Analysis

  • max time kernel
    139s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250410-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/04/2025, 14:03

General

  • Target

    2025-04-20_9d8735f3616aa80144974a74ddeb99fa_black-basta_cobalt-strike_ryuk_satacom.exe

  • Size

    799KB

  • MD5

    9d8735f3616aa80144974a74ddeb99fa

  • SHA1

    70414ba52fbfe2606e8fb08d43afbab4488628eb

  • SHA256

    fd39a100de7ae6efc732edeab31a89313d0be7e0540acffc04f6ed707c48c48d

  • SHA512

    231c202bfa703e3c0740b990344ee2903eceba15abb79add30a0690089eb12ec64a264301fd20c46f97eb6092e80b3dbc2227c1b447844a03a422689eb34c315

  • SSDEEP

    12288:dbGU3fK+OmAeJWcl28vZ2CYizu+9LKLdEEo4Edka+9LKLdEEo4Edk:ZGU3bNkAuaKLdjRaaKLdjR

Malware Config

Extracted

Family

vidar

Version

13.5

Botnet

c466785b3a34d7b3c4d6db04a068b664

C2

https://t.me/v00rd

https://steamcommunity.com/profiles/76561199846773220

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0

Signatures

  • Detect Vidar Stealer 37 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-20_9d8735f3616aa80144974a74ddeb99fa_black-basta_cobalt-strike_ryuk_satacom.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-20_9d8735f3616aa80144974a74ddeb99fa_black-basta_cobalt-strike_ryuk_satacom.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1060
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
        3⤵
        • Uses browser remote debugging
        • Checks processor information in registry
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1924
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe4911dcf8,0x7ffe4911dd04,0x7ffe4911dd10
          4⤵
            PID:2068
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1560,i,7968806090356631444,4889868989602029562,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2180 /prefetch:3
            4⤵
              PID:3492
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2152,i,7968806090356631444,4889868989602029562,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2148 /prefetch:2
              4⤵
                PID:5064
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2268,i,7968806090356631444,4889868989602029562,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2524 /prefetch:8
                4⤵
                  PID:2264
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3236,i,7968806090356631444,4889868989602029562,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3252 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:3808
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3276,i,7968806090356631444,4889868989602029562,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3288 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:5228
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4284,i,7968806090356631444,4889868989602029562,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=4312 /prefetch:2
                  4⤵
                  • Uses browser remote debugging
                  PID:4204
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4696,i,7968806090356631444,4889868989602029562,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3892 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:536
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5336,i,7968806090356631444,4889868989602029562,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5348 /prefetch:8
                  4⤵
                    PID:3776
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5492,i,7968806090356631444,4889868989602029562,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5548 /prefetch:8
                    4⤵
                      PID:2332
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                    3⤵
                    • Uses browser remote debugging
                    • Enumerates system info in registry
                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                    • Suspicious use of FindShellTrayWindow
                    PID:2536
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x24c,0x7ffe483ff208,0x7ffe483ff214,0x7ffe483ff220
                      4⤵
                        PID:5440
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1940,i,15021730522582682957,2242146999886598882,262144 --variations-seed-version --mojo-platform-channel-handle=2240 /prefetch:3
                        4⤵
                          PID:2252
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2212,i,15021730522582682957,2242146999886598882,262144 --variations-seed-version --mojo-platform-channel-handle=2208 /prefetch:2
                          4⤵
                            PID:3504
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2472,i,15021730522582682957,2242146999886598882,262144 --variations-seed-version --mojo-platform-channel-handle=3000 /prefetch:8
                            4⤵
                              PID:4676
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3504,i,15021730522582682957,2242146999886598882,262144 --variations-seed-version --mojo-platform-channel-handle=3560 /prefetch:1
                              4⤵
                              • Uses browser remote debugging
                              PID:4928
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3536,i,15021730522582682957,2242146999886598882,262144 --variations-seed-version --mojo-platform-channel-handle=3580 /prefetch:1
                              4⤵
                              • Uses browser remote debugging
                              PID:4328
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\ym7yu" & exit
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:5548
                            • C:\Windows\SysWOW64\timeout.exe
                              timeout /t 11
                              4⤵
                              • System Location Discovery: System Language Discovery
                              • Delays execution with timeout.exe
                              PID:1448
                      • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                        1⤵
                          PID:1204
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                          1⤵
                            PID:3076
                          • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                            1⤵
                              PID:5888

                            Network

                            MITRE ATT&CK Enterprise v16

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                              Filesize

                              649B

                              MD5

                              9eddaf61c38486326e500b204ffe44c8

                              SHA1

                              c88745e826d91e3315bb29727468b82a8dd2cd30

                              SHA256

                              cfe1466072d2b6e9d8a352694831873021aa1c3f1cb5f613c05ac8245ce08c1e

                              SHA512

                              ea3c42fb924de04bd1bb5b0b050153ed56d0e1072b7b9c99c94aba400592efbdd85268c1e72c2d817986cc93671df3a288d1fa64c6d81501a3fa1a8b56d7b51a

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              78KB

                              MD5

                              410aebb7aafab640f52933e709a30bc6

                              SHA1

                              a46a95a02ec2ec9a3a0414683754f1b4478af9d2

                              SHA256

                              d371b3cafdafe17c6cb67947852d9d2ddccbe74b3a74142d32399b3ce9874181

                              SHA512

                              ee68e49749f59053b2cfdd266d881bc3723d7dcc01fef6badd1be8bfbae1f4225171ddda659c68f7d6d655752d651ea0079b5a9beb199a880c03dd85d50bd17c

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              280B

                              MD5

                              576f64b8f21f4203eed3f6c7b065f527

                              SHA1

                              e0c4e8f914319e112a4b3562d2d6f4107750aba8

                              SHA256

                              c39a636afaeae67ebd98682bf35ff7afafceac020ed21cb564ab954ab1ef6f87

                              SHA512

                              af606a5d7d4d96afd80d8e0117f2d5f02cc82b810149f50e26d46a5b8fd7c6b2aa119aa1b7123c54d2ef19d05ca92ca738994e047e24e567e53765fc1c52f653

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\f4c676d2-896d-4e89-b4ea-3e01d7bd1ded\index-dir\the-real-index

                              Filesize

                              1KB

                              MD5

                              146bce85303083ede5e5a6698b5342bd

                              SHA1

                              837719cdd9a1bbb779d7fa7a5731dc65e0e9afbe

                              SHA256

                              b08de1f3a67dccbd6b539b1e104f80817df83c60123eb79829fa6ec3cb50d3b2

                              SHA512

                              880e5071dedb9f2803dd7467747d1484b2fc4751e7dc0190fb5ba00445a47d1a66c64d560ce48a48ed5a3814bb97989ce63d60890053238f5a1e0923407ac77a

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\f4c676d2-896d-4e89-b4ea-3e01d7bd1ded\index-dir\the-real-index~RFe57d5ed.TMP

                              Filesize

                              1KB

                              MD5

                              b6d77270d2db8d8f3b61a0340d05ddab

                              SHA1

                              0bd764708680f99dc500388a2c393a68a32accef

                              SHA256

                              ee00fd5bb20e9f08e012c80b4b8163f0983f958f03ccc225b419752c03b1f3ea

                              SHA512

                              33cd8d49e99e58a8267ef054a58250a59e3dc943ca9a55ba82e94e3e9d11059fa069600208d7eb6d602920922f968d3e8b77bd291b843de3b1fb58f30b19e79c

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              40KB

                              MD5

                              d9be55b6bc9ae804df144e047fd4f44f

                              SHA1

                              a7ad6fe7b762cd672346485480e5c9ef5fb84771

                              SHA256

                              0e25fb1fe11310c3dcf5fee7c8e9c19d5ec30d4b80c91be6493b90e4bb28fb3b

                              SHA512

                              11df55ff7a5dad3f3e0228d078b03a66179f82ce9b4cc9560004549f291a01756f6db5e16966f4f07e22533ecf343ec667288cfab014b8711d7f16ea4d7e629d

                            • memory/1060-85-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-10-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-25-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-29-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-33-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-23-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-19-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-16-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-15-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-75-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-76-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-77-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-78-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-81-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-0-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-86-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-87-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-91-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-94-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-24-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-9-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-2-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-1-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-446-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-490-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-487-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-492-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-495-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-496-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-498-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-499-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-506-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-507-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-508-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-509-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-510-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/1060-514-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB