Analysis

  • max time kernel
    94s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-09-2024 13:18

General

  • Target

    d141cb3aae537b88910255bb6d843aa5c0b57fb03f8eb18a2d15555d6dd853fd.exe

  • Size

    404KB

  • MD5

    30c937ab3260fefe2e98cd875610fb63

  • SHA1

    b9c84958399719d8d9a9f81087830dd69b407660

  • SHA256

    d141cb3aae537b88910255bb6d843aa5c0b57fb03f8eb18a2d15555d6dd853fd

  • SHA512

    a5ae469a9728d2a93449cf9db1419fc7e279d8574ff0df706de5ad7571b60d6616260fa12fb7da64d9ff4ad06844aa8fb2854824a08936229c814c8ce62a882b

  • SSDEEP

    6144:X7lVFG2jvCstyKXJT696RjKKMNMvcdChxFvkAcdVSeDFpxErYGE0n8FRRfEO:XxdCuyKXJ6ajdvDtkXp6pSRfEO

Malware Config

Extracted

Family

vidar

Version

11

Botnet

8136aafb5e5c7dfe145176abba1ed803

C2

https://t.me/jamsemlg

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Extracted

Family

lumma

Extracted

Family

vidar

Version

11

Botnet

a669a86f8433a1e88901711c0f772c97

C2

https://t.me/jamsemlg

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Extracted

Family

lumma

C2

https://underlinemdsj.site/api

https://offeviablwke.site/api

Signatures

  • Detect Vidar Stealer 22 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 6 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d141cb3aae537b88910255bb6d843aa5c0b57fb03f8eb18a2d15555d6dd853fd.exe
    "C:\Users\Admin\AppData\Local\Temp\d141cb3aae537b88910255bb6d843aa5c0b57fb03f8eb18a2d15555d6dd853fd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Checks computer location settings
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1528
      • C:\ProgramData\FIIIIJKFCA.exe
        "C:\ProgramData\FIIIIJKFCA.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2572
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2432
      • C:\ProgramData\IDHJEBGIEB.exe
        "C:\ProgramData\IDHJEBGIEB.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4592
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
            PID:1488
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:3360
        • C:\ProgramData\FHIDAFHCBA.exe
          "C:\ProgramData\FHIDAFHCBA.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2388
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
            • Checks computer location settings
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1532
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminAKFIDHDGIE.exe"
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1688
              • C:\Users\AdminAKFIDHDGIE.exe
                "C:\Users\AdminAKFIDHDGIE.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                PID:1884
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  7⤵
                    PID:2220
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    7⤵
                      PID:3832
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      7⤵
                        PID:1168
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        7⤵
                          PID:5052
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          7⤵
                          • System Location Discovery: System Language Discovery
                          • Checks processor information in registry
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1176
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminBGIJJKKJJD.exe"
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:1852
                      • C:\Users\AdminBGIJJKKJJD.exe
                        "C:\Users\AdminBGIJJKKJJD.exe"
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:4920
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          7⤵
                          • System Location Discovery: System Language Discovery
                          PID:1856
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\IDHJEBGIEBFI" & exit
                  3⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2188
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout /t 10
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Delays execution with timeout.exe
                    PID:4684

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\ProgramData\FHIDAFHCBA.exe

              Filesize

              326KB

              MD5

              2832fbde1cf7ea83bd6fd6a4a5e8fe15

              SHA1

              1ced7a749d257091e0c3b75605fd3bc005e531de

              SHA256

              2b8bcd9d7d072feb114e0436dc10aa80fda52cdd46a4948ea1ae984f74898375

              SHA512

              c69f1197a0c74d057ab569d35c9af675fc465ce6abcc6c8fc32b316d3586871a426d7ab904c43827be7413748f0f45f7f3689076ca031fd858a4a8abf78b9299

            • C:\ProgramData\FIIIIJKFCA.exe

              Filesize

              371KB

              MD5

              32c2e31313c3df4a7a36c72503a5beba

              SHA1

              1c88051112dab0e306cadd9ee5d65f8dc229f079

              SHA256

              f1fa2872fcd33c6dbce8d974c0c0381c0762d46a53ceaca14a29727ad02baef3

              SHA512

              ee04d786e53f7fa203dbc4f8c018c72a907dabbd2d1c57e219b2ccc2dbd9d79a4ee8580b98f9b5c5024e628c0207cdd2bf93b9468e457f4ee00326c7c689f1ae

