Analysis

  • max time kernel
    107s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-09-2024 19:15

General

  • Target

    file.exe

  • Size

    282KB

  • MD5

    5dd74b81e1e9f3ab155e1603a2fa793b

  • SHA1

    653cdaf8617c7fdec6f39db3334e858bec9a2d66

  • SHA256

    5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26

  • SHA512

    9017f6797f998423e3cd88dcf1086f6e555797a9e6414ffd714dcb394cfd3f2b2fb5432c9ba38792021b5ba9e421454385f509c9363cedb7d3ac5919f66035fa

  • SSDEEP

    6144:kpKO3JjtQLCz0sVHReGoBtSTMv+ONYwjBv8ncRoHvYpUTl/KF//sEO:kvLVVBUt8Mv+ejBv8cGzTVKdsEO

Malware Config

Extracted

Family

vidar

C2

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Extracted

Family

lumma

C2

https://grassemenwji.shop/api

https://preachstrwnwjw.shop/api

https://complainnykso.shop/api

https://basedsymsotp.shop/api

https://charistmatwio.shop/api

https://stitchmiscpaew.shop/api

https://commisionipwn.shop/api

Signatures

  • Detect Vidar Stealer 18 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:5100
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
        • Checks computer location settings
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3472
        • C:\ProgramData\KEHJKJDGCG.exe
          "C:\ProgramData\KEHJKJDGCG.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4568
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2364
        • C:\ProgramData\EHJDGCBGDB.exe
          "C:\ProgramData\EHJDGCBGDB.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2168
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
              PID:4896
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
                PID:1816
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                4⤵
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                PID:1772
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminGHJKECAAAF.exe"
                  5⤵
                    PID:4052
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminHJJKFBGCFH.exe"
                    5⤵
                      PID:752
                • C:\ProgramData\HCAEHDHDAK.exe
                  "C:\ProgramData\HCAEHDHDAK.exe"
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:5104
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:1536
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\CFIIIJJKJKFH" & exit
                  3⤵
                    PID:220
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout /t 10
                      4⤵
                      • Delays execution with timeout.exe
                      PID:2624

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\ProgramData\AFHDAKJKFCFBGCBGDHCB

                Filesize

                48KB

                MD5

                349e6eb110e34a08924d92f6b334801d

                SHA1

                bdfb289daff51890cc71697b6322aa4b35ec9169

                SHA256

                c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                SHA512

                2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

              • C:\ProgramData\AFHDAKJKFCFBGCBGDHCBAFCAKE

                Filesize

                20KB

                MD5

                49693267e0adbcd119f9f5e02adf3a80

                SHA1

                3ba3d7f89b8ad195ca82c92737e960e1f2b349df

                SHA256

                d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

                SHA512

                b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

              • C:\ProgramData\AKFHCAKJ

                Filesize

                116KB

                MD5

                f70aa3fa04f0536280f872ad17973c3d

                SHA1

                50a7b889329a92de1b272d0ecf5fce87395d3123

                SHA256

                8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                SHA512

                30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

              • C:\ProgramData\CAFIJKFHIJKKEBGCFBFHIEBAFH

                Filesize

                20KB

                MD5

                a603e09d617fea7517059b4924b1df93

                SHA1

                31d66e1496e0229c6a312f8be05da3f813b3fa9e

                SHA256

                ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7

                SHA512

                eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc

              • C:\ProgramData\DHJJEGHIIDAF\FIJECA

                Filesize

                124KB

                MD5

                9618e15b04a4ddb39ed6c496575f6f95

                SHA1

                1c28f8750e5555776b3c80b187c5d15a443a7412

                SHA256

                a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

                SHA512

                f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

              • C:\ProgramData\DHJJEGHIIDAF\IDAEHC

                Filesize

                160KB

                MD5

                f310cf1ff562ae14449e0167a3e1fe46

                SHA1

                85c58afa9049467031c6c2b17f5c12ca73bb2788

                SHA256

                e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

                SHA512

                1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

              • C:\ProgramData\DHJJEGHIIDAF\IDAEHC

                Filesize

                114KB

                MD5

                c3311360e96fcf6ea559c40a78ede854

                SHA1

                562ada1868020814b25b5dbbdbcb5a9feb9eb6ba

                SHA256

                9372c1ee21c8440368f6dd8f6c9aeda24f2067056050fab9d4e050a75437d75b

                SHA512

                fef308d10d04d9a3de7db431a9ab4a47dc120bfe0d7ae7db7e151802c426a46b00426b861e7e57ac4d6d21dde6289f278b2dbf903d4d1d6b117e77467ab9cf65

              • C:\ProgramData\EHJDGCBGDB.exe

                Filesize

                205KB

                MD5

                003978c8812e39ddb74bf9d5005cb028

                SHA1

                126f73c30469a1b7e9a04a670c35185b5df628bc

                SHA256

                06510b52e07e89b5781f4ee3c7b4d94ff84c03931b3d7d93224294860feaccf4

                SHA512

                7c0b7ec7dfe18f99cf850c80c3228f52537d5565b2950d4f0ef8cbbb7b19d1f5e2d128f3766dcede41711b4d3c5631c7f758dd61697b1e5978d596f98f54c31d

              • C:\ProgramData\HCAEHDHDAK.exe

                Filesize

                282KB

                MD5

                5dd74b81e1e9f3ab155e1603a2fa793b

                SHA1

                653cdaf8617c7fdec6f39db3334e858bec9a2d66

                SHA256

                5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26

                SHA512

                9017f6797f998423e3cd88dcf1086f6e555797a9e6414ffd714dcb394cfd3f2b2fb5432c9ba38792021b5ba9e421454385f509c9363cedb7d3ac5919f66035fa

              • C:\ProgramData\KEGCFCAKFHCGCBFHCGHD

                Filesize

                11KB

                MD5

                38965b19cb8d56724395a34db42b72ea

                SHA1

                6449d9eb0aff017505746542ace2ee05ba101ccd

                SHA256

                2d3288f6a4db2173e1b30c8f68626f61082759e4e11d87844475932aa9192aa6

                SHA512

                a07148a591f145b6e804970f959b4ddf661f9572a36d7beea8d2df7617c923b1c8a062585bf22563bb8aaeb5f391ecfa7fe06792d0d7901f126f674d51f1f71b

              • C:\ProgramData\KEHJKJDGCG.exe

                Filesize

                321KB

                MD5

                c54262d9605b19cd8d417ad7bc075c11

                SHA1

                4c99d7bf05ac22bed6007ea3db6104f2472601fd

                SHA256

                de3f08aad971888269c60afcf81dc61f2158ca08cd32c9f5dd400e07d1517b54

                SHA512

                9c3086190bcb6ac9dd1ce22e69cfaf814d4acb60140fbe9e0cb220216d068d17151cb79f8acf89567c9a7b93960479ce19ea7b86020d939f56d6fc24e4d29a3f

              • C:\ProgramData\KEHJKJDGCGDAKFHIDBGC

                Filesize

                40KB

                MD5

                a182561a527f929489bf4b8f74f65cd7

                SHA1

                8cd6866594759711ea1836e86a5b7ca64ee8911f

                SHA256

                42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                SHA512

                9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

              • C:\ProgramData\mozglue.dll

                Filesize

                593KB

                MD5

                c8fd9be83bc728cc04beffafc2907fe9

                SHA1

                95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                SHA256

                ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                SHA512

                fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

              • C:\ProgramData\nss3.dll

                Filesize

                2.0MB

                MD5

                1cc453cdf74f31e4d913ff9c10acdde2

                SHA1

                6e85eae544d6e965f15fa5c39700fa7202f3aafe

                SHA256

                ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                SHA512

                dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

              • C:\ProgramData\softokn3.dll

                Filesize

                5KB

                MD5

                d943fd798a20d796fa01aeed03b41ea0

                SHA1

                a53c656ef11eeba2931e8528c0c5f394b057cb82

                SHA256

                aefddefcb6b178882c16252df82353839ecb4a5219974c40314735dba0821768

                SHA512

                36a8567a757d5b3f286f4e5dd04a7732a413bcc469e12919c5075d04d88bab4454f5e359ed2c8d75168b4e1545191755ca2be19ee2ee427d08521593507ad425

              • C:\Users\AdminGHJKECAAAF.exe

                Filesize

                1KB

                MD5

                c6a5abb575f4c14729b299058539998f

                SHA1

                90a8e0cfc7695944c9d28f3cf908ecbeb3367d0c

                SHA256

                7271dd5c11fb9a1052a5e91a09afbe7d148fd3388dc51c338df62a0a16f06739

                SHA512

                80fa0b7d01774d4a68e42ffd4b874c60a129684d86af168699905342e95af7ff7bc84559ea5a2619a600d75346b41664522b621b7bbe3fc7b5d14448568865af

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0255CEC2C51D081EFF40366512890989_A2266F534D44FEE6BC8E990C542C69B4

                Filesize

                471B

                MD5

                a3a730aee52549b673746d0dbbc59531

                SHA1

                deb5b7d626272c1bc7b88f3476caaf1d64534972

                SHA256

                94ed1105931e5f86b887032ceb8b4f61e6f275487b7fa36220fd9ec520b82493

                SHA512

                354b4558b2a187117635e91d8d360c752c11844757be413349e5e701b1fa10294f55ea70053d49f46401bc4e7218991bde096d6c7179070963e636e3fccd3cd2

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

                Filesize

                2KB

                MD5

                ffec8069cabce0949aaee67665624e67

                SHA1

                d449a98b34103a9e80740ed9d7593c8115c3dc75

                SHA256

                340d048d7f46e25d83d97affa98d53d773e83e070b28ed67ea3472362a0a2993

                SHA512

                770d7b72772940699b4fb66ededa53a02fe580c5fcc5e050e2798e8e065c7a3505886d91d3ce05172e1d5c942069297934dd3c8c52f9e3d2be8f5d0c1ab851d3

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

                Filesize

                1KB

                MD5

                67db8c5d484fe0b60abd574b0480e4c9

                SHA1

                bafea8ad167114a72854bfe78095155bb7c44f89

                SHA256

                5d2c8933104167dece16b77357813d01c861d0c00176057ab8fe93222b51141d

                SHA512

                5d71a6271cfdcbef50f51c083f1665baaa59e7d927051ec96086bc68ceb2334227d620ee777237fccb3954ae1a1691f79d7f73335e7c95179591a1cdd0e9c844

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0255CEC2C51D081EFF40366512890989_A2266F534D44FEE6BC8E990C542C69B4

                Filesize

                490B

                MD5

                3ec4f9528f1a33bc65173504784c0a24

                SHA1

                b71d7088629a368431fd81c62ea51797e3e6ac67

                SHA256

                8b40618c9a33210d512dee51df64e421eb7cf6a3a115574334078fd98c2763a5

                SHA512

                c78ac1847d2d46bfac49dda1cc8ac966714663aafe0754fd83e66bba7c236e92f07bff01c92761d0ebb5e9f98984e8ac006ba5fdf9d10b53143d961734abd051

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

                Filesize

                482B

                MD5

                50afa7ed4bf6d19ed1e55ccf05ff1cf9

                SHA1

                a36cef8582e15e6dc4f17b37e0e130c85ca7c384

                SHA256

                a7ec7c4060ad4e0b016618e0847ee15b9c0956c973843ee66e2fefded05c9423

                SHA512

                a5ec60cfc4a4f7184cdfcdc4ed995170502fcde27a5061a3ef289e217e779170765d595aa732339570c0dd797897f79b41e8f1ef11e0edcf6e92933b7572980d

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

                Filesize

                486B

                MD5

                4e612f8d1e124faa0e1490f2554afb13

                SHA1

                fae89cfbe85c7e02bf818d5d3e85a286cffeb3bb

                SHA256

                2a8d683fc133b180cb4de13457242e94de1f931119f24f20c8a388a75767ed79

                SHA512

                f7b40aac4fefb3ffc754a005196203204fd3d27f85beedc048929dbfef23b39c172f7b269df345258a6076b12ca65fafa030270415052928d065c463247af2a6

              • memory/1536-210-0x0000000000400000-0x0000000000657000-memory.dmp

                Filesize

                2.3MB

              • memory/1536-193-0x0000000000400000-0x0000000000657000-memory.dmp

                Filesize

                2.3MB

              • memory/1536-209-0x0000000000400000-0x0000000000657000-memory.dmp

                Filesize

                2.3MB

              • memory/1536-179-0x0000000022980000-0x0000000022BDF000-memory.dmp

                Filesize

                2.4MB

              • memory/1536-178-0x0000000000400000-0x0000000000657000-memory.dmp

                Filesize

                2.3MB

              • memory/1536-177-0x0000000000400000-0x0000000000657000-memory.dmp

                Filesize

                2.3MB

              • memory/1772-141-0x0000000000400000-0x0000000000643000-memory.dmp

                Filesize

                2.3MB

              • memory/1772-144-0x0000000000400000-0x0000000000643000-memory.dmp

                Filesize

                2.3MB

              • memory/1772-212-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                Filesize

                972KB

              • memory/2168-138-0x00000000000C0000-0x00000000000F8000-memory.dmp

                Filesize

                224KB

              • memory/2312-14-0x0000000074FD0000-0x0000000075780000-memory.dmp

                Filesize

                7.7MB

              • memory/2312-0-0x0000000074FDE000-0x0000000074FDF000-memory.dmp

                Filesize

                4KB

              • memory/2312-13-0x0000000074FD0000-0x0000000075780000-memory.dmp

                Filesize

                7.7MB

              • memory/2312-1-0x0000000000350000-0x000000000039A000-memory.dmp

                Filesize

                296KB

              • memory/2364-116-0x0000000000400000-0x0000000000458000-memory.dmp

                Filesize

                352KB

              • memory/2364-119-0x0000000000400000-0x0000000000458000-memory.dmp

                Filesize

                352KB

              • memory/2364-123-0x0000000000400000-0x0000000000458000-memory.dmp

                Filesize

                352KB

              • memory/3472-38-0x0000000000400000-0x0000000000657000-memory.dmp

                Filesize

                2.3MB

              • memory/3472-23-0x0000000022200000-0x000000002245F000-memory.dmp

                Filesize

                2.4MB

              • memory/3472-89-0x0000000000400000-0x0000000000657000-memory.dmp

                Filesize

                2.3MB

              • memory/3472-81-0x0000000000400000-0x0000000000657000-memory.dmp

                Filesize

                2.3MB

              • memory/3472-80-0x0000000000400000-0x0000000000657000-memory.dmp

                Filesize

                2.3MB

              • memory/3472-56-0x0000000000400000-0x0000000000657000-memory.dmp

                Filesize

                2.3MB

              • memory/3472-55-0x0000000000400000-0x0000000000657000-memory.dmp

                Filesize

                2.3MB

              • memory/3472-39-0x0000000000400000-0x0000000000657000-memory.dmp

                Filesize

                2.3MB

              • memory/3472-4-0x0000000000400000-0x0000000000657000-memory.dmp

                Filesize

                2.3MB

              • memory/3472-88-0x0000000000400000-0x0000000000657000-memory.dmp

                Filesize

                2.3MB

              • memory/3472-22-0x0000000000400000-0x0000000000657000-memory.dmp

                Filesize

                2.3MB

              • memory/3472-21-0x0000000000400000-0x0000000000657000-memory.dmp

                Filesize

                2.3MB

              • memory/3472-8-0x0000000000400000-0x0000000000657000-memory.dmp

                Filesize

                2.3MB

              • memory/3472-10-0x0000000000400000-0x0000000000657000-memory.dmp

                Filesize

                2.3MB

              • memory/4568-124-0x0000000071F20000-0x00000000726D0000-memory.dmp

                Filesize

                7.7MB

              • memory/4568-113-0x0000000000EB0000-0x0000000000F04000-memory.dmp

                Filesize

                336KB

              • memory/4568-112-0x0000000071F2E000-0x0000000071F2F000-memory.dmp

                Filesize

                4KB

              • memory/4568-122-0x0000000071F20000-0x00000000726D0000-memory.dmp

                Filesize

                7.7MB