Analysis

  • max time kernel
    72s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 10:32

General

  • Target

    6e25c012659d74422317726da92134c5e9a70a937a1ceb585b83aeb99eee36fd.exe

  • Size

    403KB

  • MD5

    5456c9b238c54e52277972cdadf6764d

  • SHA1

    512977a16b78c08e9aeb028e06a5995fc36c0d40

  • SHA256

    6e25c012659d74422317726da92134c5e9a70a937a1ceb585b83aeb99eee36fd

  • SHA512

    bf6cfbbc35edcfec8d8dd2c7be5c587b2b43ada1bb1a43620711cc713b122e41b978cfb1b5b0f8dfe107bea00d34de02c7a112926302652f3810a779a818944b

  • SSDEEP

    12288:WAdGQU/9evJZ/vzqp68V09Ij7THMweRdj0EO:DdxJvJNvl+jPR2d4t

Malware Config

Extracted

Family

vidar

Version

11

Botnet

3a15237aa92dcd8ccca447211fb5fc2a

C2

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Signatures

  • Detect Vidar Stealer 14 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Drops startup file 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 9 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e25c012659d74422317726da92134c5e9a70a937a1ceb585b83aeb99eee36fd.exe
    "C:\Users\Admin\AppData\Local\Temp\6e25c012659d74422317726da92134c5e9a70a937a1ceb585b83aeb99eee36fd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2432
      • C:\ProgramData\JEHIJJKEGH.exe
        "C:\ProgramData\JEHIJJKEGH.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2144
        • C:\Users\Admin\AppData\Local\Temp\Malewmf\MFDBG.exe
          "C:\Users\Admin\AppData\Local\Temp\Malewmf\MFDBG.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2116
          • C:\Users\Admin\AppData\Local\Temp\Malewmf\FDWDZ.exe
            "C:\Users\Admin\AppData\Local\Temp\Malewmf\FDWDZ.exe" --checker
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1932
      • C:\ProgramData\KJEHJKJEBG.exe
        "C:\ProgramData\KJEHJKJEBG.exe"
        3⤵
          PID:2812
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
              PID:2372
          • C:\ProgramData\AAFHIIDHJE.exe
            "C:\ProgramData\AAFHIIDHJE.exe"
            3⤵
              PID:2004
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                4⤵
                  PID:2336
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminJJDBAEHIJK.exe"
                    5⤵
                      PID:1096
                      • C:\Users\AdminJJDBAEHIJK.exe
                        "C:\Users\AdminJJDBAEHIJK.exe"
                        6⤵
                          PID:1648
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            7⤵
                              PID:3004
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminHJKKFIJKFC.exe"
                          5⤵
                            PID:2488
                            • C:\Users\AdminHJKKFIJKFC.exe
                              "C:\Users\AdminHJKKFIJKFC.exe"
                              6⤵
                                PID:1804
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                  7⤵
                                    PID:1896
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 1896 -s 1068
                                      8⤵
                                      • Program crash
                                      PID:2180
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminCAAEBFHJJD.exe"
                                5⤵
                                  PID:2828
                                  • C:\Users\AdminCAAEBFHJJD.exe
                                    "C:\Users\AdminCAAEBFHJJD.exe"
                                    6⤵
                                      PID:2796
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\CBAEHCAEGDHJ" & exit
                                3⤵
                                  PID:3040
                                  • C:\Windows\SysWOW64\timeout.exe
                                    timeout /t 10
                                    4⤵
                                    • Delays execution with timeout.exe
                                    PID:1736

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\ProgramData\CFHCBKKF

                              Filesize

                              92KB

                              MD5

                              e248975fcae2fff4649630d9421bd44e

                              SHA1

                              283f382e83b0767a0cd6b2d54bce3c1c315c60d6

                              SHA256

                              2e7470ccd25b6d7e9606f29643dbda3e3a4ef3f0575b2d074986c80cf8b148d2

                              SHA512

                              9bd5cf49a7773811d72be905cc8dfc2310f82899553c6f598a52b5dc261fc26191462855fdba8b3a83c8a317faed71a1a134df83f338c6c9442ee792cdf7428f

