Analysis

  • max time kernel
    24s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    30-09-2024 17:19

General

  • Target

    file.exe

  • Size

    404KB

  • MD5

    239144713534aecb31e32cae4afb4645

  • SHA1

    fc5943e5c7d751bb7225a3856032091090f74748

  • SHA256

    926091fb9ecdefb9b61384f2b65084f7b1dbb52d8b1c8de7ee0ea415d828aed2

  • SHA512

    57956184064c621f7b8246a4fce73b6678ead6b23135de87b4b645a1afeeb00d801e8225b1717ff214cadf9ea5314779d6ca5724bb2ff081a1b731579735483b

  • SSDEEP

    12288:/DZ3CU48cDxa9ZX6SE/Q+UCGoul2q/SW/HhEO:LtN4pD6JG/NUCZ8SW/Bt

Malware Config

Extracted

Family

vidar

Version

11

Botnet

12d962a0b4176a0c19c4e61c53bd20b5

C2

https://t.me/jamsemlg

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Extracted

Family

lumma

Extracted

Family

vidar

Version

11

Botnet

a669a86f8433a1e88901711c0f772c97

C2

https://t.me/jamsemlg

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Extracted

Family

lumma

C2

https://underlinemdsj.site/api

https://offeviablwke.site/api

Signatures

  • Detect Vidar Stealer 20 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 14 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\ProgramData\CFBAKKJDBK.exe
        "C:\ProgramData\CFBAKKJDBK.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1312
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          PID:1416
      • C:\ProgramData\DGCAAAFCBF.exe
        "C:\ProgramData\DGCAAAFCBF.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1780
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
            PID:1692
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1244
        • C:\ProgramData\IIEGHJJDGH.exe
          "C:\ProgramData\IIEGHJJDGH.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2256
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:2752
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminIEGCBAAFHD.exe"
              5⤵
                PID:2516
                • C:\Users\AdminIEGCBAAFHD.exe
                  "C:\Users\AdminIEGCBAAFHD.exe"
                  6⤵
                    PID:2468
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      7⤵
                        PID:1628
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminAECAECFCAA.exe"
                    5⤵
                      PID:2508
                      • C:\Users\AdminAECAECFCAA.exe
                        "C:\Users\AdminAECAECFCAA.exe"
                        6⤵
                          PID:1264
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            7⤵
                              PID:2344
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\ECFCBFBGDBKJ" & exit
                      3⤵
                        PID:2844
                        • C:\Windows\SysWOW64\timeout.exe
                          timeout /t 10
                          4⤵
                          • Delays execution with timeout.exe
                          PID:2828

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\ProgramData\CAKKEGDG

                    Filesize

                    92KB

                    MD5

                    a58d87b023e155c10b4e15fdfc6fcb06

                    SHA1

                    0ee449b782aeac54c0406adde543f19ecd9dfd38

                    SHA256

                    331b040f0bd7731b64e72a837ad86943379ff02e239c305d200108fe7e3c8c61

                    SHA512

                    1965574101a71a640efb135a49c4a968fd5feb328779c33936047afb2209424b44fba3a1ccdacee959ce5a016f22b49c8b42dc543476b11f83df0feb1b080eae

                  • C:\ProgramData\GCGIDGCGIEGD\IECFBK

                    Filesize

                    20KB

                    MD5

                    c9ff7748d8fcef4cf84a5501e996a641

                    SHA1

                    02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

                    SHA256

                    4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

                    SHA512

                    d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

                  • C:\ProgramData\GCGIDGCGIEGD\JKJKJJ

                    Filesize

                    46KB

                    MD5

                    02d2c46697e3714e49f46b680b9a6b83

                    SHA1

                    84f98b56d49f01e9b6b76a4e21accf64fd319140

                    SHA256

                    522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                    SHA512

                    60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                  • C:\ProgramData\JJEGCBGIDHCAKEBGIIDB

                    Filesize

                    6KB

                    MD5

                    6d359c219ceb6840ad04f29a5cccf4b9

                    SHA1

                    0f0bc3c9e6c8f903652816d2d3cd5b7f394d85b2

                    SHA256

                    60fc14a82f864ff815cf398beebced9191c4e72335f92a531d2aeb7964812b9c

                    SHA512

                    ab8ab78af93817e3cf50e60bc7056f945b42b891e5259df6f31fea3770addde1dc8df63596ccce656942cf02ada494a2755bf30badfdd8454127bfa6eb1e2df6

