Analysis

  • max time kernel
    94s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/09/2024, 01:58

General

  • Target

    ddaa982f06dc35e0759d9077505beb31537f86de88232b91de45130496a61ffe.exe

  • Size

    283KB

  • MD5

    53ec7e5668474c14f4288fe3f21de5d6

  • SHA1

    c9f88214e36dd2feddddb64ef7a3fc82025d6cfd

  • SHA256

    ddaa982f06dc35e0759d9077505beb31537f86de88232b91de45130496a61ffe

  • SHA512

    6f97c6e66a96ae099158fad91bd3bf6422a90690d919fb1a90eb5774895c4baba07f676bb7ead90cacbd12ff1703f31e0c112e7147d724faf2ac60a0657823d7

  • SSDEEP

    6144:y9E/XevjQ9Uodb2ZSJ6HEKudlAFQ1bu8kBRFHg4145HEO:y9E/XevjQ6odbMU6HOo2kBRNfEEO

Malware Config

Extracted

Family

vidar

C2

https://t.me/afsgsdgqr4r

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Extracted

Family

lumma

C2

https://complainnykso.shop/api

https://basedsymsotp.shop/api

https://charistmatwio.shop/api

https://grassemenwji.shop/api

https://stitchmiscpaew.shop/api

https://commisionipwn.shop/api

Signatures

  • Detect Vidar Stealer 22 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 6 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ddaa982f06dc35e0759d9077505beb31537f86de88232b91de45130496a61ffe.exe
    "C:\Users\Admin\AppData\Local\Temp\ddaa982f06dc35e0759d9077505beb31537f86de88232b91de45130496a61ffe.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5112
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:264
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
        • Checks computer location settings
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:32
        • C:\ProgramData\JEBKKEGDBF.exe
          "C:\ProgramData\JEBKKEGDBF.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4996
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
              PID:3280
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
                PID:2388
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                4⤵
                • System Location Discovery: System Language Discovery
                PID:392
            • C:\ProgramData\DHDAKFCGIJ.exe
              "C:\ProgramData\DHDAKFCGIJ.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4104
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                4⤵
                  PID:4744
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  4⤵
                  • Checks computer location settings
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Checks processor information in registry
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4952
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminKJJJDHDGDA.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:5024
                    • C:\Users\AdminKJJJDHDGDA.exe
                      "C:\Users\AdminKJJJDHDGDA.exe"
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • System Location Discovery: System Language Discovery
                      PID:1940
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        7⤵
                        • System Location Discovery: System Language Discovery
                        PID:3064
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminEBAKFIIJJK.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:2912
                    • C:\Users\AdminEBAKFIIJJK.exe
                      "C:\Users\AdminEBAKFIIJJK.exe"
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • System Location Discovery: System Language Discovery
                      PID:1896
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        7⤵
                        • System Location Discovery: System Language Discovery
                        • Checks processor information in registry
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4836
              • C:\ProgramData\CGDGHCBGDH.exe
                "C:\ProgramData\CGDGHCBGDH.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3464
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  4⤵
                    PID:2472
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Checks processor information in registry
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1392
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\AFBAKKFCBFHI" & exit
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:3452
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout /t 10
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Delays execution with timeout.exe
                    PID:1492

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\ProgramData\AKEGDHJD

              Filesize

              114KB

              MD5

              f0b6304b7b1d85d077205e5df561164a

              SHA1

              186d8f4596689a9a614cf47fc85f90f0b8704ffe

              SHA256

              c3aa800492bc1e5ff4717db8c82d1f3772b24579cde51058bdd73a9cc9822dc7

              SHA512

              d672ea182ddf56a331d3209dcf7b9af8c3ffad0b787b224fe9e3e4c80205e474a66914358fa253c170c85a8366da2f2c3aa9d42e1f6f3291a9e6bdd9ba51fb0a

            • C:\ProgramData\CGDGHCBGDH.exe

              Filesize

              282KB

              MD5

              f31d21c664ded57509d1e2e1e2c73098

              SHA1

              58abbe186f2324eca451d3866b63ceeb924d3391

              SHA256

              44d0e959d4a9c31cc02dc12dacdf34b4fa4d0d9eda5a4c6d03dfff72045cda8b

              SHA512

              5aff27d9ffb0568072f52e51679bbd9cb3c063d7bb1c3fe658c10241b633a66738d6bd7ee2111e065a1b93098bdaa1e5da6b9b8d063fe3f1ff1de7d71d32aa53

            • C:\ProgramData\DHDAKFCGIJ.exe

              Filesize

              206KB

              MD5

              68076ff4fb08f203da72e47f536db2d3

              SHA1

              c7d2df2f68fefa1b3b9ddc61809966eaa6daef49

              SHA256

              91f03b0ae9dcae932e3043b7cb19cf52541504e9a4510501d9cb2f1ddd6d10f4

              SHA512

              f400d2424839ae1ce5a362cddc759a46be3e0528d45ade309a182c202a03534acb24e90b9a02d17865c6f9a828d91d9d90927d0734ec8ffd8452a10b414ab5d6

            • C:\ProgramData\IIEBKJECFCFBFIECBKFB

              Filesize

              11KB

              MD5

              aa8c535b93c4623b8349e7e16b21337d

              SHA1

              50aa50b6622d4f22b5a73bda23da6c070a866699

              SHA256

              7a952523054034f4a0dc1e1a05efe0249aeb27f99a3c88222d152ad330cd13ac

              SHA512

              de5333a43f86b88e327245d66f3ba3607550d8209cfebea8804d2d7be6d4feea84e849bac53d71a1ed4f029dbec7730ba4b9fc9eec6aa9ac0be4713c8199e734

            • C:\ProgramData\JEBKKEGDBF.exe

              Filesize

              321KB

              MD5

              5831ebced7b72207603126ed67601c28

              SHA1

              2ba46b54074675cc132b2c4eb6f310b21c7d7041

              SHA256

              02097348db100eb22d46dc474a1078b5ddbb56ee916cc81f24fadd0a6938ac58

              SHA512

              a9924ef2373851156d981bc3c5b5d533e8b510abf6c3f12e62af0c019e740f0d077efb8f7f93699d797335df33013c72fd9ead3b2253dd82f14b7b330faacb8e

            • C:\ProgramData\JJDGIIDH

              Filesize

              116KB

              MD5

              f70aa3fa04f0536280f872ad17973c3d

              SHA1

              50a7b889329a92de1b272d0ecf5fce87395d3123

              SHA256

              8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

              SHA512

              30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

            • C:\ProgramData\KFIEHIIIJDAA\BGDAKE

              Filesize

              20KB

              MD5

              a603e09d617fea7517059b4924b1df93

              SHA1

              31d66e1496e0229c6a312f8be05da3f813b3fa9e

              SHA256

              ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7

              SHA512

              eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc

            • C:\ProgramData\KFIEHIIIJDAA\IIJEBF

              Filesize

              160KB

              MD5

              f310cf1ff562ae14449e0167a3e1fe46

              SHA1

              85c58afa9049467031c6c2b17f5c12ca73bb2788

              SHA256

              e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

              SHA512

              1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

            • C:\ProgramData\KFIEHIIIJDAA\IIJEBF

              Filesize

              40KB

              MD5

              a182561a527f929489bf4b8f74f65cd7

              SHA1

              8cd6866594759711ea1836e86a5b7ca64ee8911f

              SHA256

              42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

              SHA512

              9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

            • C:\ProgramData\mozglue.dll

              Filesize

              117KB

              MD5

              b0ee8a4da9592c72ea70a18db5d68555

              SHA1

              62def2c2fd5575980fe7523adfab0cb32d1498c6

              SHA256

              bcbee8361a2808b1fa8a5f1b7c7df0cf8db0cd17bdc06c8ec7cf199e584c17ef

              SHA512

              4c06c636773133a1c599bfe430a5be2a723e669c60dc0286fa31a275f891ada410be0bb3fe7954b368878b9a37ceb58c0718d6811850030cb4f164212c6143f7

            • C:\ProgramData\mozglue.dll

              Filesize

              593KB

              MD5

              c8fd9be83bc728cc04beffafc2907fe9

              SHA1

              95ab9f701e0024cedfbd312bcfe4e726744c4f2e

              SHA256

              ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

              SHA512

              fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

            • C:\ProgramData\msvcp140.dll

              Filesize

              5KB

              MD5

              b7a56ed8b6ef61f601305f5c42ffa64f

              SHA1

              1e194ceee90ec61d9055d9e3cae7715f84d8c85b

              SHA256

              3e81607dcf0b61f73dc2bee6b71b2351575fe1dfc8df5b0ce0a66c324b5844b6

              SHA512

              c17a62c5a24bf10889fafd6a14c6ce1c0f76fd683f64f001a455e67cb37f033baa9835265dfa02b1d88ca03c979d7b134cd9046ee48cd4baa4fa116893d7c8c9

            • C:\ProgramData\nss3.dll

              Filesize

              2.0MB

              MD5

              1cc453cdf74f31e4d913ff9c10acdde2

              SHA1

              6e85eae544d6e965f15fa5c39700fa7202f3aafe

              SHA256

              ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

              SHA512

              dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

            • C:\ProgramData\softokn3.dll

              Filesize

              13KB

              MD5

              16c75e764a9b70ca06fe062d5367abba

              SHA1

              b69856703cc2633f6703368ada943f2ce1e1d722

              SHA256

              3ef27598650d34ccca435d9eb54db0a0ba7c25d6325e17665d7905dfa2423f9f

              SHA512

              edd7391aea11ca27b88c84046e1e88623998f638a0ab7d978aec98e36d7d773f19acbf3c55fefa9ccdaa19adb28124c80431309d21dab2deec152ca2e356aec5

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

              Filesize

              2KB

              MD5

              ef96d5be97bde25484b4ead9e398f048

              SHA1

              43585d5aec977637219d0aa3b6afaff495ea107e

              SHA256

              6ae523a64f736d2653f2f62a183b4e28e3bf9f123883c21de5343899d05a8490

              SHA512

              f8d526c18e339b478162700113a35362a2e4ed4c17f011583d60ce3815565145ca16543ef88487aee37b06bded76a313b7ec54f0ae8f9f5ace1039affe04a109

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

              Filesize

              2KB

              MD5

              20c76cb66f8445aae2e06a51d36214c3

              SHA1

              25fa813cac96b5075e0963de5dbc8ec5fb2d9126

              SHA256

              5ce954bfecef5d9967d1d3b5f05879615a75ec21af03940118ae7bcda569c823

              SHA512

              576f59686d06b06b9f2f46d6f3d703d9941208466b9d25f8ea54ef6b7faf20740eb4bb203ea0bae75dbea24b1553352d56c463d23540131053c179d96b83ae3d

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

              Filesize

              1KB

              MD5

              605ba5b9f6e318cf5ff7e04ca692d865

              SHA1

              bffb9580f2445fce2ecbbe7136df2c7a0bd4cab8

              SHA256

              229b386c2065cfa8333f26ec11eef5b310191e3ea3c4e2faf8e352af03bbcf85

              SHA512

              f9ff561285b6b2b13562e3c557edfd427380106126c3d9da23b0e9a883a517d47f2431cbd80717329921967e13a23425967252e2186d528e1452cb3bdaa75adb

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

              Filesize

              458B

              MD5

              86fc512c2921f27d9c3d741127fd5f83

              SHA1

              3a5302b4e58741424206901fb8bbd56e1887e727

              SHA256

              9510eeeace58af5ef46498997f64d41a43de3151e0050cc5180c39c67433f857

              SHA512

              ed223eb0bc5d07313e41bf2b89d7bbed568acb270898e2649d31375aee6b94ba8f3089fba880f26202d26b96b9cc10d2d56dc7e9f41d074e65178d9882496e73

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

              Filesize

              450B

              MD5

              156fd2c9e2ca78e39641a6fc3d1d7de2

              SHA1

              5e1b916ceb950adba2af46ed87723cf62761a482

              SHA256

              caa6244a1eb87739aaf967f8c7adb0f3584c95a9220876698c2c6e439528ba82

              SHA512

              be51f602df659ec2ccb894f2e8f20dc4a887229c37712554b1e652edcf3b13bf7079e71be393f241a43a18f406018a281597c1f88b97e4d3ef3e5b81ab5ba332

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

              Filesize

              458B

              MD5

              af58e45ad9657d5669701fa56e37a521

              SHA1

              4399fb4f1cd0033d725848c1fc9f8f610b4c4af6

              SHA256

              a923f46bef8f704b04a28226c3e0d790141dbd0431bbada6ccb7b9be4d95b052

              SHA512

              db00459fd582e1635643eafef7f2693c3665c411ae1862bf8c0563109656689eb35b9ed275c9fbcd5ab0671a2c9c0475ab21755f90a19227d5953110d41c5b5a

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AdminKJJJDHDGDA.exe.log

              Filesize

              226B

              MD5

              916851e072fbabc4796d8916c5131092

              SHA1

              d48a602229a690c512d5fdaf4c8d77547a88e7a2

              SHA256

              7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

              SHA512

              07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

            • memory/32-32-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/32-49-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/32-4-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/32-10-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/32-89-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/32-88-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/32-81-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/32-80-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/32-50-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/32-9-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/32-33-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/32-17-0x00000000224A0000-0x00000000226FF000-memory.dmp

              Filesize

              2.4MB

            • memory/32-15-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/32-14-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/392-108-0x0000000000400000-0x0000000000458000-memory.dmp

              Filesize

              352KB

            • memory/392-115-0x0000000000400000-0x0000000000458000-memory.dmp

              Filesize

              352KB

            • memory/392-112-0x0000000000400000-0x0000000000458000-memory.dmp

              Filesize

              352KB

            • memory/1392-244-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/1392-254-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/1392-157-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/1392-155-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/1392-153-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/1392-291-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/1392-290-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/1392-276-0x0000000022A90000-0x0000000022CEF000-memory.dmp

              Filesize

              2.4MB

            • memory/3064-262-0x0000000000400000-0x0000000000458000-memory.dmp

              Filesize

              352KB

            • memory/3464-150-0x0000000000A90000-0x0000000000ADA000-memory.dmp

              Filesize

              296KB

            • memory/4104-130-0x00000000006F0000-0x0000000000728000-memory.dmp

              Filesize

              224KB

            • memory/4836-299-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/4836-298-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/4952-135-0x0000000000400000-0x0000000000643000-memory.dmp

              Filesize

              2.3MB

            • memory/4952-161-0x0000000061E00000-0x0000000061EF3000-memory.dmp

              Filesize

              972KB

            • memory/4952-133-0x0000000000400000-0x0000000000643000-memory.dmp

              Filesize

              2.3MB

            • memory/4996-116-0x0000000072A70000-0x0000000073220000-memory.dmp

              Filesize

              7.7MB

            • memory/4996-105-0x0000000072A7E000-0x0000000072A7F000-memory.dmp

              Filesize

              4KB

            • memory/4996-104-0x0000000000610000-0x0000000000664000-memory.dmp

              Filesize

              336KB

            • memory/4996-110-0x0000000072A70000-0x0000000073220000-memory.dmp

              Filesize

              7.7MB

            • memory/5112-90-0x0000000074A40000-0x00000000751F0000-memory.dmp

              Filesize

              7.7MB

            • memory/5112-13-0x0000000074A40000-0x00000000751F0000-memory.dmp

              Filesize

              7.7MB

            • memory/5112-1-0x0000000000480000-0x00000000004CA000-memory.dmp

              Filesize

              296KB

            • memory/5112-0-0x0000000074A4E000-0x0000000074A4F000-memory.dmp

              Filesize

              4KB