                            • C:\ProgramData\CFIEHCFIECBG\BGIJJK

                              Filesize

                              46KB

                              MD5

                              02d2c46697e3714e49f46b680b9a6b83

                              SHA1

                              84f98b56d49f01e9b6b76a4e21accf64fd319140

                              SHA256

                              522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                              SHA512

                              60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                            • C:\ProgramData\CFIEHCFIECBG\EBGCBA

                              Filesize

                              20KB

                              MD5

                              c9ff7748d8fcef4cf84a5501e996a641

                              SHA1

                              02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

                              SHA256

                              4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

                              SHA512

                              d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

                            • C:\ProgramData\DHJJEGHIIDAFIDHJDHJE

                              Filesize

                              6KB

                              MD5

                              c9363dd0a5a8d0c0166bf18157f01a43

                              SHA1

                              51c93dc5d7c6bd0c629157927a86e1e7dee2afd6

                              SHA256

                              aa1c08ee9ec4be8d75a55e4e7a24cfc01f5f2a79d51b056c10f4596aa83007eb

                              SHA512

                              546b0e955a36d4a3dcc360700e2fe89562f7c9fd40db86328ed290d74fad576abeda14115b919ee284bff701ca3a893e13f7c54f7f3b5c34e43a3c043caf8746

                            • C:\ProgramData\freebl3.dll

                              Filesize

                              669KB

                              MD5

                              550686c0ee48c386dfcb40199bd076ac

                              SHA1

                              ee5134da4d3efcb466081fb6197be5e12a5b22ab

                              SHA256

                              edd043f2005dbd5902fc421eabb9472a7266950c5cbaca34e2d590b17d12f5fa

                              SHA512

                              0b7f47af883b99f9fbdc08020446b58f2f3fa55292fd9bc78fc967dd35bdd8bd549802722de37668cc89ede61b20359190efbfdf026ae2bdc854f4740a54649e

                            • C:\ProgramData\msvcp140.dll

                              Filesize

                              13KB

                              MD5

                              e416a22acaeff6cec5aa36a72becbede

                              SHA1

                              9fefce2eafd2e79ce0f0c60e2174b0052bfd0d2f

                              SHA256

                              edc0250d8dfe5b4049a64b6171d12ad701784f4650484d35315ab5286384e79e

                              SHA512

                              8ab549504e9c7f787e4ace97bcce5eed5bd9758b8cc223eae537e5ba3dc0f22ddd84802b1c43c2e947aa0a97742793b8cd09a5563ccd21820fa00bb5c1294421

                            • C:\ProgramData\softokn3.dll

                              Filesize

                              13KB

                              MD5

                              16c75e764a9b70ca06fe062d5367abba

                              SHA1

                              b69856703cc2633f6703368ada943f2ce1e1d722

                              SHA256

                              3ef27598650d34ccca435d9eb54db0a0ba7c25d6325e17665d7905dfa2423f9f

                              SHA512

                              edd7391aea11ca27b88c84046e1e88623998f638a0ab7d978aec98e36d7d773f19acbf3c55fefa9ccdaa19adb28124c80431309d21dab2deec152ca2e356aec5

                            • C:\ProgramData\vcruntime140.dll

                              Filesize

                              78KB

                              MD5

                              a37ee36b536409056a86f50e67777dd7

                              SHA1

                              1cafa159292aa736fc595fc04e16325b27cd6750

                              SHA256

                              8934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825

                              SHA512

                              3a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356

                            • C:\Users\AdminJJDBAEHIJK.exe

                              Filesize

                              403KB

                              MD5

                              80729909b073a23f2caf883d9b9dce98

                              SHA1

                              cf621df3f09b1103e247e1292e6c9d4894e90d92

                              SHA256

                              b832829177dcfb2f224062fdf796ffdce054c66ac391d4a2efdec7e06aeb69ee

                              SHA512

                              e197b71e9b91aa83f6ff0ca454a8ea72c66043449901595613d4d6ad8ac0e007e7ed10c6b1a428692eb6d2a29fd114b0afcfe7a678b6fb11b475ea6fb5ce0b05

