Resubmissions

14-02-2025 15:42

250214-s5szzssrdv 10

14-02-2025 15:41

250214-s4vgessrbw 10

Analysis

  • max time kernel
    587s
  • max time network
    597s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-02-2025 15:41

General

  • Target

    main.exe

  • Size

    7.8MB

  • MD5

    b832f691167d662eb0605285e569dadc

  • SHA1

    9154d327115ee9bbf21e0b1b75370c854671f1f7

  • SHA256

    c9ecda2fdc1e8da35a56810d008d7cf0cb6e440aea7f3e2357fa2562f2ecb2a4

  • SHA512

    dda0021fa448525ba92580694204022ae87ce85a37c858640eb540410fe727bd0c8e5932a9edcdd30d77ffbd3df9eea0639553f045bb7e420ee6a60b59b5f61a

  • SSDEEP

    98304:oMA0PZiOM4M7vToZHfESt71zSU1MDX2fz:9AyzZ/bt713+X2

Malware Config

Extracted

Family

vidar

C2

https://t.me/b4cha00

https://steamcommunity.com/profiles/76561199825403037

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:137.0) Gecko/20100101 Firefox/137.0

Signatures

  • Detect Vidar Stealer 12 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\main.exe
    "C:\Users\Admin\AppData\Local\Temp\main.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
      "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1736
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
        3⤵
        • Uses browser remote debugging
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:304
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7319758,0x7fef7319768,0x7fef7319778
          4⤵
            PID:956
          • C:\Windows\system32\ctfmon.exe
            ctfmon.exe
            4⤵
              PID:984
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1116 --field-trial-handle=1276,i,4361114122981882210,9683494421855477864,131072 /prefetch:2
              4⤵
                PID:1284
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1492 --field-trial-handle=1276,i,4361114122981882210,9683494421855477864,131072 /prefetch:8
                4⤵
                  PID:860
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1572 --field-trial-handle=1276,i,4361114122981882210,9683494421855477864,131072 /prefetch:8
                  4⤵
                    PID:2352
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2120 --field-trial-handle=1276,i,4361114122981882210,9683494421855477864,131072 /prefetch:1
                    4⤵
                    • Uses browser remote debugging
                    PID:1856
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2128 --field-trial-handle=1276,i,4361114122981882210,9683494421855477864,131072 /prefetch:1
                    4⤵
                    • Uses browser remote debugging
                    PID:2972
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1388 --field-trial-handle=1276,i,4361114122981882210,9683494421855477864,131072 /prefetch:2
                    4⤵
                      PID:1436
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2316 --field-trial-handle=1276,i,4361114122981882210,9683494421855477864,131072 /prefetch:1
                      4⤵
                      • Uses browser remote debugging
                      PID:1140
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3724 --field-trial-handle=1276,i,4361114122981882210,9683494421855477864,131072 /prefetch:8
                      4⤵
                        PID:1052
                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                  1⤵
                    PID:1620

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    6a160d4996c1ba1fc187e0d5abe370ec

                    SHA1

                    bcab67b4b3752890b39e47f14ae49b7ffe6f7a4e

                    SHA256

                    5188380672feb64bcb53a0f9cdf24d48a6878bb4ce32b2bea17879cd69eb60e4

                    SHA512

                    cdeca8f32cfe0725eb97118f0250f4c3a649e9757cbd86d459694fd311bc3102b54fbc35a1159a201f5b9122d89ed82e85611e6653c111a3851388f32082c08c

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    5f56032165ae60ee9dffe3f606ea14fe

                    SHA1

                    01a841f2f2e80de362e1c2e0e5a502aa973a7516

                    SHA256

                    e8b20512fd5a0a487988b7fe4dd14a02754debb53c00d14d898d781a8d33fae9

                    SHA512

                    22922308711696638385ca84e4f0b03ad14181f4637a5c86a317568509553a742c0f6d504f012057fd5120ec9967964e6a4e54b7f2c684332a567be2059cb17e

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    36ff6241058bbe64a8fb3c6416c62042

                    SHA1

                    b2e269935e97e54dff2e66ce552c49e26bb74875

                    SHA256

                    b3393a424f0e4645bf06f3c8736516b01fd21c09b86a7f4d03c684c768233a6c

                    SHA512

                    2268e6816d830ef9ddf4f89df63b9fc0a0406b2303dfd5d85f15da64433272914c26440fa99bba1d90c471a3231bfc1e3b17efd4dbbfa4361314b2f8bacb624a

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    035a8419739f7626ed6f1517e5ebbbec

                    SHA1

                    37158cbccef8306ad15d0529f363341b4f4a0419

                    SHA256

                    b46842dfbe63313ce1cc13b81d33416e4a012691a2c3558ad018955f849d76ed

                    SHA512

                    97a527337c3ecc2730ef03a6b29fb1cdd7610233d3c9377055fd946cd5bdacbcdd0702ce0f00905671baac55f4f054b6dc8981792609cc8670bbc549b5a75072

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    99dfdf18bbf31cc6ec89d8a90e75e999

                    SHA1

                    d0fcc932cb82db93206032d224e3ad888e47b08a

                    SHA256

                    65d4b69c77088777039d0d46239d1387dfb232690b9d17ed16bb29cc4ec2bc2f

                    SHA512

                    7631010d1105e51cb9e37fd6b272e6e7f909010b75e82eaf8a95ee45f81898d32e5dd5ea0081ceb9a706b847c56edfb2d65f3d8fe5cdb81f7a3c1bb077ecdc4a

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    5ee0b0cf6ab239dc2fa37e4ec1bd7a95

                    SHA1

                    b18c2dcd140a05843f69ccd4f36276f5c9969db1

                    SHA256

                    5c5a1f9c82e132060d3867c7d5fb1ad3d69a92d9c981ea8c16b69b2b18fa410b

                    SHA512

                    794fd2502a237fe13cf5399bacb23528c09ff4f926f9221e3d857c9721006ac26773df1c75b469dafa2d450a2a107bc34cbfc710516a307f6a925bb71099771c

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    20c73fcecb3f28fe1c65872a407ccb08

                    SHA1

                    469483d5a74c6205f428231d0409f5605530b881

                    SHA256

                    062d34ff10741e790c3677420eaeaa71d863e70b668a715a7dd5afaa195a09d5

                    SHA512

                    59b68d6200099011dfc226dcb7c140fbff47fa1fabc26ff81dbef031b4859a2be610b38b5c6da0b2357424ad197f658be4c18259452394aef336937b811f3119

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    304dad54a80969964e0283aa72b749c3

                    SHA1

                    18d474e4d87803a7d565e015e02bfb8908a61829

                    SHA256

                    1bc79a423d642a40e4e0c7695eb9ddabf841e8b9ed0fedfd2e7a5ab04d8edb41

                    SHA512

                    85fa31aa0bf8c9c3eb922adabb45d5f1acf7b1b48756c201db82b0957764770dce7e2b9edcc7e1882285869500943a55810fd2f8aba5c16a7cd6d367d1a4b06a

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    faa96fd674781cd2b016ae48d5818548

                    SHA1

                    d12cc6249b97d74df85d745407e0a067e7c5499d

                    SHA256

                    578786eb8770655251a647cf9cab3260c52a4c8704f3ec697eb31dd4b111d6e4

                    SHA512

                    242cd3dfcf1c27a239e2b659e7f49ad225d655d6732ccffb65e122aa703a5bd71ddb85fbd665de250d9846d3adb3e45afc7e53b45a1881cca4c63c84224e5fdf

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    3456c0cbbe7da0b2522595964718170b

                    SHA1

                    83f6e77193a3a060b889e5990ffaa17402289c48

                    SHA256

                    d6f0cc01e571f708927e648f34590f3d255ad354a87ec5a8d9b2088d7ced8899

                    SHA512

                    86defa7f8d6dc3b7f0035a2589ee66f17edc663ab72ee630abbd1cd791bbfc358781cb76274a8547d76078bff38060e94fddbe0d1a2b2e7d12b5d7e6701913d9

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    17cedb87a13757af2b6f6c2d0d072bc4

                    SHA1

                    e75a000fb7d3a08f4c5dfcb70c158637f83eef04

                    SHA256

                    45fb636d8e658ba2db394c90aa52d21de9c45af14ab7d32257c8f08578b5ef82

                    SHA512

                    d4bd5a1d8a98925daffd509b9fdf8e31ef1bc338e7592d233f6aa6ab7ec0648c682c37f7791cf327a8151b94caeaca5b32b3b1cc717abb5179b4e86ed4359216

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    b0f8c37aaf5fed1266d7529f726afa74

                    SHA1

                    38c6be9fe82a3562ed92d6ae081757e0bedc76b1

                    SHA256

                    01dd73c1ef30c82d62905bd6813ed9134d49a66b92da1cb18ae08fb93782ea26

                    SHA512

                    db324f5c3f2ad7da1a4b03899c33634a383dc1277b84121a0cbcf1171fd07dc7e538ba0e06f78918edb06a098bf18e71f37d7e085a24ab8287d0dfe64677a161

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    707ccfee927bea7d448c92054cf12ff5

                    SHA1

                    055ff219f59978a8096a2e1b2e8189ee6051a329

                    SHA256

                    7e309b374514425b59cea7a6f534f753865604f9932864b74822a2125516f341

                    SHA512

                    f0c087ec41646e1553ff950e40dbbf70b19a3e96b41351b01ee62d0971a123f72209a940d111d9942695d7dd8c416f4aa0447832412e15ab852eba36cd4d0565

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    f8c15e041946bd0a88914c586d5b7fd3

                    SHA1

                    50405e6c1b14c720987162773ff71b4a4cd1bd4d

                    SHA256

                    3ee61e0680459e34773b4c25c7bc81286676df32f80123da850987ad1a339921

                    SHA512

                    0f2a56052dd0823cf87cdb9598c6b626eda2e75141c99c0a86c34636a877279fb3a6bd2073387904b7b3afcdce8f50309298680b2c58de7fcc08fee359394fec

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    af1a9b1d505267aa442ad58e58b48d7b

                    SHA1

                    e131b59ee3e98fa1e36a0e24122d7c6e165cc699

                    SHA256

                    829e2bc2294617b05172e9e96dbfa4c25bea92fb5d9d14e15e5c07e44c2d75af

                    SHA512

                    22ba951ee725c8813aadb53b74720be4c7a0797caefa591bd28aa8c55a174a6a04016d5fe984acc57fd85411ed61af0c4bdae0b0ac8b081297670330203c4310

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    dcb633b4451659c202ca417a9beb298a

                    SHA1

                    5816d44585d9436868b97272a368dbc1ea8abdf5

                    SHA256

                    813cacdfd1880e91e01c2cae08996458d82183fa2aaac56c8878838e4b3e4309

                    SHA512

                    aebde26e1e35b693eb2fb40dba6c1f690825e2c15ef68523f1f8658043cb331eef4b4f160681ccbe4b22e62ba6006a8b4c1c208e4e84cf80f8981b7f88dd16b1

                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                    Filesize

                    16B

                    MD5

                    aefd77f47fb84fae5ea194496b44c67a

                    SHA1

                    dcfbb6a5b8d05662c4858664f81693bb7f803b82

                    SHA256

                    4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                    SHA512

                    b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                    Filesize

                    264KB

                    MD5

                    f50f89a0a91564d0b8a211f8921aa7de

                    SHA1

                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                    SHA256

                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                    SHA512

                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                    Filesize

                    16B

                    MD5

                    18e723571b00fb1694a3bad6c78e4054

                    SHA1

                    afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                    SHA256

                    8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                    SHA512

                    43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                  • C:\Users\Admin\AppData\Local\Temp\Cab1B9E.tmp

                    Filesize

                    70KB

                    MD5

                    49aebf8cbd62d92ac215b2923fb1b9f5

                    SHA1

                    1723be06719828dda65ad804298d0431f6aff976

                    SHA256

                    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                    SHA512

                    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                  • C:\Users\Admin\AppData\Local\Temp\TarD030.tmp

                    Filesize

                    181KB

                    MD5

                    4ea6026cf93ec6338144661bf1202cd1

                    SHA1

                    a1dec9044f750ad887935a01430bf49322fbdcb7

                    SHA256

                    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                    SHA512

                    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                  • memory/1736-279-0x0000000000400000-0x0000000000422000-memory.dmp

                    Filesize

                    136KB

                  • memory/1736-278-0x0000000000400000-0x0000000000422000-memory.dmp

                    Filesize

                    136KB

                  • memory/1736-256-0x0000000000400000-0x0000000000422000-memory.dmp

                    Filesize

                    136KB

                  • memory/1736-255-0x0000000000400000-0x0000000000422000-memory.dmp

                    Filesize

                    136KB

                  • memory/1736-215-0x0000000000400000-0x0000000000422000-memory.dmp

                    Filesize

                    136KB

                  • memory/1736-201-0x0000000000400000-0x0000000000422000-memory.dmp

                    Filesize

                    136KB

                  • memory/1736-191-0x0000000000400000-0x0000000000422000-memory.dmp

                    Filesize

                    136KB

                  • memory/1736-0-0x0000000000400000-0x0000000000422000-memory.dmp

                    Filesize

                    136KB

                  • memory/1736-133-0x0000000000400000-0x0000000000422000-memory.dmp

                    Filesize

                    136KB

                  • memory/1736-114-0x0000000000400000-0x0000000000422000-memory.dmp

                    Filesize

                    136KB

                  • memory/1736-3-0x0000000000400000-0x0000000000422000-memory.dmp

                    Filesize

                    136KB

                  • memory/1736-2-0x0000000000400000-0x0000000000422000-memory.dmp

                    Filesize

                    136KB

                  • memory/1736-1-0x0000000000400000-0x0000000000422000-memory.dmp

                    Filesize

                    136KB