                  • C:\ProgramData\freebl3.dll

                    Filesize

                    124KB

                    MD5

                    83fb1062057d60a811a89b1fc215eada

                    SHA1

                    94c137546abcb0320a864e1905a4a8afdaea558a

                    SHA256

                    cc9a875232840f47aa1d4d29e4be5feea219bfc2965f96b1b67b901a0462e5b9

                    SHA512

                    34cef774b317f35e238f3683fa1382767a9bf2127252b603667ba754f7eefea41a483915d8d2d309bad3bc83a92f23279d0df0d9dc449d0db77b6f57f103b3f3

                  • C:\ProgramData\softokn3.dll

                    Filesize

                    1024B

                    MD5

                    85414e833687ab4cce762d248d6d5bd2

                    SHA1

                    67a548684b7f5940d1292f5b715469f2a537d20d

                    SHA256

                    adc79a4f50ed3557b42c04cb30a38c0b22fa268d5c087e22e23aa112a339bf30

                    SHA512

                    50a7fa45029c6ee46459a799ef19f381c48e8904bcd75865e5f9fcfef2e8b6006681ef03c37137a97e6afb00ea737d45fe7e573ee5c424b77de405491b99cdfd

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    475e67b7306cb6ac89e012f3bb138a01

                    SHA1

                    02cb35bd26b50e533cda53dff53d64d8adf8a47a

                    SHA256

                    a808f0267db9878ca56bb3b38eda20d433b2ffe6d84875a5f779b58841889bad

                    SHA512

                    7cec3cd9d149cbcaeb121f3103fbc2db45dc2837b7949017536634c96b75fe2d4442499915802ae6aa3fa5d2859811a462622a78d6992b03470ee6c98a37ccdb

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    0dadbfa51c676b478a11f594cf1c1a73

                    SHA1

                    75e9771984da8022b80f67faf9729f070672cda0

                    SHA256

                    a0b93dad10723336906909019992a54937728ca7c37a96a68e31eb4230952e99

                    SHA512

                    27271d7c8bb4aca00d6144ea143a347dbe10b9060ab7ba343cbc49c98177d17444a087ffbafde53503de210ad30a8c02ad5e29279a629745e541d56be836d2de

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    548001d95d6db978013c7cfe8e38f0bf

                    SHA1

                    724725c9bd135140350976a8f68e79bc1abe959b

                    SHA256

                    c5f06da0a624303a084c57956510c1c28fcdcbc4de70ba20eabe3d821a4f132d

                    SHA512

                    7439dae4d43009e34911f987d83d090d66ab5277e45c90b149db6134bb8425f71408fbe13422e43fd88b6632b4031024dafa1953836d4ff9973839f575fac87d

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    342B

                    MD5

                    61b0a29180e19d8e34757c3e0b7d0e17

                    SHA1

                    d1b517152ba642a63ac1e9bcd74bd47076d8ed8f

                    SHA256

                    088b62a5dd6a2cf553158edab3c5ccd8eee8d4088b450ff6404570f585178805

                    SHA512

                    94f6ad4dd06067f93d78b374d3fcfbfd01da28469eb95920b2f5098c64882575cb379b5c900b2e57825e313c9a59528a36406cb20c87f4ccf0af0849b5aef3f1

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\76561199780418869[1].htm

                    Filesize

                    33KB

                    MD5

                    eaa06f35d70dbba4834a7f9870fa3473

                    SHA1

                    e8582839ae1be06ea915e60fd42a839bd0ed3251

                    SHA256

                    d8e45166191f7306e6c41f3c0316210bb3169f8addb43ee15b77ba8e60bc937f

                    SHA512

                    394cc5d55814d589e94e757400b411d04d9b2e9182366a3be31b8bbfd5b23007cae7fd151ab541878c070dc2e82e30e34aac3607c10fbfca04b191c04c710684