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

                              Filesize

                              471B

                              MD5

                              3d0514f5227d0ba8f91af3531108aa9e

                              SHA1

                              e785caa409acb468d4cc46790320a54f1ff99db6

                              SHA256

                              aac8c93892fef76efc9790da21d518ed553e974256217b4244b34d73bdd0f8ee

                              SHA512

                              2990a16921b56e0e00ef40e01c6a5d8ab425475de36fad0228d5f9d31643e476de620f594063fd5a253b47219c10e0de1094aeeea215be00225c7cb79fbc3eac

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              342B

                              MD5

                              442cbd630a7d75020baf180b5f64b6f8

                              SHA1

                              3c6b7c473c12ee80917fdfe30d25bcbc6a37cb60

                              SHA256

                              f9b045f39049a0754763e15790133d5b90f3f16eb253ea05aee3fd3936f72bd8

                              SHA512

                              d4f7ce5a88a2ef8eb80bcb86c1d5560262ad5902deed8332e718f31ac58de20f573c24b42f3dc778366c370eaa34169c67fed865d5c3bc5227e4dad13277e8e1

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              342B

                              MD5

                              d7295065080734ef786b9856e1f82c60

                              SHA1

                              f72e4fe8b3ab900419dea4e4f2dc0ba99b3d925f

                              SHA256

                              96b06e1ba32e4107f38e5e218d7be68893b237ecf63c75650a4e142730745a9f

                              SHA512

                              93b9ec311b9e7f0faf6339955f573cb0695fe0ce9f726eb4933da11b84fa0e7cbadc87e888cac68808316117aecc5337b7bd94d2b60a7c7667284810bc4aa315

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              342B

                              MD5

                              37e3ac61ee2e6145653d1507e0fe4545

                              SHA1

                              6200bf13277f3ee8d6d838a54f7d988d747c957c

                              SHA256

                              ab9d301553ba41f925a885d3113e296fd8f871388764cafd45f9ed4342debe9f

                              SHA512

                              d99b09315a319f08098fce8987213f7b7ea9e4d05cb51356bb43ebc4ece1a38b5bc359a109268b9b954399a485a635b772dba18b9e101b10e5a46e3d3cb2e1b2

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

                              Filesize

                              400B

                              MD5

                              21312826872a45ac513775586dba186f

                              SHA1

                              e96f86f9ba551ff8cfaca365e27352ffdd39a5b2

                              SHA256

                              30860ba61fa2792c18b968b24eb0b56c86105c8a659007fb8682c4cc6866409b

                              SHA512

                              c017faf981de73dd9b16fddba7fe6d2886c6af6088430f6e0d0755396ee8fa838c50915ec00ac6df4b37a284a5c7f1dcdb89918118bbd9476cc0576f0d7ec71f

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\56KJ964X\76561199780418869[1].htm

                              Filesize

                              33KB

                              MD5

                              5b01bd4585c6b56bb5073916ec64329d

                              SHA1

                              5e115aa5f3bc191f58988f472e12d4a6f1e2ce60

                              SHA256

                              09c3e3266d494ca509ea758827c771a820e1d3ea5aa19d9c0aeccb26cacdaedc

                              SHA512

                              be0af2d7911b8bad2ced76b039cf1d4da4420ad31a4f953a46472ff16ec4f56bf14b997ca8cb12c4d05a4401f1217ad98d242dfa80ff5d8bdcab9455680abea1

                            • C:\Users\Admin\AppData\Local\Temp\Cab8AB5.tmp

                              Filesize

                              70KB

                              MD5

                              49aebf8cbd62d92ac215b2923fb1b9f5

                              SHA1

                              1723be06719828dda65ad804298d0431f6aff976

                              SHA256

                              b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                              SHA512

                              bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                            • C:\Users\Admin\AppData\Local\Temp\Tar8B15.tmp

                              Filesize

                              181KB

                              MD5

                              4ea6026cf93ec6338144661bf1202cd1

                              SHA1

                              a1dec9044f750ad887935a01430bf49322fbdcb7

                              SHA256

                              8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                              SHA512

                              6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MFDBG_0b42212ea6684bb48f2068646e0589f3.lnk

                              Filesize

                              1022B

                              MD5

                              4be9f882bcb337db0e4d89c41bcaddff

                              SHA1

                              9180f976eabe89bc5ef1c9b585284095af50d40d

                              SHA256

                              5c298a60db0eee1ed8b16440cae763d704e68b560c98d1d3e29e3597f6f51297

                              SHA512

                              eadaf1d3cc327a6851474e657ce3136749b03fe7b49904843aaefc3307c1c65e91bdc67225e5d564be88884b814d9b2f4bcb97ee4b54177339c6324f9c70352c

                            • \ProgramData\AAFHIIDHJE.exe

                              Filesize

                              326KB

                              MD5

                              4ecc9d9d93e5ff84765dacbb1e54a4c9

                              SHA1

                              f2f796276b0aa4adcc02f6b9d11aabf1d97f9a06

                              SHA256

                              eba091f4887e9bc9e0308d4e7830b2ae7b50eddb7c53425bd78db0f959ed6524

                              SHA512

                              dc093ad97b34a5afad3c324c24425c950f48d5601444c044a718a0e47355a8f125d54a07fd8969ab85a00cce2d3c148a7dc2dcb4628647ed2c8e1ba50955b8cd

                            • \ProgramData\JEHIJJKEGH.exe

                              Filesize

                              25KB

                              MD5

                              168087c84c5ff3664e5e2f4eec18d7dd

                              SHA1

                              639e9e87103f576617ed08c50910ca92fe5c8c5b

                              SHA256

                              2a7cdb79045658b9c02ebbb159e5b3680d7d6d832dbd757572f7d202c3fa935d

                              SHA512

                              89491261e1234f917964566def4b1a50505ba4c2eb90d14c19e2130d78fe65cd61c4bba685909109c7088b35e7fd48f6311ace7a0dd8c703a6d1b1d23d1a54bb

                            • \ProgramData\KJEHJKJEBG.exe

                              Filesize

                              368KB

                              MD5

                              28f06ee2c727adcae5a328aaf02d95fe

                              SHA1

                              3c73c34aafb67d828341906877894670d2f113fc

                              SHA256

                              df52ba7d8ae16928e82e3554558d25b7582d3e67025a7dfbb71f6231ba9a7899

                              SHA512

                              d292b0b49f280ad1a955c1eeb720ef6bbb23339928e4f33326997a1a69f85ddf91fcf6f1e0ccec8f1b969a1c91d29c41b0dbacb249c40b3a83d50c9b9c37a806

                            • \ProgramData\mozglue.dll

                              Filesize

                              593KB

                              MD5

                              c8fd9be83bc728cc04beffafc2907fe9

                              SHA1

                              95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                              SHA256

                              ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                              SHA512

                              fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                            • \ProgramData\nss3.dll

                              Filesize

                              2.0MB

                              MD5

                              1cc453cdf74f31e4d913ff9c10acdde2

                              SHA1

                              6e85eae544d6e965f15fa5c39700fa7202f3aafe

                              SHA256

                              ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                              SHA512

                              dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                            • memory/1648-727-0x00000000013E0000-0x0000000001448000-memory.dmp

