Analysis

  • max time kernel
    134s
  • max time network
    254s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16-09-2024 05:06

General

  • Target

    fdf090545751ce09207f7cec140d21d246cb2f25002683e2cd36c92e18707f56.exe

  • Size

    282KB

  • MD5

    3a507b0b6463481cbb8d248efa262ddd

  • SHA1

    97cc6f79eb1352660997a2194d7d3c9e1aff7a0e

  • SHA256

    fdf090545751ce09207f7cec140d21d246cb2f25002683e2cd36c92e18707f56

  • SHA512

    4e0abe7ecd536b25146a663ebc49afd955727d32e2e01a6b7305afec79decbc649e95e841d18e226e346eb4d1e91228c215888c1ffb5363d888f6a1a6fed57a8

  • SSDEEP

    6144:4ELt9KOtbS8O8F+pQ1UUPeZEUA85wR1ffmFSA7aFkHJuNEO:37tbStpixPRUkWB7a0wNEO

Malware Config

Extracted

Family

vidar

C2

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Extracted

Family

lumma

C2

https://complainnykso.shop/api

https://basedsymsotp.shop/api

https://charistmatwio.shop/api

https://grassemenwji.shop/api

https://stitchmiscpaew.shop/api

https://commisionipwn.shop/api

Signatures

  • Detect Vidar Stealer 20 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 5 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fdf090545751ce09207f7cec140d21d246cb2f25002683e2cd36c92e18707f56.exe
    "C:\Users\Admin\AppData\Local\Temp\fdf090545751ce09207f7cec140d21d246cb2f25002683e2cd36c92e18707f56.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4024
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:212
      • C:\ProgramData\EGCBFIEHIE.exe
        "C:\ProgramData\EGCBFIEHIE.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2420
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1328
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminHDGDHCGCBK.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3908
            • C:\Users\AdminHDGDHCGCBK.exe
              "C:\Users\AdminHDGDHCGCBK.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:5020
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:708
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminIJKFCFHJDB.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3044
            • C:\Users\AdminIJKFCFHJDB.exe
              "C:\Users\AdminIJKFCFHJDB.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:4408
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                7⤵
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                PID:1984
      • C:\ProgramData\JJJDGIECFC.exe
        "C:\ProgramData\JJJDGIECFC.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2300
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
            PID:3520
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:3936
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\AAKEGDAKEHJD" & exit
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3452
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 10
            4⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:4700

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\BAEBGCFIEHCFIDGCAAFB

      Filesize

      6KB

      MD5

      aa3687ce574496dc5e05b5e65d1cf5c3

      SHA1

      38abb0780b7f81316788f9db96d3a90e8b45dac9

      SHA256

      ae75d9ec549d73235b11204bc9774135044f76e085cc44dd859650184fbce2dd

      SHA512

      bbdfd91037a2439c7d954d320e1f37d436ed2a93928ea36e72c8aa2452bd5623fe493cea31acd6dd7fe3eeb924d8cb5b4d752e283012e8a63a3a52c399e6011a

    • C:\ProgramData\ECBGCBGC

      Filesize

      92KB

      MD5

      f0764eecc2d52e7c433725edd7f6e17a

      SHA1

      2b6c1165e7ca5c433b29db548ac2624037c8cb38

      SHA256

      6764736d2bd111036bea0eeb890cd75a5bb4114275abfffe615d9f79049f0ffc

      SHA512

      3cb2f0abc6925907488de7ecef46d60106efb98cec3c63e24e531bbf94dcd8c89ad57e0a88084eaa5083265f32134e6636f23808622db5cb3f5c83faaba96ef0

    • C:\ProgramData\EGCBFIEHIE.exe

      Filesize

      207KB

      MD5

      cd6646d9eddb6ed8900b5bd9da0597f2

      SHA1

      d87cb53b2b10d804721c80894bccbc989df5acae

      SHA256

      743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24

      SHA512

      39060c059137fd3fd00405043e97608481bf2035090a0f5aafebec84975c701296e9227f3e61977a14d9767830be4cdf1b2fd36c443643b73ec135f438b8a8b6

