34c68a9ca802d0b074ae4550c6ecca6044edd08d

        SHA256

        8cbfc9fe1626eb3ec4d4c98809ee5b7485c359c2ee3436a72ac098d3aac1e33b

        SHA512

        b2ed06d742993e72472c1397e883fb52133a5feb8b429aa8c72f07807b81ab2a5db2a47965f68ec59c6be587b71227c1740a375da2208886f85d24cd2a50da62

      • C:\ProgramData\mozglue.dll

        Filesize

        593KB

        MD5

        c8fd9be83bc728cc04beffafc2907fe9

        SHA1

        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

        SHA256

        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

        SHA512

        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

      • C:\ProgramData\nss3.dll

        Filesize

        2.0MB

        MD5

        1cc453cdf74f31e4d913ff9c10acdde2

        SHA1

        6e85eae544d6e965f15fa5c39700fa7202f3aafe

        SHA256

        ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

        SHA512

        dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

        Filesize

        717B

        MD5

        822467b728b7a66b081c91795373789a

        SHA1

        d8f2f02e1eef62485a9feffd59ce837511749865

        SHA256

        af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

        SHA512

        bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

        Filesize

        2KB

        MD5

        6c90d851b3d1eb1ed1a5f21a2ef46211

        SHA1

        9194dfcd69987e335527619f7d5a5d80f33d94e9

        SHA256

        867e4567d10c84551012b4811446ab49e215e3fabed46fafe39301218f64d914

        SHA512

        298420c710b369974d6f46bbbd9cd00b26b33382634b2938ea885c2c6bf8941398b4f5f8e38e82ffbd9913b23f096d650b59548ff7630a0cc5e49116bc54c0a2

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

        Filesize

        2KB

        MD5

        4f28f91cf083663dc10c8c83d7fec78a

        SHA1

        4874e9a130dfa66257800c7e4c53f370fd29db84

        SHA256

        fa6b9ac9ae1c57705c63fb5fe4cb721582f236dde25668a5f63a59769cb99287

        SHA512

        e27e3df78d6c0bd6dde4479ef8538e7da4d907fcb2c31ae792b4bb7190465ff6a8f4651281a9a2bbad4939b4d0288feb22666945675b51f99b35611e2c8a8244

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0B0E2398AAEC29C6B80CB11B0A298FD

        Filesize

        504B

        MD5

        0fa6525234cdeaa5f3b77aa6c6fa80f4

        SHA1

        8ac7f58d7bfc8075ed6f838ab6258d1971718e60

        SHA256

        becff27a14d620e204d5e94104940baf284090af69434f3e1220c657c5737f82

        SHA512

        e7a343e508e126a003fd73ac1750081d46e84859a145792ed69cecf88150515b4f1a63074e9775d7bd24b0ba72835d69ef7a87993a16f5b1f613471453a3a25e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

        Filesize

        1KB

        MD5

        17bc873e2a1ececdb96ba865079e2f7a

        SHA1

        a44455ae9199b8f0b798ffe8952d2ce2b3cdf335

        SHA256

        aaf3cca466c1452b3c1947aebea6107b1fba212c1cf9a0bcb2f7515b2a6cccea

        SHA512

        cc0b2d9cd308ec3b289e67f8041a633099a69705587fd042201a3d2badc3cebdf18a971997fb9c3148ee9a016385f4657f74029bc47770e61c1b2c0c63f4adac

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

        Filesize

        192B

        MD5

        7c3fd742219aa924c903055f4340c27e

        SHA1

        6c7154f3b52b8cda3db7886778ceb0ff34a8e36e

        SHA256

        3a07d1cfde1b95398326e6b3e9e486324fe3cdae5363e708bb7e047b54adef88

        SHA512

        94d56231af4d34faf854e4a7f4344bf2033f30096f6a4ae473837906d6d41cfc268b34a41a0aa3db3a53ea48215ed8580a547cbd2b5132c8f82fe3f56e8e7cd8

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

        Filesize

        458B

        MD5

        719191c1e84054759a45575f454f65c6

        SHA1

        ceca50a879a94ab4f594ba44dbbb98858de6fb54

        SHA256

        6ba6bd6f3ff65f47514421ad875cd3655a0490fb879604bc03b96c5f3666732a

        SHA512

        ad8e41a25ece964e9540a4a7326a819b0c41320272184ee7c07c4cc440957b690f2d91e76ce200c0572c1ea4be1351ef0e3b9415ef594b52bf2c246ad8c75cb4

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

        Filesize

        450B

        MD5

        304390c1409db64d64f883e06a2831e5

        SHA1

        e6676a5763760d531f7a658b605c04af2e5e835c

        SHA256

        f10fb87e40f5e36da5b17744699cca57d5cae85efd87a2c720f8ff8942134a7e

        SHA512

        51e9ef4dc4a18af03f8a8426cdce2306ee0a0ce7f0c387a87125602f869672e812991eaaf72b4a5facbce1fc0b1ebc326585182da483d595229ef0237da33786

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0B0E2398AAEC29C6B80CB11B0A298FD

        Filesize

        546B

        MD5

        e365936980def7c45c97af1b098d3ec0

        SHA1

        85b7795d32c7d252ba0d1d72a3928a1f9007ac1a

        SHA256

        7edc43fe1af59db0c86580c7907b322b91df250f264de981fc595e7279aa0e8a

        SHA512

        2c617003ba50e0d69b6b5fbccbd53173f308acbc793195f2b849be017c32edd4ac65fcc227c7ee920947af9ae6b1fbc28fbb9ed5536864e0051fc7dd8c23b968

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

        Filesize

        458B

        MD5

        4b6f2daa0731bdabf10a35f638e7e19f

        SHA1

        807cb1e223d9125a0b6fbc7e703eea56c5119ee0

        SHA256

        7e90e82010a966a15ef33a0fe6d2473e50575964bf704e932e76bed5eb9181c4

        SHA512

        d81ee6885b95a57e76732b8392b3616d902339344a4c0ce7b6fc49baa3a6e521c80a6e8cac68b13d5cb6118d31ddd96bd02a31abd9070d4b3b91006ee1d08027

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\EHJDGHJDBF.exe.log

        Filesize

        137B

        MD5

        8a8f1e8a778dff107b41ea564681fe7b

        SHA1

        08efcfdc3e33281b2b107d16b739b72af4898041

        SHA256

        d09cdd05da4e3e875d3d5d66c542404519759acda2efa7c00ca69aa3f6234de4

        SHA512

        a372330793e09c661e6bf8b2c293c1af81de77972b8b4ba47055f07be0fcdfe5e507adbc53903a0cd90c392b36fe4a8a41d3fea923ad97fa061dbef65398edf6

      • memory/436-142-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/436-138-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/436-237-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/436-215-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/436-266-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/436-262-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/436-140-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/436-248-0x00000000224B0000-0x000000002270F000-memory.dmp

        Filesize

        2.4MB

      • memory/1064-119-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/1064-116-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/1064-122-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/2520-158-0x0000000000560000-0x0000000000598000-memory.dmp

        Filesize

        224KB

      • memory/3536-160-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/3536-162-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/3536-169-0x0000000061E00000-0x0000000061EF3000-memory.dmp

        Filesize

        972KB

      • memory/4292-287-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4292-290-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4292-291-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4392-2-0x0000000005AC0000-0x0000000006064000-memory.dmp

        Filesize

        5.6MB

      • memory/4392-66-0x0000000074FB0000-0x0000000075760000-memory.dmp

        Filesize

        7.7MB

      • memory/4392-1-0x0000000000BB0000-0x0000000000BFA000-memory.dmp

        Filesize

        296KB

      • memory/4392-0-0x0000000074FBE000-0x0000000074FBF000-memory.dmp

        Filesize

        4KB

      • memory/4392-12-0x0000000074FB0000-0x0000000075760000-memory.dmp

        Filesize

        7.7MB

      • memory/4444-136-0x0000000000CC0000-0x0000000000D0A000-memory.dmp

        Filesize

        296KB

      • memory/4452-286-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/4924-247-0x0000000072550000-0x0000000072D00000-memory.dmp

        Filesize

        7.7MB

      • memory/4924-113-0x000000007255E000-0x000000007255F000-memory.dmp

        Filesize

        4KB

      • memory/4924-121-0x0000000072550000-0x0000000072D00000-memory.dmp

        Filesize

        7.7MB

      • memory/4924-114-0x0000000000610000-0x0000000000664000-memory.dmp

        Filesize

        336KB

      • memory/4936-59-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4936-84-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4936-42-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4936-58-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4936-8-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4936-26-0x0000000022710000-0x000000002296F000-memory.dmp

        Filesize

        2.4MB

      • memory/4936-4-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4936-9-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4936-85-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4936-92-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4936-93-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4936-41-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4936-24-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4936-25-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB