Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250211-en
  • resource tags

    arch:x64arch:x86image:win11-20250211-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    12-02-2025 19:29

General

  • Target

    code.ps1

  • Size

    29B

  • MD5

    726ac161772f83ef4c852d6c3e158e86

  • SHA1

    66b5487d1d873300d241e96fed4e1ba5d8fea2af

  • SHA256

    630f2e9dc252f71613a30aaf3544739785a64f3f6fc96fbcc960511b29e0eced

  • SHA512

    0b103e71e1a6b5ba400981f45ba460290ec97bd424a80ed4675b12aa68e9d3426bc253c5ae63ad4deba146b69a10b8f532c40344e6194482c3cc73bc4ab95910

Malware Config

Extracted

Family

vidar

C2

https://t.me/b4cha00

https://steamcommunity.com/profiles/76561199825403037

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:137.0) Gecko/20100101 Firefox/137.0

Signatures

  • Detect Vidar Stealer 10 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file 1 IoCs
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\code.ps1
    1⤵
    • Blocklisted process makes network request
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4732
    • C:\Users\Admin\AppData\Local\73d7870b-b99c-4fdc-b289-2cbd4b6daf14\updater.exe
      "C:\Users\Admin\AppData\Local\73d7870b-b99c-4fdc-b289-2cbd4b6daf14\updater.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4924
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3804
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
          4⤵
          • Uses browser remote debugging
          • Drops file in Windows directory
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3332
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff805eacc40,0x7ff805eacc4c,0x7ff805eacc58
            5⤵
              PID:5020
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2000,i,9656335760815597887,8417424115399579277,262144 --variations-seed-version=20250211-050107.114000 --mojo-platform-channel-handle=1928 /prefetch:2
              5⤵
                PID:1256
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1564,i,9656335760815597887,8417424115399579277,262144 --variations-seed-version=20250211-050107.114000 --mojo-platform-channel-handle=2144 /prefetch:3
                5⤵
                  PID:2808
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2212,i,9656335760815597887,8417424115399579277,262144 --variations-seed-version=20250211-050107.114000 --mojo-platform-channel-handle=2152 /prefetch:8
                  5⤵
                    PID:4080
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3136,i,9656335760815597887,8417424115399579277,262144 --variations-seed-version=20250211-050107.114000 --mojo-platform-channel-handle=3160 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:1060
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3236,i,9656335760815597887,8417424115399579277,262144 --variations-seed-version=20250211-050107.114000 --mojo-platform-channel-handle=3400 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:4816
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3792,i,9656335760815597887,8417424115399579277,262144 --variations-seed-version=20250211-050107.114000 --mojo-platform-channel-handle=4512 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:2928
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4248,i,9656335760815597887,8417424115399579277,262144 --variations-seed-version=20250211-050107.114000 --mojo-platform-channel-handle=4232 /prefetch:8
                    5⤵
                      PID:1112
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4232,i,9656335760815597887,8417424115399579277,262144 --variations-seed-version=20250211-050107.114000 --mojo-platform-channel-handle=4712 /prefetch:8
                      5⤵
                        PID:1488
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4688,i,9656335760815597887,8417424115399579277,262144 --variations-seed-version=20250211-050107.114000 --mojo-platform-channel-handle=4624 /prefetch:8
                        5⤵
                          PID:2080
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4212,i,9656335760815597887,8417424115399579277,262144 --variations-seed-version=20250211-050107.114000 --mojo-platform-channel-handle=4760 /prefetch:8
                          5⤵
                            PID:3064
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4740,i,9656335760815597887,8417424115399579277,262144 --variations-seed-version=20250211-050107.114000 --mojo-platform-channel-handle=4632 /prefetch:8
                            5⤵
                              PID:3716
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4748,i,9656335760815597887,8417424115399579277,262144 --variations-seed-version=20250211-050107.114000 --mojo-platform-channel-handle=4832 /prefetch:8
                              5⤵
                                PID:1020
                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7RSt4YkF6Nlk2c1UxMjg5YlM2cWw0VlJMYmtqZkJVR1RNSnNqckhyNDRpST0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjEiIGluc3RhbGxkYXRldGltZT0iMTczOTI5NDgzNCIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzgzNzY2NTUyNTM3MDAwMCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxNzk4NjIiIHN5c3RlbV91cHRpbWVfdGlja3M9IjUxNjIyNzg0NDkiLz48L2FwcD48L3JlcXVlc3Q-
                        1⤵
                        • System Location Discovery: System Language Discovery
                        • System Network Configuration Discovery: Internet Connection Discovery
                        PID:660
                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                        1⤵
                          PID:5068
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                          1⤵
                            PID:3412
                          • C:\Windows\SysWOW64\DllHost.exe
                            C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                            1⤵
                            • System Location Discovery: System Language Discovery
                            PID:3740
                          • C:\Windows\system32\rundll32.exe
                            "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,Control_RunDLL C:\Windows\System32\srchadmin.dll ,
                            1⤵
                              PID:2716
                            • C:\Windows\system32\BackgroundTransferHost.exe
                              "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
                              1⤵
                                PID:464
                              • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe
                                "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"
                                1⤵
                                • Modifies system executable filetype association
                                • System Location Discovery: System Language Discovery
                                • Checks processor information in registry
                                • Modifies Internet Explorer settings
                                • Modifies registry class
                                • Suspicious behavior: AddClipboardFormatListener
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                • Suspicious use of SetWindowsHookEx
                                PID:2888
                                • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe
                                  "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe" /update /restart
                                  2⤵
                                    PID:1516
                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe
                                      C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe /update /restart /peruser /childprocess /extractFilesWithLessThreadCount /renameReplaceOneDriveExe /renameReplaceODSUExe /removeNonCurrentVersions /enableODSUReportingMode
                                      3⤵
                                        PID:112

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\73d7870b-b99c-4fdc-b289-2cbd4b6daf14\updater.exe

                                    Filesize

                                    5.1MB

                                    MD5

                                    7ca1a467d3565e8827428ac7be5b7bf6

                                    SHA1

                                    63a893bf674933c34cbe216b49722ad18d625fc6

                                    SHA256

                                    efbd528c8ed8c5253b5e191eedc85e30f75778a417b5f427da115e7f44d9dd47

                                    SHA512

                                    9be0926ef5c388853cd7560afdbd97d0f47265b3bef47cefbaaa65c33593e2eb525da9f58079c9411e87ad4a184eff49021fc982bfafe030a55272a311228720

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                    Filesize

                                    2B

                                    MD5

                                    d751713988987e9331980363e24189ce

                                    SHA1

                                    97d170e1550eee4afc0af065b78cda302a97674c

                                    SHA256

                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                    SHA512

                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe

                                    Filesize

                                    40.2MB

                                    MD5

                                    fb4aa59c92c9b3263eb07e07b91568b5

                                    SHA1

                                    6071a3e3c4338b90d892a8416b6a92fbfe25bb67

                                    SHA256

                                    e70e80dbbc9baba7ddcee70eda1bb8d0e6612dfb1d93827fe7b594a59f3b48b9

                                    SHA512

                                    60aabbe2fd24c04c33e7892eab64f24f8c335a0dd9822eb01adc5459e850769fc200078c5ccee96c1f2013173bc41f5a2023def3f5fe36e380963db034924ace

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe

                                    Filesize

                                    25.9MB

                                    MD5

                                    f5fac832c5fd84e6f1be98b1f70a8435

                                    SHA1

                                    c6b074505d209cde48bfc42266398e63a2171e40

                                    SHA256

                                    642ed65d84bdfadcc36ff7683a288e54aa02da3288889139c1fe07abd9ec3b13

                                    SHA512

                                    be0f9dc9932071a72df76a450fd55d6be18d6110b5071df538a60a30de37a431b632c7e2287a67a60e0941d03b5e17504cfa324f158aef6005e149f84ac658a2

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\setup\logs\DeviceHealthSummaryConfiguration.ini

                                    Filesize

                                    77B

                                    MD5

                                    a004e8ac63a0f7b33c7c7af9d76df8a3

                                    SHA1

                                    e73a182fdbf5336be7efcdc9e0f69ecd8340def2

                                    SHA256

                                    279560371bae32d24780ef678d46714c75810fb07bd8eed89f529e94f72d1ccf

                                    SHA512

                                    5395fcad796924f981e6b5ab1d49ac7344b0618bb9a388216d7b6693f550969f15eb7704c187d1743738e11a09fe650632d6f18e002052368f80c39a2f10f812

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\2LCUVJRY\PreSignInSettingsConfig[1].json

                                    Filesize

                                    63KB

                                    MD5

                                    e516a60bc980095e8d156b1a99ab5eee

                                    SHA1

                                    238e243ffc12d4e012fd020c9822703109b987f6

                                    SHA256

                                    543796a1b343b4ebc0285d89cb8eb70667ac7b513da37495e38003704e9d88d7

                                    SHA512

                                    9b51e99ba20e9da56d1acc24a1cf9f9c9dbdeb742bec034e0ff2bc179a60f4aff249f40344f9ddd43229dcdefa1041940f65afb336d46c175ffeff725c638d58

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6CCMQ4P5\update100[1].xml

                                    Filesize

                                    726B

                                    MD5

                                    53244e542ddf6d280a2b03e28f0646b7

                                    SHA1

                                    d9925f810a95880c92974549deead18d56f19c37

                                    SHA256

                                    36a6bd38a8a6f5a75b73caffae5ae66dfabcaefd83da65b493fa881ea8a64e7d

                                    SHA512

                                    4aa71d92ea2c46df86565d97aac75395371d3e17877ab252a297b84dca2ab251d50aaffc62eab9961f0df48de6f12be04a1f4a2cbde75b9ae7bcce6eb5450c62

                                  • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\7e1edadd-8f79-4175-a3f7-a607227da7b9.down_data

                                    Filesize

                                    555KB

                                    MD5

                                    5683c0028832cae4ef93ca39c8ac5029

                                    SHA1

                                    248755e4e1db552e0b6f8651b04ca6d1b31a86fb

                                    SHA256

                                    855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

                                    SHA512

                                    aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ma1jhswp.pmm.ps1

                                    Filesize

                                    60B

                                    MD5

                                    d17fe0a3f47be24a6453e9ef58c94641

                                    SHA1

                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                    SHA256

                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                    SHA512

                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                  • C:\Users\Admin\AppData\Local\Temp\tmpEB7F.tmp

                                    Filesize

                                    19.4MB

                                    MD5

                                    27ba1f44f4d3ebbeb2b05d63fa61dd04

                                    SHA1

                                    6515b867d86bd127ce5f6dd5fbbc5dd41e4c25bd

                                    SHA256

                                    bf6af2f79e042ac1e259d58a5ce2b9d48a4ca87cbd749e9525c5d00c351551d1

                                    SHA512

                                    482c5c991f78314f3c7f88751c3757d742655082fe048d58d4b259087d4acc323f42a8d8d11c4362c0af93678077ae8246d991c5f1f436cc8b013238f8def8ca

                                  • memory/3804-111-0x0000000000700000-0x0000000000722000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/3804-110-0x0000000000700000-0x0000000000722000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/3804-58-0x0000000000700000-0x0000000000722000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/3804-67-0x0000000000700000-0x0000000000722000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/3804-68-0x0000000000700000-0x0000000000722000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/3804-69-0x0000000000700000-0x0000000000722000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/3804-70-0x0000000000700000-0x0000000000722000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/3804-53-0x0000000000700000-0x0000000000722000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/3804-118-0x0000000000700000-0x0000000000722000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/3804-54-0x0000000000700000-0x0000000000722000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/3804-114-0x0000000000700000-0x0000000000722000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/4732-0-0x00007FF80CB53000-0x00007FF80CB55000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/4732-17-0x00007FF80CB50000-0x00007FF80D612000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4732-16-0x00007FF80CB50000-0x00007FF80D612000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4732-15-0x00007FF80CB53000-0x00007FF80CB55000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/4732-13-0x000002BF2F1E0000-0x000002BF2F986000-memory.dmp

                                    Filesize

                                    7.6MB

                                  • memory/4732-12-0x00007FF80CB50000-0x00007FF80D612000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4732-11-0x00007FF80CB50000-0x00007FF80D612000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4732-10-0x00007FF80CB50000-0x00007FF80D612000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4732-9-0x000002BF2E5A0000-0x000002BF2E5C2000-memory.dmp

                                    Filesize

                                    136KB