Analysis

  • max time kernel
    134s
  • max time network
    244s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16-09-2024 05:05

General

  • Target

    fc810b97cdfebeaa268367812e5e94175e4b47c150a136a4c596c86a6432b4f1.exe

  • Size

    282KB

  • MD5

    7676e9e26e9d68ed4333b48962e246df

  • SHA1

    8acf019a18dcf8e817a5665fcbb9a2e17e5d448a

  • SHA256

    fc810b97cdfebeaa268367812e5e94175e4b47c150a136a4c596c86a6432b4f1

  • SHA512

    4d8b18a648d5248291714868d0bfa56e8f3e051b8db18551c4c422278767111766e1dfdc373ccddd0d6139f932dc273258113a69aff79c057716e80a1b2f5c22

  • SSDEEP

    6144:sobHX7AuhXt+uvGlAs5Y9hpgeGnXU0ms3HxpRxIEt4V68EO:lbHc2TeteqE0tXxpMECVZEO

Malware Config

Extracted

Family

vidar

C2

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Extracted

Family

lumma

C2

https://complainnykso.shop/api

https://basedsymsotp.shop/api

https://charistmatwio.shop/api

https://grassemenwji.shop/api

https://stitchmiscpaew.shop/api

https://commisionipwn.shop/api

Signatures

  • Detect Vidar Stealer 20 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 5 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc810b97cdfebeaa268367812e5e94175e4b47c150a136a4c596c86a6432b4f1.exe
    "C:\Users\Admin\AppData\Local\Temp\fc810b97cdfebeaa268367812e5e94175e4b47c150a136a4c596c86a6432b4f1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3104
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:864
      • C:\ProgramData\JJJJEBGDAF.exe
        "C:\ProgramData\JJJJEBGDAF.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4352
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3264
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminDAEGIDHDHI.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4724
            • C:\Users\AdminDAEGIDHDHI.exe
              "C:\Users\AdminDAEGIDHDHI.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2980
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                7⤵
                  PID:3628
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  7⤵
                  • System Location Discovery: System Language Discovery
                  PID:424
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminIJKKKFCFHC.exe"
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3108
              • C:\Users\AdminIJKKKFCFHC.exe
                "C:\Users\AdminIJKKKFCFHC.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                PID:5036
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Checks processor information in registry
                  PID:3096
        • C:\ProgramData\JDAKJDAAFB.exe
          "C:\ProgramData\JDAKJDAAFB.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4372
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:1084
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\BAEBGHCFCAAF" & exit
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:816
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 10
            4⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:3124

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\FHDAEHDAKECGCAKFCFIJ

      Filesize

      6KB

      MD5

      e0a1293a2903c51f2edc33b05797ecee

      SHA1

      be7d701273ac6c82f0411190d875836118182485

      SHA256

      1920b0a7c030ea76ef8a5063ee74c3864964d84c55d8b9ca68a42f8929129a80

      SHA512

      bc390d797d266a9cbda5870e465c0bbf33425147afe7a9a121e60e6d60b065371b6f5d49c4e624ce8651d09777af81837181daa70e31ecb36ef058be9746be33

    • C:\ProgramData\GDBKJDGIJECF\AAFHII

      Filesize

      148KB

      MD5

      90a1d4b55edf36fa8b4cc6974ed7d4c4

      SHA1

      aba1b8d0e05421e7df5982899f626211c3c4b5c1

      SHA256

      7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

      SHA512

      ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

    • C:\ProgramData\GDBKJDGIJECF\AAFHII

      Filesize

      46KB

      MD5

      02d2c46697e3714e49f46b680b9a6b83

      SHA1

      84f98b56d49f01e9b6b76a4e21accf64fd319140

      SHA256

      522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

      SHA512

      60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

    • C:\ProgramData\GDBKJDGIJECF\AEGHJE

      Filesize

      20KB

      MD5

      c9ff7748d8fcef4cf84a5501e996a641

      SHA1

      02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

      SHA256

      4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

      SHA512

      d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

    • C:\ProgramData\JDAKJDAAFB.exe

      Filesize

      283KB

      MD5

      449d3f0970fc9cd91a8f4bea664a0cd6

      SHA1

      2a2624a79afaf0fcb01c44f8106c8bf8933106e0

      SHA256

      33da286e78538e3f5eda7b23c70578a1fda8a5b98069bd269b8a6035babe2b23

      SHA512

      e7888f333695f9fe1cda7db15f154a1261ec7cb1b67e6efb9b5c19183f5b092bea736ca768a60a5f102982a3c8e5ea1bd79035ab15f3db37c104dad9c5a48d33

    • C:\ProgramData\JJJEGHDA

      Filesize

      92KB

      MD5

      f0764eecc2d52e7c433725edd7f6e17a

      SHA1

      2b6c1165e7ca5c433b29db548ac2624037c8cb38

      SHA256

      6764736d2bd111036bea0eeb890cd75a5bb4114275abfffe615d9f79049f0ffc

      SHA512

      3cb2f0abc6925907488de7ecef46d60106efb98cec3c63e24e531bbf94dcd8c89ad57e0a88084eaa5083265f32134e6636f23808622db5cb3f5c83faaba96ef0

    • C:\ProgramData\JJJJEBGDAF.exe

      Filesize

      207KB

      MD5

      cd6646d9eddb6ed8900b5bd9da0597f2

      SHA1

      d87cb53b2b10d804721c80894bccbc989df5acae

      SHA256

      743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24

      SHA512

      39060c059137fd3fd00405043e97608481bf2035090a0f5aafebec84975c701296e9227f3e61977a14d9767830be4cdf1b2fd36c443643b73ec135f438b8a8b6

    • C:\ProgramData\freebl3.dll

      Filesize

      165KB

      MD5

      ebd40e455e52c4f8dd7b5e878a9f1144

      SHA1

      93a315175e170d4c8c6e58fc6ea9fd7cf3ae6095

      SHA256

      29fe4201aeb40b09a71c03627ae4e17eecfbdd629b8318ee42c052e4ac22e9e0

      SHA512

      450318160a1a5014d2c8f986eb07342cc56f747d7b2f0d7cf4503d0c7942dd8921f44b258a0d692b6abda5bc74a4012a67e2a0ad0fe3116c2c809bebcc3ee610

    • C:\ProgramData\msvcp140.dll

      Filesize

      13KB

      MD5

      e416a22acaeff6cec5aa36a72becbede

      SHA1

      9fefce2eafd2e79ce0f0c60e2174b0052bfd0d2f

      SHA256

      edc0250d8dfe5b4049a64b6171d12ad701784f4650484d35315ab5286384e79e

      SHA512

      8ab549504e9c7f787e4ace97bcce5eed5bd9758b8cc223eae537e5ba3dc0f22ddd84802b1c43c2e947aa0a97742793b8cd09a5563ccd21820fa00bb5c1294421

    • C:\ProgramData\softokn3.dll

      Filesize

      15KB

      MD5

      8d47d41f277b8c2757e7fa77b00c4e84

      SHA1

      7a02b45ab67cc790427422c982d993b824a00c34

      SHA256

      0b256453817a5771d3b086057ab544994d7414dd571c9badf4d0d225006e86e8

      SHA512

      f55f8856dfb12b65d5ed22e13dc5bbf6e2f0354fb8bda13411596bb5c085f6a4a872f677954f8bd4eb337bbbaec5934431766f1dd19a9617e8a66f1d7e817b7b

    • C:\Users\AdminDAEGIDHDHI.exe

      Filesize

      321KB

      MD5

      5831ebced7b72207603126ed67601c28

      SHA1

      2ba46b54074675cc132b2c4eb6f310b21c7d7041

      SHA256

      02097348db100eb22d46dc474a1078b5ddbb56ee916cc81f24fadd0a6938ac58

      SHA512

      a9924ef2373851156d981bc3c5b5d533e8b510abf6c3f12e62af0c019e740f0d077efb8f7f93699d797335df33013c72fd9ead3b2253dd82f14b7b330faacb8e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

      Filesize

      717B

      MD5

      822467b728b7a66b081c91795373789a

      SHA1

      d8f2f02e1eef62485a9feffd59ce837511749865

      SHA256

      af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

      SHA512

      bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

      Filesize

      2KB

      MD5

      375415776602c95039b112490beef7b8

      SHA1

      60c665ce93548d1634b3b86419a0b31ed2ef267d

      SHA256

      7adb9f2f9214814e7d669a867636b029862d5840cbfde3805be93d04f37a8939

      SHA512

      f6f26f2b52be8f8815f354da5e1fd50de93e6b40a79ca6535b055e03db7cf01ef3a5017e1d857f2a3b8f5ec27103e3f053f613ec7343da1d3fb008894db73939

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

      Filesize

      2KB

      MD5

      4f28f91cf083663dc10c8c83d7fec78a

      SHA1

      4874e9a130dfa66257800c7e4c53f370fd29db84

      SHA256

      fa6b9ac9ae1c57705c63fb5fe4cb721582f236dde25668a5f63a59769cb99287

      SHA512

      e27e3df78d6c0bd6dde4479ef8538e7da4d907fcb2c31ae792b4bb7190465ff6a8f4651281a9a2bbad4939b4d0288feb22666945675b51f99b35611e2c8a8244

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B84E13677C80694CBFF0221DAF79ACF3

      Filesize

      504B

      MD5

      86950f5a653e1624573277324dd5f88b

      SHA1

      771a75f62e942505dd4eb449dd8f090d2ee04183

      SHA256

      77595f3804a8300e7712e3f88ab1dd47bea3596ec5f63178dedadb21da21af7b

      SHA512

      3678d88496e446a04ffc5103e0a08b250b256729d93c68f26e6840d455c5bf084baf99ea506d27f0f63fb3ef0a2849179dd53032a5f5fa8b46b9da97d3c18b1d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

      Filesize

      1KB

      MD5

      30bbf79a5d8e291a526458c43603682c

      SHA1

      0d9a5f1a13a800b416cb803da570a1e82a2e40c1

      SHA256

      1c045ef45ff87b7422faef763da35e239c0d278f0d3d8fefa86f44d3b753da21

      SHA512

      2a415850423404cca839f5202a74799f17ab25f623d3b8d9e622e97488b769ced88f72ff1f2fc8101b0c7dc299d6329c10442b247b4c0a408cace5428f97e98a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

      Filesize

      192B

      MD5

      ae821f2cc277ca6ddcffda0049e53e9a

      SHA1

      0da4999469ec5f022eaadac25177bcec34a3f7a8

      SHA256

      ac0d3d2a602a94fc8c04d517fefbbabe8db9a638d34af8dac0a07d79a3721222

      SHA512

      bb8f663d631212b8d2858b6b774ec98fdf548d61f3bf4010001498f43a37cff65e9ad47e1c62797f828720320c286d982f0243fbe27406362a44e0525a03be22

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

      Filesize

      458B

      MD5

      d92fe509c1454e332f4a7633d0d80618

      SHA1

      2fb70ed44df17138e6fdbb0ca8e988d42e6f7589

      SHA256

      e1681bbb79d24270d46147cbf2f4097e362eac8bffea3c7eb50c243ee1f8f259

      SHA512

      104170f1420bdc9a57bdf4ac26dfd673fe31875e33a7c741a2120855be7137826cba4e506980e4c16fcb459b3278e980239160167474fc51212a1481d1fd61dc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

      Filesize

      450B

      MD5

      a5d5f185df319c2a3c36f51bd20cd195

      SHA1

      2911cd7fcf3d32dd9811b994c1f8342b7f2c1b70

      SHA256

      5291b5de7c03a21b247915f3d57ead988666d4870d5de6254821089a37a86154

      SHA512

      63bdf773edf385c0c9cae83480ea81ca9894ecad36efa78aef8ee39bbdffdd177ab9916293f65fb894009f55e75daa227b773a64b0a44572c120271f1995b5b8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B84E13677C80694CBFF0221DAF79ACF3

      Filesize

      550B

      MD5

      5e66186e3a8f2fa782fcd17efd2e823e

      SHA1

      0edd7035ab3417fc98b5d53b84aed06dc2e39d2f

      SHA256

      ff94a9b615a446c418a8fb56e6588314592f1f37eda2987f4279b4565d8ccaf1

      SHA512

      e8654d165781eea30989332c6582be9c1723bd3e8b227aaf8bf7896d3e589640d55072bdd35f6e7b367aa8208318928f36aa8517c517afc0c26d2b81b661f53e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

      Filesize

      458B

      MD5

      978eb91354e10527b2149553f79eb2ad

      SHA1

      e02cc0ad059d2082132e3bb1724f67685fb3c7eb

      SHA256

      6f9f7ecd7f361e278cb13398528f0584311839fb9b23534963f31ac3462d586a

      SHA512

      b5859c87a7ef741fbb9e2073ff54122da155ea967ec523ee4ffd7adcf10e9e924c910a7b21aa975d614a0768ad069495bc00d30ab93391739a908770f3b6f032

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\A9WBZJPH.cookie

      Filesize

      103B

      MD5

      45674925ebcaac1ad6e0177d814e5fd7

      SHA1

      b005c76a1910b62b5653b6cacfe67741743bfa25

      SHA256

      b06467a597008f9d766f33ef6ad68a5dc9be1806d5058dcbd6ad3c72f3795462

      SHA512

      196ca660ac592fa2fccd630befbf64be9f2bff1e334f929f93f01f44fdab087ff0b0304c392fc1f6ba8618fb5c8582ed72e37a9b2d2145cd4efb9912e134f979

    • \ProgramData\mozglue.dll

      Filesize

      593KB

      MD5

      c8fd9be83bc728cc04beffafc2907fe9

      SHA1

      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

      SHA256

      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

      SHA512

      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

    • \ProgramData\nss3.dll

      Filesize

      2.0MB

      MD5

      1cc453cdf74f31e4d913ff9c10acdde2

      SHA1

      6e85eae544d6e965f15fa5c39700fa7202f3aafe

      SHA256

      ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

      SHA512

      dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

    • memory/424-200-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/424-198-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/424-202-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/864-73-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/864-80-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/864-81-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/864-10-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/864-45-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/864-28-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/864-29-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/864-31-0x00000000225B0000-0x000000002280F000-memory.dmp

      Filesize

      2.4MB

    • memory/864-72-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/864-46-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/864-8-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/864-4-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/1084-237-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/1084-116-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/1084-210-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/1084-204-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/1084-221-0x0000000020330000-0x000000002058F000-memory.dmp

      Filesize

      2.4MB

    • memory/1084-114-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/1084-118-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/1084-235-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/2980-191-0x0000000000D70000-0x0000000000DC4000-memory.dmp

      Filesize

      336KB

    • memory/3096-238-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/3096-239-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/3096-240-0x000000001FE90000-0x00000000200EF000-memory.dmp

      Filesize

      2.4MB

    • memory/3104-0-0x00000000731AE000-0x00000000731AF000-memory.dmp

      Filesize

      4KB

    • memory/3104-13-0x00000000731A0000-0x000000007388E000-memory.dmp

      Filesize

      6.9MB

    • memory/3104-1-0x0000000000800000-0x000000000084A000-memory.dmp

      Filesize

      296KB

    • memory/3104-54-0x00000000731A0000-0x000000007388E000-memory.dmp

      Filesize

      6.9MB

    • memory/3264-99-0x0000000000400000-0x0000000000643000-memory.dmp

      Filesize

      2.3MB

    • memory/3264-212-0x0000000000400000-0x0000000000643000-memory.dmp

      Filesize

      2.3MB

    • memory/3264-104-0x0000000000400000-0x0000000000643000-memory.dmp

      Filesize

      2.3MB

    • memory/3264-102-0x0000000000400000-0x0000000000643000-memory.dmp

      Filesize

      2.3MB

    • memory/3264-122-0x0000000061E00000-0x0000000061EF3000-memory.dmp

      Filesize

      972KB

    • memory/4352-96-0x0000000071B1E000-0x0000000071B1F000-memory.dmp

      Filesize

      4KB

    • memory/4352-95-0x0000000000B50000-0x0000000000B88000-memory.dmp

      Filesize

      224KB

    • memory/4352-97-0x0000000005960000-0x0000000005E5E000-memory.dmp

      Filesize

      5.0MB

    • memory/4352-236-0x0000000071B10000-0x00000000721FE000-memory.dmp

      Filesize

      6.9MB

    • memory/4352-103-0x0000000071B10000-0x00000000721FE000-memory.dmp

      Filesize

      6.9MB

    • memory/4372-112-0x0000000000180000-0x00000000001CA000-memory.dmp

      Filesize

      296KB