            • C:\ProgramData\GCFHDAKECFID\CAKKKJ

              Filesize

              20KB

              MD5

              a603e09d617fea7517059b4924b1df93

              SHA1

              31d66e1496e0229c6a312f8be05da3f813b3fa9e

              SHA256

              ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7

              SHA512

              eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc

            • C:\ProgramData\GCFHDAKECFID\DGHJEC

              Filesize

              40KB

              MD5

              a182561a527f929489bf4b8f74f65cd7

              SHA1

              8cd6866594759711ea1836e86a5b7ca64ee8911f

              SHA256

              42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

              SHA512

              9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

            • C:\ProgramData\GCFHDAKECFID\DGHJEC

              Filesize

              160KB

              MD5

              f310cf1ff562ae14449e0167a3e1fe46

              SHA1

              85c58afa9049467031c6c2b17f5c12ca73bb2788

              SHA256

              e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

              SHA512

              1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

            • C:\ProgramData\GIJDAFBKFIECBGCAKECG

              Filesize

              11KB

              MD5

              fc4377ee5ec974b34dfdf25d3d12ec93

              SHA1

              ca8fa04f9b22ad65402b76f5b368265fb6616a62

              SHA256

              cb48f022eccdbb6011317bc236af4613160c776dc9e9955ee52eacfca7472b56

              SHA512

              0bf156920e1d8ae275ed1808fae739ef6854dd7ce75f37d7953fdd3511488eadda10933896c6b0b4edf100c66778372370deb0655e44f4512a49e359c29b8f56

            • C:\ProgramData\HDGIJJDG

              Filesize

              116KB

              MD5

              f70aa3fa04f0536280f872ad17973c3d

              SHA1

              50a7b889329a92de1b272d0ecf5fce87395d3123

              SHA256

              8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

              SHA512

              30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

            • C:\ProgramData\IDHJEBGIEB.exe

              Filesize

              404KB

              MD5

              38dabc7063c0a175a12c30bd44cf3dbc

              SHA1

              6d7aabebd8a417168e220c7497f4bc38c314da3b

              SHA256

              de664956d799e59e1cca0788d545922ee420e3afdcf277442f148f52bc78df89

              SHA512

              674760ad37cf7886ca4cd786e4d1966d3827fdad008a85a125e18bd474d073dae8d4296427253bb86e78d3173a300611ee5eb2e01c1f968700679350fc17a24d

            • C:\ProgramData\KJKJJJEC

              Filesize

              114KB

              MD5

              3cfabadfcb05a77b204fe1a6b09a5c90

              SHA1

              f106b5ed22265e64bc61dc5cf1e2d33ed12ec18d

              SHA256

              693617c470d7472e751d872341061cfb663f22ee95bdb42f9db01f02cb90df9c

              SHA512

              d5502023a17213919e2e991f5ba2d0d2c08223fd489d876a47a37239b637d03ace9cb9b92deb71460ae4030194ca49ce9e9752e0bf2ccbcd297dc5afe62a4e7b

            • C:\ProgramData\freebl3.dll

              Filesize

              133KB

              MD5

              5b747e7a47c42f87addb25307b64690e

              SHA1

              1f23dfc3fb7165934caf9fcb61950033a640267e

              SHA256

              2bdb8d9f48a07f6bb5f661907da6b6286e01178442b53acf6041e50da1b62ee7

              SHA512

              8661239b69fb0f9efd7febcaa8f0c9172cda8d68afcc1893ac4e4d832b59394663834bf25dff2180cb3666fb8dbe823c09d5e097b532627e1e22e5f8d0b3d0a6

            • C:\ProgramData\mozglue.dll

              Filesize

              593KB

              MD5

              c8fd9be83bc728cc04beffafc2907fe9

              SHA1

              95ab9f701e0024cedfbd312bcfe4e726744c4f2e

              SHA256

              ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

              SHA512

              fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

            • C:\ProgramData\nss3.dll

              Filesize

              2KB

              MD5

              5551bc298a66bd457482cb2bb80bd966

              SHA1

              5d27bffc788eaa45309c1731390cc06de112386d

              SHA256

              3053acb03aff586448a1ce89ffca0ca44c9415f6f6b7bf7eae08908b61090a9a

              SHA512

              985abecf289f1707e727ae5f8bf4d7a6bd0b8d4576fd2381d6d2ef512f94faf064e587be0a4b5eaacc80759cac77384efdfa9809df64c02e89e5339401fffe26

            • C:\ProgramData\nss3.dll

              Filesize

              2.0MB

              MD5

              1cc453cdf74f31e4d913ff9c10acdde2

              SHA1

              6e85eae544d6e965f15fa5c39700fa7202f3aafe

              SHA256

              ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

              SHA512

              dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

            • C:\ProgramData\softokn3.dll

              Filesize

              121KB

              MD5

              53187268b6ae4850dad1117b052671fb

              SHA1

              902bc962599aa25f40e2ab7ee97157481dcc6c6f

              SHA256

              413c6c04c797823b781ef9282e43ba626cf4c512f0abb060ef082a0e13955978

              SHA512

              1c4ef05f716882f32b82041325164e68103dd8c86c58754d059610fe5e56d7c2855699c9b371c1d3f053e42618ee8898817ca4fa91d137ba588bc8c58c26beec

