Analysis

  • max time kernel
    46s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2024 06:13

General

  • Target

    1de1d42113064dace922eed0089dd22a9c83f1d03040f9b1e787145603ab02b2.exe

  • Size

    282KB

  • MD5

    6a6554a97cabd9a8c53fd82631dabc4d

  • SHA1

    0b3c17ed215157d1c5a9d93bb27d00b81c52c4f1

  • SHA256

    1de1d42113064dace922eed0089dd22a9c83f1d03040f9b1e787145603ab02b2

  • SHA512

    31198a4aa9df63777b3e9db8b2e9d78ae50f87cd0ad055c388331fc47338107a46f363ccc34e67e73cebc505b05418d285ca889f0ae91cb4a7d7b67ba86ed084

  • SSDEEP

    6144:T4uGqsk9IG4IshEvObSgEG/3EkAfG2eU5uG7EO:kC9DTvNgf/3rAfTeouIEO

Malware Config

Extracted

Family

vidar

C2

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Extracted

Family

lumma

C2

https://grassemenwji.shop/api

https://complainnykso.shop/api

https://basedsymsotp.shop/api

https://charistmatwio.shop/api

https://stitchmiscpaew.shop/api

https://commisionipwn.shop/api

Signatures

  • Detect Vidar Stealer 14 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 14 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1de1d42113064dace922eed0089dd22a9c83f1d03040f9b1e787145603ab02b2.exe
    "C:\Users\Admin\AppData\Local\Temp\1de1d42113064dace922eed0089dd22a9c83f1d03040f9b1e787145603ab02b2.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1624
      • C:\ProgramData\KKEHIEBKJK.exe
        "C:\ProgramData\KKEHIEBKJK.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2232
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
            PID:1776
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Modifies system certificate store
            PID:580
        • C:\ProgramData\DBGIJEHIID.exe
          "C:\ProgramData\DBGIJEHIID.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1588
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:2900
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminCBKJEGCBKK.exe"
              5⤵
                PID:1828
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminCFBAFBFIEH.exe"
                5⤵
                  PID:2632
            • C:\ProgramData\FBKFCFBFID.exe
              "C:\ProgramData\FBKFCFBFID.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2960
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                4⤵
                • System Location Discovery: System Language Discovery
                PID:2076
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 1448
                  5⤵
                  • Program crash
                  PID:1784
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\BAAAKJDAAFBA" & exit
              3⤵
                PID:348
                • C:\Windows\SysWOW64\timeout.exe
                  timeout /t 10
                  4⤵
                  • Delays execution with timeout.exe
                  PID:1392

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\CFBFHIEBKJKF\BKKFHI

            Filesize

            20KB

            MD5

            c9ff7748d8fcef4cf84a5501e996a641

            SHA1

            02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

            SHA256

            4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

            SHA512

            d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

          • C:\ProgramData\GHCAKKEG

            Filesize

            92KB

            MD5

            5a11d4c52a76804780cbb414b2595bdb

            SHA1

            14c89a2283c41b10ce8f1576404e1541c04a8125

            SHA256

            e1b3260b2607c6a5fcf91575d1de278deceaf4e5f9f0530a3782c6d9567749d8

            SHA512

            0bffe811cbba5278d39e20b66a5c4770e3855d1f5cbd45161e8ad304b78da73f555a3c42a198378efab3dfc81f384fdaefc6cbb893a708c7e2649a89fdd11762

          • C:\ProgramData\IDHIDBAEGIIIDHJKEGDB

            Filesize

            6KB

            MD5

            170d449cdb5ebdbf88e464a35363ee24

            SHA1

            2e83c27ec6d9a99b40249cca6d6360f13628c4ad

            SHA256

            d19b5d18eaa957fd7e38300b4cb4ec03f4016f9c7d45935898f8b20b16f2135f

            SHA512

            1a8bb1ea211742cc2d4698c4f03a00552c88c05d580e0d4e2a4195eec8696e090dc79967ade1e57898a926faca1068fb34a7cba18961f0753b6ac91551708fc3

          • C:\ProgramData\freebl3.dll

            Filesize

            134KB

            MD5

            5aa844f5a779cd06b6d06f62255b268b

            SHA1

            e14de34dd71c3502cacc8d340e059d97f5a02234

            SHA256

            34173e15e5220b6da6fe2741de798cc85e75bf285b4a21de5aed949cb848908c

            SHA512

            ecea108666407202a35933b81c7c1a7e4b1715030ce37ca7658173fa93a0085097815953d86a2d29196e62cdd76dd6c05d2986ed826824b800756fa9ec6a9a98

          • C:\ProgramData\msvcp140.dll

            Filesize

            13KB

            MD5

            e416a22acaeff6cec5aa36a72becbede

            SHA1

            9fefce2eafd2e79ce0f0c60e2174b0052bfd0d2f

            SHA256

            edc0250d8dfe5b4049a64b6171d12ad701784f4650484d35315ab5286384e79e

            SHA512

            8ab549504e9c7f787e4ace97bcce5eed5bd9758b8cc223eae537e5ba3dc0f22ddd84802b1c43c2e947aa0a97742793b8cd09a5563ccd21820fa00bb5c1294421

          • C:\ProgramData\nss3.dll

            Filesize

            34KB

            MD5

            c058fd08bbb10e255f188a4c8aea29c3

            SHA1

            88ebb0c8df5cf6b6dd8b2877a9f107bfe18868bb

            SHA256

            010ad5961ef4f7291009132c21fd555233102665ed02fbd9193cba4ca6def08e

            SHA512

            1c70b29632c15e7770401fbc3a7d87649164e083a9530bdb249276810ab8d604cc57a7a16f242e8d6f7d8b7e48aaae320f46e4e3991bd799636450b1d29f9953

          • C:\ProgramData\softokn3.dll

            Filesize

            63KB

            MD5

            d402b74b2ef1dd1a05729140799496ac

            SHA1

            064f39e1ec33230f510947b9d45ba677f6dfa5a9

            SHA256

            2bb2193bc40bc4d6ffac0c3dd6aa4031aecabc7f1daeded0909b69686d8a67f7

            SHA512

            1cb5cbca66232fd0b0eb6856444b308e489823a614347d9eff0e06222bcfe98cb722873f281eb0b9f0ab4df752e0f76fdedce988990a8c61a5c527c5b5ceacd2

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0255CEC2C51D081EFF40366512890989_A2266F534D44FEE6BC8E990C542C69B4

            Filesize

            471B

            MD5

            a3a730aee52549b673746d0dbbc59531

            SHA1

            deb5b7d626272c1bc7b88f3476caaf1d64534972

            SHA256

            94ed1105931e5f86b887032ceb8b4f61e6f275487b7fa36220fd9ec520b82493

            SHA512

            354b4558b2a187117635e91d8d360c752c11844757be413349e5e701b1fa10294f55ea70053d49f46401bc4e7218991bde096d6c7179070963e636e3fccd3cd2

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

            Filesize

            2KB

            MD5

            ffec8069cabce0949aaee67665624e67

            SHA1

            d449a98b34103a9e80740ed9d7593c8115c3dc75

            SHA256

            340d048d7f46e25d83d97affa98d53d773e83e070b28ed67ea3472362a0a2993

            SHA512

            770d7b72772940699b4fb66ededa53a02fe580c5fcc5e050e2798e8e065c7a3505886d91d3ce05172e1d5c942069297934dd3c8c52f9e3d2be8f5d0c1ab851d3

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

            Filesize

            1KB

            MD5

            67db8c5d484fe0b60abd574b0480e4c9

            SHA1

            bafea8ad167114a72854bfe78095155bb7c44f89

            SHA256

            5d2c8933104167dece16b77357813d01c861d0c00176057ab8fe93222b51141d

            SHA512

            5d71a6271cfdcbef50f51c083f1665baaa59e7d927051ec96086bc68ceb2334227d620ee777237fccb3954ae1a1691f79d7f73335e7c95179591a1cdd0e9c844

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

            Filesize

            471B

            MD5

            46e8d1acbc63de599e6bcee30ce42e61

            SHA1

            8127b579084e8e19bc16e5e3244eccc3db2ddbc2

            SHA256

            4a185287d39b3ef6ab927e0a3c557458f9ed03e167d84767dbec63fedf588f2b

            SHA512

            fad93bf1dfc945319e2b5b14ead60c44e92dd25c3070a82e0bbd0c66e3b9426f85b92b6c07a11669d89e2548e030361c7fceed98184fcf39834b5624b8e2b9a0

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0255CEC2C51D081EFF40366512890989_A2266F534D44FEE6BC8E990C542C69B4

            Filesize

            490B

            MD5

            a4aad4f7a74b00f1fc999c50901fb186

            SHA1

            60e53de4348969dcab13ad2022fc1b57b9668606

            SHA256

            26549c8018f4f7620d35ad2f59efdd9968db81c6c963c2cbeb54639cf0c54b61

            SHA512

            0860fb1e4cedd3da47d78959c4d57784cd069acf59f368c35900b887a89f4f585ed084a9378c207235047cd43ef17897ab343d445a949d113932c24f358fbda6

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

            Filesize

            482B

            MD5

            c91f0f6c5609bb5936e4efe9caf2f128

            SHA1

            1dce867e571de43a02c51e694ddafa41b3bc3e95

            SHA256

            d65a36f1b434b483e5d3bcd736ab1ef53ed01efd7ffaf0d15273ebd8457625ff

            SHA512

            8518fad992ab11a3659fad6c439ae0d9497b8c168ff042b5caeff4cc979d769e930ae9d16425e4dd458d84b4307cc6e7a91864d676d379d1236032fbd4eb4746

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            8f342bbe74c417f64fc7461615303287

            SHA1

            428e5a42f2c83c01b3af2bdf17687f4dde651e65

            SHA256

            8787a444f22632ca0d1dc486f3c4acc29aaa64fb3dd3b8f44f4fe1b7aa2fed4b

            SHA512

            abe255493977353e19f70eae914f01a3417c9717c5e2618b1281b722aa3d2bfb80e4fa74471a0bac35d64799ed103ee7fb090d03c39a34f8f68a29d579f32a54

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            f969e031340a8a0bf654ee379f3f0492

            SHA1

            5c2f160dd7fd55a39eb6cbac7a2e4c714b350110

            SHA256

            f354fb71e7a9dce52967a17aaf2bf9d762d6bdd6f958ef8c9e084fabbee4f180

            SHA512

            255aa52024e675fa06edc07182ce79c24a0c9c85398fe21fc29f34a99371944758058a206916acf57b00b8dbb984b12dd6a8b243528eaeb90884124dd677a6c4

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            ffbaf2fc816d303b1ae33f5093042a60

            SHA1

            ca39128c1eb0a06dbd6006b7559c5f8da0b22902

            SHA256

            23c524ad922204c46478b8562436cfc6944220c01820e9f429a14416487c5928

            SHA512

            f22559c7ee13a397f1e0355129d0121528989ebeee78569544dc666108f297f098d94b46e2460e9fadbf321c48830e6e7bf52f9c710b7aa0ca0c87f706817ec7

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

            Filesize

            486B

            MD5

            30a7e3e8e834b735dde47beb37146854

            SHA1

            17520cf2c59b7cb2795cc8d4f526c0dae33f542d

            SHA256

            7a8712089053282c418ec1e5fd5f852201f3dfdb36f988da8768507a7b3d29ad

            SHA512

            61ebf79d429db2d17007478b0bb55abda04f639044853f94d296706bd13e921bb6ae15f2a90f6392572901657320fa83b710bf7f0682b131dba7a3ef6c14dfc6

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

            Filesize

            400B

            MD5

            383833d0b8ce71ff7fd5f67a02afdf69

            SHA1

            abd45fcc94ed56642bc8d1ba74a1fa7fbac21ed2

            SHA256

            43a9eded5d3d93b0a45fb4a5f6baca43ac313503cad186d76320ff4bf6469e16

            SHA512

            67d3f4dcdb2b55901904a621dc22abb510aa29a36674f23b8eda1905eba66b66df6ed5d509af34d9ecd22cc80c68617ecd9d5a21ab463da1e82e4265cd337eda

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WCATT3E5\76561199768374681[1].htm

            Filesize

            33KB

            MD5

            0d45e5934d8c8bae7ebac6a86e42c15a

            SHA1

            7485e0d0cc2c68d235f1612f6c28fbc1dd51c517

            SHA256

            c2a8920c81443eb359ba245200f26f433d71c367f35cb67213c9b9c5d3b0d72d

            SHA512

            042ce4cfa0484e8e7f378547d9cbeb17eaf5dbe46532f724d9918ebfc79d3217c7442063eb364216204a6c26ca8ad8c44cfa6b22d4b4c605c427c2d22ee1bc72

          • C:\Users\Admin\AppData\Local\Temp\Cab980D.tmp

            Filesize

            70KB

            MD5

            49aebf8cbd62d92ac215b2923fb1b9f5

            SHA1

            1723be06719828dda65ad804298d0431f6aff976

            SHA256

            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

            SHA512

            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

          • C:\Users\Admin\AppData\Local\Temp\Tar986E.tmp

            Filesize

            181KB

            MD5

            4ea6026cf93ec6338144661bf1202cd1

            SHA1

            a1dec9044f750ad887935a01430bf49322fbdcb7

            SHA256

            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

            SHA512

            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

          • \ProgramData\DBGIJEHIID.exe

            Filesize

            205KB

            MD5

            003978c8812e39ddb74bf9d5005cb028

            SHA1

            126f73c30469a1b7e9a04a670c35185b5df628bc

            SHA256

            06510b52e07e89b5781f4ee3c7b4d94ff84c03931b3d7d93224294860feaccf4

            SHA512

            7c0b7ec7dfe18f99cf850c80c3228f52537d5565b2950d4f0ef8cbbb7b19d1f5e2d128f3766dcede41711b4d3c5631c7f758dd61697b1e5978d596f98f54c31d

          • \ProgramData\FBKFCFBFID.exe

            Filesize

            282KB

            MD5

            5dd74b81e1e9f3ab155e1603a2fa793b

            SHA1

            653cdaf8617c7fdec6f39db3334e858bec9a2d66

            SHA256

            5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26

            SHA512

            9017f6797f998423e3cd88dcf1086f6e555797a9e6414ffd714dcb394cfd3f2b2fb5432c9ba38792021b5ba9e421454385f509c9363cedb7d3ac5919f66035fa

          • \ProgramData\KKEHIEBKJK.exe

            Filesize

            321KB

            MD5

            c54262d9605b19cd8d417ad7bc075c11

            SHA1

            4c99d7bf05ac22bed6007ea3db6104f2472601fd

            SHA256

            de3f08aad971888269c60afcf81dc61f2158ca08cd32c9f5dd400e07d1517b54

            SHA512

            9c3086190bcb6ac9dd1ce22e69cfaf814d4acb60140fbe9e0cb220216d068d17151cb79f8acf89567c9a7b93960479ce19ea7b86020d939f56d6fc24e4d29a3f

          • \ProgramData\mozglue.dll

            Filesize

            593KB

            MD5

            c8fd9be83bc728cc04beffafc2907fe9

            SHA1

            95ab9f701e0024cedfbd312bcfe4e726744c4f2e

            SHA256

            ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

            SHA512

            fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

          • \ProgramData\nss3.dll

            Filesize

            2.0MB

            MD5

            1cc453cdf74f31e4d913ff9c10acdde2

            SHA1

            6e85eae544d6e965f15fa5c39700fa7202f3aafe

            SHA256

            ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

            SHA512

            dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

          • memory/580-560-0x0000000000400000-0x0000000000458000-memory.dmp

            Filesize

            352KB

          • memory/580-559-0x0000000000400000-0x0000000000458000-memory.dmp

            Filesize

            352KB

          • memory/580-557-0x0000000000400000-0x0000000000458000-memory.dmp

            Filesize

            352KB

          • memory/580-570-0x0000000000400000-0x0000000000458000-memory.dmp

            Filesize

            352KB

          • memory/580-558-0x0000000000400000-0x0000000000458000-memory.dmp

            Filesize

            352KB

          • memory/580-566-0x0000000000400000-0x0000000000458000-memory.dmp

            Filesize

            352KB

          • memory/580-564-0x0000000000400000-0x0000000000458000-memory.dmp

            Filesize

            352KB

          • memory/580-561-0x0000000000400000-0x0000000000458000-memory.dmp

            Filesize

            352KB

          • memory/1588-616-0x00000000012F0000-0x0000000001328000-memory.dmp

            Filesize

            224KB

          • memory/1624-7-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/1624-11-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/1624-4-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/1624-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/1624-14-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/1624-426-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/1624-17-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/1624-19-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/1624-10-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/1624-6-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/1624-9-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/1624-445-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/1624-161-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/1624-180-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/1624-199-0x0000000020180000-0x00000000203DF000-memory.dmp

            Filesize

            2.4MB

          • memory/1624-214-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/1624-383-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/1624-364-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/1624-233-0x0000000000400000-0x0000000000657000-memory.dmp

            Filesize

            2.3MB

          • memory/2156-0-0x000000007497E000-0x000000007497F000-memory.dmp

            Filesize

            4KB

          • memory/2156-1-0x0000000000AC0000-0x0000000000B0A000-memory.dmp

            Filesize

            296KB

          • memory/2156-8-0x0000000074970000-0x000000007505E000-memory.dmp

            Filesize

            6.9MB

          • memory/2156-22-0x0000000074970000-0x000000007505E000-memory.dmp

            Filesize

            6.9MB

          • memory/2156-15-0x00000000020C0000-0x00000000040C0000-memory.dmp

            Filesize

            32.0MB

          • memory/2232-569-0x00000000731B0000-0x000000007389E000-memory.dmp

            Filesize

            6.9MB

          • memory/2232-545-0x00000000010B0000-0x0000000001104000-memory.dmp

            Filesize

            336KB

          • memory/2232-589-0x00000000731B0000-0x000000007389E000-memory.dmp

            Filesize

            6.9MB

          • memory/2232-544-0x00000000731BE000-0x00000000731BF000-memory.dmp

            Filesize

            4KB

          • memory/2900-627-0x0000000000400000-0x0000000000643000-memory.dmp

            Filesize

            2.3MB

          • memory/2900-634-0x0000000000400000-0x0000000000643000-memory.dmp

            Filesize

            2.3MB

          • memory/2900-623-0x0000000000400000-0x0000000000643000-memory.dmp

            Filesize

            2.3MB

          • memory/2900-631-0x0000000000400000-0x0000000000643000-memory.dmp

            Filesize

            2.3MB

          • memory/2900-619-0x0000000000400000-0x0000000000643000-memory.dmp

            Filesize

            2.3MB

          • memory/2900-630-0x0000000000400000-0x0000000000643000-memory.dmp

            Filesize

            2.3MB

          • memory/2900-626-0x0000000000400000-0x0000000000643000-memory.dmp

            Filesize

            2.3MB

          • memory/2900-621-0x0000000000400000-0x0000000000643000-memory.dmp

            Filesize

            2.3MB

          • memory/2900-654-0x0000000061E00000-0x0000000061EF3000-memory.dmp

            Filesize

            972KB

          • memory/2960-693-0x0000000000F60000-0x0000000000FAA000-memory.dmp

            Filesize

            296KB