    • C:\ProgramData\FCFBAKJDBKJJ\BAEBGC

      Filesize

      148KB

      MD5

      90a1d4b55edf36fa8b4cc6974ed7d4c4

      SHA1

      aba1b8d0e05421e7df5982899f626211c3c4b5c1

      SHA256

      7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

      SHA512

      ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

    • C:\ProgramData\FCFBAKJDBKJJ\BAEBGC

      Filesize

      46KB

      MD5

      02d2c46697e3714e49f46b680b9a6b83

      SHA1

      84f98b56d49f01e9b6b76a4e21accf64fd319140

      SHA256

      522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

      SHA512

      60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

    • C:\ProgramData\FCFBAKJDBKJJ\HIJEGI

      Filesize

      20KB

      MD5

      c9ff7748d8fcef4cf84a5501e996a641

      SHA1

      02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

      SHA256

      4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

      SHA512

      d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

    • C:\ProgramData\JJJDGIECFC.exe

      Filesize

      283KB

      MD5

      449d3f0970fc9cd91a8f4bea664a0cd6

      SHA1

      2a2624a79afaf0fcb01c44f8106c8bf8933106e0

      SHA256

      33da286e78538e3f5eda7b23c70578a1fda8a5b98069bd269b8a6035babe2b23

      SHA512

      e7888f333695f9fe1cda7db15f154a1261ec7cb1b67e6efb9b5c19183f5b092bea736ca768a60a5f102982a3c8e5ea1bd79035ab15f3db37c104dad9c5a48d33

    • C:\ProgramData\msvcp140.dll

      Filesize

      1024B

      MD5

      458532781441ed7f121a3cc4e6f63b14

      SHA1

      f3e84e6a4179fb84f0b0a008f858fd878a1d35b5

      SHA256

      be23585ccb1f4d5389af6747a03cb83f4508e333ea885027d04045fb7c6b5a5c

      SHA512

      3b823102f72d45527c51ad39de238cb4dc38a1b6bfa25c0087aa35d65f3628c4f0f2b718bdd8dc7abf4c69f67944d63ca2b7f402047946ce5d7950a961aefb56

    • C:\Users\AdminHDGDHCGCBK.exe

      Filesize

      321KB

      MD5

      5831ebced7b72207603126ed67601c28

      SHA1

      2ba46b54074675cc132b2c4eb6f310b21c7d7041

      SHA256

      02097348db100eb22d46dc474a1078b5ddbb56ee916cc81f24fadd0a6938ac58

      SHA512

      a9924ef2373851156d981bc3c5b5d533e8b510abf6c3f12e62af0c019e740f0d077efb8f7f93699d797335df33013c72fd9ead3b2253dd82f14b7b330faacb8e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

      Filesize

      717B

      MD5

      822467b728b7a66b081c91795373789a

      SHA1

      d8f2f02e1eef62485a9feffd59ce837511749865

      SHA256

      af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

      SHA512

      bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

      Filesize

      2KB

      MD5

      375415776602c95039b112490beef7b8

      SHA1

      60c665ce93548d1634b3b86419a0b31ed2ef267d

      SHA256

      7adb9f2f9214814e7d669a867636b029862d5840cbfde3805be93d04f37a8939

      SHA512

      f6f26f2b52be8f8815f354da5e1fd50de93e6b40a79ca6535b055e03db7cf01ef3a5017e1d857f2a3b8f5ec27103e3f053f613ec7343da1d3fb008894db73939

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

      Filesize

      2KB

      MD5

      4f28f91cf083663dc10c8c83d7fec78a

      SHA1

      4874e9a130dfa66257800c7e4c53f370fd29db84

      SHA256

      fa6b9ac9ae1c57705c63fb5fe4cb721582f236dde25668a5f63a59769cb99287

      SHA512

      e27e3df78d6c0bd6dde4479ef8538e7da4d907fcb2c31ae792b4bb7190465ff6a8f4651281a9a2bbad4939b4d0288feb22666945675b51f99b35611e2c8a8244

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B84E13677C80694CBFF0221DAF79ACF3

      Filesize

      504B

      MD5

      86950f5a653e1624573277324dd5f88b

      SHA1

      771a75f62e942505dd4eb449dd8f090d2ee04183

      SHA256

      77595f3804a8300e7712e3f88ab1dd47bea3596ec5f63178dedadb21da21af7b

      SHA512

      3678d88496e446a04ffc5103e0a08b250b256729d93c68f26e6840d455c5bf084baf99ea506d27f0f63fb3ef0a2849179dd53032a5f5fa8b46b9da97d3c18b1d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

      Filesize

      1KB

      MD5

      30bbf79a5d8e291a526458c43603682c

      SHA1

      0d9a5f1a13a800b416cb803da570a1e82a2e40c1

      SHA256

      1c045ef45ff87b7422faef763da35e239c0d278f0d3d8fefa86f44d3b753da21

      SHA512

      2a415850423404cca839f5202a74799f17ab25f623d3b8d9e622e97488b769ced88f72ff1f2fc8101b0c7dc299d6329c10442b247b4c0a408cace5428f97e98a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

      Filesize

      192B

      MD5

      bffb057d825bc9ed01c4cd3ff9de7ace

      SHA1

      a9d887beee1f93429bd1ae666b8398a28732225b

      SHA256

      556e6377a07e7011376858b6aebd7071400619958bb1363ff6aa39877d974e16

      SHA512

      b86864ed688025090057edd5d8c2a3b1646568fb905f12cb5fb463e785472a91751cefc923ef2d7580e9784985ba6cb8ec2d4bf8320a1e2ab5891b71947fb148

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

      Filesize

      458B

      MD5

      8c6d13323b838f952d511b4c2659840d

      SHA1

      a3a2f96b9c40f455f8b209a4cb83d4371d103a20

      SHA256

      2e152ac42c3d47d2d4343ee8c430be3f6ee32b4d2920c57de35e88029c92a2dd

      SHA512

      db6ba2fd91be547143203a157955d55701dbcd3eb3454e47744e878d80b301d6f73691f02ec8338cbba42ba2744f30a7c5bbe35e02515a2fc93d977e44b45552

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

      Filesize

      450B

      MD5

      317662f8fb8c257bd5a91a81712f786b

      SHA1

      e34d51f26034375f6264b7665f8f1b04c39d5389

      SHA256

      a6edfc000c516afec5531a2b496de03a0f022b2af804343d55d10d0a6a830b43

      SHA512

      8aecb3b06fef4ad82eba77ce0a54305eec089df3eb29e2dfa00346b620bdfd8868763b20766aa9c8d959604c215df7831c1de1527c6f069a39c08515c18a4e2b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B84E13677C80694CBFF0221DAF79ACF3

      Filesize

      550B

      MD5

      f664aa62354abe81121559d59debff76

      SHA1

      1427c6e6d9e7b2f5f73a96fec2c9e59f725a436f

      SHA256

      994de35ac75c6b35b3ba60a6aec14fd9f0709bbbc358ff78eb426f17dfffb538

      SHA512

      bb7b2a875fcec6d948bb01c7f8b237848b87c46166eadbed68e5132350124b117565d9d3b0fb4357261da35b419ebf6e60610158354df9d67229ac94f8f8545f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

      Filesize

      458B

      MD5

      5cda1c040425107360ff294c3186b5ce

      SHA1

      4291be64d0ef3f09e76aca01ec0fcc13f261810a

      SHA256

      d60cb256901e0b5502ffd667ffc79d7f2e7fe6cc1a7974ed7640d2969a3d47d0

      SHA512

      52af132be5a23c994b6889342763d629b22d081ca7a92509f379491e3492e48b362d4dee6459038116bc3ea4601b312b89c4b76e86cd3ea185277ccc81b05ee0

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\62ORYKEP.cookie

      Filesize

      102B

      MD5

      c70b061f30aa4fb8d8b327630b8f24b0

      SHA1

      7d2358998a6baa81a798e19b894d93cd207dbf6f

      SHA256

      e352084a16a4c09165c80969dc9a64359f1eabc0e25bdcbc302a0015bb4c5fbf

      SHA512

      42e76c529d94dfb5b354fa608777806ef994c9f38908b62f0aef1e1c814fc61a5faf6b4468f4de1472da453d5ca7daabc8699ec751611fef6bdea6e5533375be

    • \ProgramData\mozglue.dll

      Filesize

      593KB

      MD5

      c8fd9be83bc728cc04beffafc2907fe9

      SHA1

      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

      SHA256

      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

      SHA512

      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

    • \ProgramData\nss3.dll

      Filesize

      2.0MB

      MD5

      1cc453cdf74f31e4d913ff9c10acdde2

      SHA1

      6e85eae544d6e965f15fa5c39700fa7202f3aafe

      SHA256

      ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

      SHA512

      dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

    • memory/212-80-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/212-73-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/212-28-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/212-4-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/212-30-0x00000000203F0000-0x000000002064F000-memory.dmp

      Filesize

      2.4MB

    • memory/212-45-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/212-46-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/212-72-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/212-7-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/212-29-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/212-81-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/212-9-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/708-207-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/708-209-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/708-205-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/1328-218-0x0000000000400000-0x0000000000643000-memory.dmp

      Filesize

      2.3MB

    • memory/1328-99-0x0000000000400000-0x0000000000643000-memory.dmp

      Filesize

      2.3MB

    • memory/1328-122-0x0000000061E00000-0x0000000061EF3000-memory.dmp

      Filesize

      972KB

    • memory/1328-102-0x0000000000400000-0x0000000000643000-memory.dmp

      Filesize

      2.3MB

    • memory/1328-104-0x0000000000400000-0x0000000000643000-memory.dmp

      Filesize

      2.3MB

    • memory/1984-243-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/1984-244-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/1984-245-0x00000000200A0000-0x00000000202FF000-memory.dmp

      Filesize

      2.4MB

    • memory/2300-113-0x00000000005F0000-0x000000000063A000-memory.dmp

      Filesize

      296KB

    • memory/2420-97-0x0000000005440000-0x000000000593E000-memory.dmp

      Filesize

      5.0MB

    • memory/2420-103-0x0000000071B70000-0x000000007225E000-memory.dmp

      Filesize

      6.9MB

    • memory/2420-96-0x0000000071B7E000-0x0000000071B7F000-memory.dmp

      Filesize

      4KB

    • memory/2420-95-0x00000000007C0000-0x00000000007F8000-memory.dmp

      Filesize

      224KB

    • memory/2420-105-0x0000000071B70000-0x000000007225E000-memory.dmp

      Filesize

      6.9MB

    • memory/3936-242-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/3936-196-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/3936-115-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/3936-117-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/3936-211-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/3936-222-0x000000001FC20000-0x000000001FE7F000-memory.dmp

      Filesize

      2.4MB

    • memory/3936-119-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/3936-241-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/4024-0-0x000000007320E000-0x000000007320F000-memory.dmp

      Filesize

      4KB

    • memory/4024-1-0x0000000000680000-0x00000000006CA000-memory.dmp

      Filesize

      296KB

    • memory/4024-54-0x0000000073200000-0x00000000738EE000-memory.dmp

      Filesize

      6.9MB

    • memory/4024-13-0x0000000073200000-0x00000000738EE000-memory.dmp

      Filesize

      6.9MB

    • memory/5020-198-0x0000000000100000-0x0000000000154000-memory.dmp

      Filesize

      336KB