            • C:\ProgramData\vcruntime140.dll

              Filesize

              78KB

              MD5

              a37ee36b536409056a86f50e67777dd7

              SHA1

              1cafa159292aa736fc595fc04e16325b27cd6750

              SHA256

              8934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825

              SHA512

              3a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

              Filesize

              2KB

              MD5

              0ebee1a9b9e35e191042d46d08b040f0

              SHA1

              feb35a5f729a753bf41b24c13452fcfcb28b7b7a

              SHA256

              184f2732015e7e04f702a66175be34f02765256f60480aa8264de4942d15cadb

              SHA512

              51f23f614cb7e45d94b4ad9ff26ed5e9d3bc9f6aef6f9e7c06ce3ee16247179ea8875a473aa0d6b7c7ac2746788df395b94b4b83573691da10ee0c6f5911e018

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

              Filesize

              2KB

              MD5

              3ec2d4c1599334f16c619646f94ce3f2

              SHA1

              a45c4c1cf56c40abfdeae0d6c08985d1bcd9e494

              SHA256

              1f10213ae35bf90e3dfd5f812003bc344999075c16b92852a615573122b311fe

              SHA512

              5c390e0f7bec20261de4f5f01cc65e2b4f61a4afa6790712e6c35bf43df98b85a53fb47fc6ac3046f7515be136426fb144dca32b6871e326eb590871eefeaf7c

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

              Filesize

              1KB

              MD5

              41d1ba00ca2531f979ae1662b63faca8

              SHA1

              88d8349f7500e65e2f1daf13cf8b561021aa875a

              SHA256

              f9f52d30565d8deec6ac69966420fe12a7de43d2b4d9e668856a153aa1562f50

              SHA512

              5d83c037fb3a4519fc8337ebe7fc3cbdaefac206873b26b24bb05e5afc52a347f31a61fb6a7a25e4ed497d7585f5126e052de46360a6f5748179c8e185ec49ac

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

              Filesize

              458B

              MD5

              f37ee08bcadb96233b21dcaa77e09530

              SHA1

              015d069bc3ef6891c876b6f87e29f178eb2bdb6d

              SHA256

              a46f4b7cbb67375154b7c463bd4c67999017cd35d3607668cdc02da58f574a7f

              SHA512

              16031d5cf149fe2d57f58cc133bdd0d94debc76bb1711bc906b70a332c7806c9c4acf6bc5ac0965796a257d40ef1bbe754d816e213a6ba641737c9f7b97a3b2a

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

              Filesize

              450B

              MD5

              374d1265e2a6325ff527f82bba1e5896

              SHA1

              5c14a0c7791aa3128eb2b19a837f20dd4bedc4ea

              SHA256

              e65115470884bb391586ab0f7210b4cedf67a7021c09d59f613661d15e4c0286

              SHA512

              8a63cde78efb8936d9535aa5c04417aa6b0c90871de0eb5c9d4c07e2d756fc0de96db3b9835165cac591b9066754ac7c9a8357ddada01503a7552478c0b012b1

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

              Filesize

              458B

              MD5

              0c367e65ac207410e29e077297d160fa

              SHA1

              c07f3b385aff4c94bc7bb6bd8d8fe34f22e942cc

              SHA256

              a7049b080468f60ef80c35c70bf4e2eaad778fc5b8a2edf960e484eba9cf748f

              SHA512

              2e15a20cb6f922adb8a7dc5190378e5ee9af96fbc3e0294e077bc6e2a8b94a8b634ffa5a4a5c2f57bcf75e07d94b6468cefbac71a0a61bd8b67512c7d076bd2e

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AdminAKFIDHDGIE.exe.log

              Filesize

              425B

              MD5

              4eaca4566b22b01cd3bc115b9b0b2196

              SHA1

              e743e0792c19f71740416e7b3c061d9f1336bf94

              SHA256

              34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

              SHA512

              bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NUB8HZ4Z\sql[1].dll

              Filesize

              2.3MB

              MD5

              90e744829865d57082a7f452edc90de5

              SHA1

              833b178775f39675fa4e55eab1032353514e1052

              SHA256

              036a57102385d7f0d7b2deacf932c1c372ae30d924365b7a88f8a26657dd7550

              SHA512

              0a2d112ff7cb806a74f5ec17fe097d28107bb497d6ed5ad28ea47e6795434ba903cdb49aaf97a9a99c08cd0411f1969cad93031246dc107c26606a898e570323

            • memory/1176-286-0x0000000000400000-0x0000000000676000-memory.dmp

              Filesize

              2.5MB

            • memory/1176-287-0x0000000000400000-0x0000000000676000-memory.dmp

              Filesize

              2.5MB

            • memory/1528-89-0x0000000000400000-0x0000000000676000-memory.dmp

              Filesize

              2.5MB

            • memory/1528-30-0x0000000000400000-0x0000000000676000-memory.dmp

              Filesize

              2.5MB

            • memory/1528-3-0x0000000000400000-0x0000000000676000-memory.dmp

              Filesize

              2.5MB

            • memory/1528-6-0x0000000000400000-0x0000000000676000-memory.dmp

              Filesize

              2.5MB

            • memory/1528-8-0x0000000000400000-0x0000000000676000-memory.dmp

              Filesize

              2.5MB

            • memory/1528-29-0x0000000000400000-0x0000000000676000-memory.dmp

              Filesize

              2.5MB

            • memory/1528-31-0x0000000022200000-0x000000002245F000-memory.dmp

              Filesize

              2.4MB

            • memory/1528-46-0x0000000000400000-0x0000000000676000-memory.dmp

              Filesize

              2.5MB

            • memory/1528-47-0x0000000000400000-0x0000000000676000-memory.dmp

              Filesize

              2.5MB

            • memory/1528-63-0x0000000000400000-0x0000000000676000-memory.dmp

              Filesize

              2.5MB

            • memory/1528-64-0x0000000000400000-0x0000000000676000-memory.dmp

              Filesize

              2.5MB

            • memory/1528-88-0x0000000000400000-0x0000000000676000-memory.dmp

              Filesize

              2.5MB

            • memory/1528-97-0x0000000000400000-0x0000000000676000-memory.dmp

              Filesize

              2.5MB

            • memory/1528-98-0x0000000000400000-0x0000000000676000-memory.dmp

              Filesize

              2.5MB

            • memory/1532-161-0x0000000000400000-0x0000000000661000-memory.dmp

              Filesize

              2.4MB

            • memory/1532-162-0x0000000061E00000-0x0000000061EF3000-memory.dmp

              Filesize

              972KB

            • memory/1532-159-0x0000000000400000-0x0000000000661000-memory.dmp

              Filesize

              2.4MB

            • memory/1856-284-0x0000000000400000-0x0000000000463000-memory.dmp

              Filesize

              396KB

            • memory/2388-157-0x00000000006B0000-0x0000000000706000-memory.dmp

              Filesize

              344KB

            • memory/2432-115-0x0000000000400000-0x0000000000463000-memory.dmp

              Filesize

              396KB

            • memory/2432-121-0x0000000000400000-0x0000000000463000-memory.dmp

              Filesize

              396KB

            • memory/2432-118-0x0000000000400000-0x0000000000463000-memory.dmp

              Filesize

              396KB

            • memory/2572-112-0x000000007265E000-0x000000007265F000-memory.dmp

              Filesize

              4KB

            • memory/2572-120-0x0000000072650000-0x0000000072E00000-memory.dmp

              Filesize

              7.7MB

            • memory/2572-285-0x0000000072650000-0x0000000072E00000-memory.dmp

              Filesize

              7.7MB

            • memory/2572-113-0x0000000000440000-0x00000000004A0000-memory.dmp

              Filesize

              384KB

            • memory/2780-0-0x0000000074D7E000-0x0000000074D7F000-memory.dmp

              Filesize

              4KB

            • memory/2780-1-0x0000000000F50000-0x0000000000FBA000-memory.dmp

              Filesize

              424KB

            • memory/2780-11-0x0000000074D70000-0x0000000075520000-memory.dmp

              Filesize

              7.7MB

            • memory/2780-96-0x0000000074D70000-0x0000000075520000-memory.dmp

              Filesize

              7.7MB

            • memory/3360-241-0x0000000000400000-0x0000000000676000-memory.dmp

              Filesize

              2.5MB

            • memory/3360-139-0x0000000000400000-0x0000000000676000-memory.dmp

              Filesize

              2.5MB

            • memory/3360-267-0x0000000000400000-0x0000000000676000-memory.dmp

              Filesize

              2.5MB

            • memory/3360-141-0x0000000000400000-0x0000000000676000-memory.dmp

              Filesize

              2.5MB

            • memory/3360-260-0x0000000000400000-0x0000000000676000-memory.dmp

              Filesize

              2.5MB

            • memory/3360-246-0x0000000020210000-0x000000002046F000-memory.dmp

              Filesize

              2.4MB

            • memory/3360-137-0x0000000000400000-0x0000000000676000-memory.dmp

              Filesize

              2.5MB

            • memory/3360-240-0x0000000000400000-0x0000000000676000-memory.dmp

              Filesize

              2.5MB

            • memory/4592-135-0x0000000000DF0000-0x0000000000E5A000-memory.dmp

              Filesize

              424KB