                              Filesize

                              416KB

                            • memory/1804-741-0x0000000000210000-0x0000000000270000-memory.dmp

                              Filesize

                              384KB

                            • memory/1932-520-0x00000000009E0000-0x00000000009EC000-memory.dmp

                              Filesize

                              48KB

                            • memory/2004-623-0x0000000001090000-0x00000000010E6000-memory.dmp

                              Filesize

                              344KB

                            • memory/2004-643-0x00000000024F0000-0x00000000044F0000-memory.dmp

                              Filesize

                              32.0MB

                            • memory/2116-511-0x0000000001160000-0x000000000116C000-memory.dmp

                              Filesize

                              48KB

                            • memory/2144-497-0x000000007308E000-0x000000007308F000-memory.dmp

                              Filesize

                              4KB

                            • memory/2144-498-0x0000000000EA0000-0x0000000000EAC000-memory.dmp

                              Filesize

                              48KB

                            • memory/2160-5-0x0000000074400000-0x0000000074AEE000-memory.dmp

                              Filesize

                              6.9MB

                            • memory/2160-1-0x0000000000AF0000-0x0000000000B58000-memory.dmp

                              Filesize

                              416KB

                            • memory/2160-0-0x000000007440E000-0x000000007440F000-memory.dmp

                              Filesize

                              4KB

                            • memory/2160-18-0x0000000074400000-0x0000000074AEE000-memory.dmp

                              Filesize

                              6.9MB

                            • memory/2336-644-0x0000000000400000-0x0000000000661000-memory.dmp

                              Filesize

                              2.4MB

                            • memory/2336-646-0x0000000000400000-0x0000000000661000-memory.dmp

                              Filesize

                              2.4MB

                            • memory/2336-648-0x0000000000400000-0x0000000000661000-memory.dmp

                              Filesize

                              2.4MB

                            • memory/2336-650-0x0000000000400000-0x0000000000661000-memory.dmp

                              Filesize

                              2.4MB

                            • memory/2336-652-0x0000000000400000-0x0000000000661000-memory.dmp

                              Filesize

                              2.4MB

                            • memory/2336-655-0x0000000000400000-0x0000000000661000-memory.dmp

                              Filesize

                              2.4MB

                            • memory/2336-668-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                              Filesize

                              972KB

                            • memory/2336-656-0x0000000000400000-0x0000000000661000-memory.dmp

                              Filesize

                              2.4MB

                            • memory/2336-658-0x0000000000400000-0x0000000000661000-memory.dmp

                              Filesize

                              2.4MB

                            • memory/2372-595-0x0000000000400000-0x0000000000462000-memory.dmp

                              Filesize

                              392KB

                            • memory/2372-583-0x0000000000400000-0x0000000000462000-memory.dmp

                              Filesize

                              392KB

                            • memory/2372-585-0x0000000000400000-0x0000000000462000-memory.dmp

                              Filesize

                              392KB

                            • memory/2372-587-0x0000000000400000-0x0000000000462000-memory.dmp

                              Filesize

                              392KB

                            • memory/2372-589-0x0000000000400000-0x0000000000462000-memory.dmp

                              Filesize

                              392KB

                            • memory/2372-591-0x0000000000400000-0x0000000000462000-memory.dmp

                              Filesize

                              392KB

                            • memory/2372-593-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                              Filesize

                              4KB

                            • memory/2372-594-0x0000000000400000-0x0000000000462000-memory.dmp

                              Filesize

                              392KB

                            • memory/2372-597-0x0000000000400000-0x0000000000462000-memory.dmp

                              Filesize

                              392KB

                            • memory/2432-212-0x0000000000400000-0x0000000000676000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/2432-159-0x0000000000400000-0x0000000000676000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/2432-442-0x0000000000400000-0x0000000000676000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/2432-423-0x0000000000400000-0x0000000000676000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/2432-362-0x0000000000400000-0x0000000000676000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/2432-231-0x0000000000400000-0x0000000000676000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/2432-3-0x0000000000400000-0x0000000000676000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/2432-197-0x0000000020010000-0x000000002026F000-memory.dmp

                              Filesize

                              2.4MB

                            • memory/2432-196-0x0000000000400000-0x0000000000676000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/2432-8-0x0000000000400000-0x0000000000676000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/2432-15-0x0000000000400000-0x0000000000676000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/2432-443-0x0000000000400000-0x0000000000676000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/2432-17-0x0000000000400000-0x0000000000676000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/2432-9-0x0000000000400000-0x0000000000676000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/2432-10-0x0000000000400000-0x0000000000676000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/2432-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                              Filesize

                              4KB

                            • memory/2432-13-0x0000000000400000-0x0000000000676000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/2432-6-0x0000000000400000-0x0000000000676000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/2432-4-0x0000000000400000-0x0000000000676000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/2796-740-0x00000000010A0000-0x00000000010AC000-memory.dmp

                              Filesize

                              48KB

                            • memory/2812-571-0x0000000000270000-0x00000000002D0000-memory.dmp

                              Filesize

                              384KB