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\76561199780418869[2].htm

                    Filesize

                    33KB

                    MD5

                    2185a65f48225f9fd666be3a8adf88fa

                    SHA1

                    8c8cbe87d63cc2954694d00eed23bc9aa5c97e2a

                    SHA256

                    f549120a43129a89d54c19fc4587110664528ff69b651497a7fad352bb5079c0

                    SHA512

                    c3f5b6602eaa50898f546f292c6d26a3fdf9432c9d5fb1b762b728aceaab2b14f9ceb717ae230aaf299e5765b295770a25082fbc3b1aebcc390bd2a42c752302

                  • C:\Users\Admin\AppData\Local\Temp\CabB8E5.tmp

                    Filesize

                    70KB

                    MD5

                    49aebf8cbd62d92ac215b2923fb1b9f5

                    SHA1

                    1723be06719828dda65ad804298d0431f6aff976

                    SHA256

                    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                    SHA512

                    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                  • C:\Users\Admin\AppData\Local\Temp\TarB8F8.tmp

                    Filesize

                    181KB

                    MD5

                    4ea6026cf93ec6338144661bf1202cd1

                    SHA1

                    a1dec9044f750ad887935a01430bf49322fbdcb7

                    SHA256

                    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                    SHA512

                    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                  • \ProgramData\CFBAKKJDBK.exe

                    Filesize

                    371KB

                    MD5

                    32c2e31313c3df4a7a36c72503a5beba

                    SHA1

                    1c88051112dab0e306cadd9ee5d65f8dc229f079

                    SHA256

                    f1fa2872fcd33c6dbce8d974c0c0381c0762d46a53ceaca14a29727ad02baef3

                    SHA512

                    ee04d786e53f7fa203dbc4f8c018c72a907dabbd2d1c57e219b2ccc2dbd9d79a4ee8580b98f9b5c5024e628c0207cdd2bf93b9468e457f4ee00326c7c689f1ae

                  • \ProgramData\DGCAAAFCBF.exe

                    Filesize

                    404KB

                    MD5

                    38dabc7063c0a175a12c30bd44cf3dbc

                    SHA1

                    6d7aabebd8a417168e220c7497f4bc38c314da3b

                    SHA256

                    de664956d799e59e1cca0788d545922ee420e3afdcf277442f148f52bc78df89

                    SHA512

                    674760ad37cf7886ca4cd786e4d1966d3827fdad008a85a125e18bd474d073dae8d4296427253bb86e78d3173a300611ee5eb2e01c1f968700679350fc17a24d

                  • \ProgramData\IIEGHJJDGH.exe

                    Filesize

                    326KB

                    MD5

                    2832fbde1cf7ea83bd6fd6a4a5e8fe15

                    SHA1

                    1ced7a749d257091e0c3b75605fd3bc005e531de

                    SHA256

                    2b8bcd9d7d072feb114e0436dc10aa80fda52cdd46a4948ea1ae984f74898375

                    SHA512

                    c69f1197a0c74d057ab569d35c9af675fc465ce6abcc6c8fc32b316d3586871a426d7ab904c43827be7413748f0f45f7f3689076ca031fd858a4a8abf78b9299

                  • \ProgramData\mozglue.dll

                    Filesize

                    593KB

                    MD5

                    c8fd9be83bc728cc04beffafc2907fe9

                    SHA1

                    95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                    SHA256

                    ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                    SHA512

                    fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                  • \ProgramData\nss3.dll

                    Filesize

                    2.0MB

                    MD5

                    1cc453cdf74f31e4d913ff9c10acdde2

                    SHA1

                    6e85eae544d6e965f15fa5c39700fa7202f3aafe

                    SHA256

                    ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                    SHA512

                    dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                  • memory/1244-584-0x0000000000400000-0x0000000000676000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/1244-590-0x0000000000400000-0x0000000000676000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/1244-580-0x0000000000400000-0x0000000000676000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/1244-582-0x0000000000400000-0x0000000000676000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/1244-587-0x0000000000400000-0x0000000000676000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/1244-588-0x0000000000400000-0x0000000000676000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/1244-586-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                    Filesize

                    4KB

                  • memory/1244-578-0x0000000000400000-0x0000000000676000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/1244-576-0x0000000000400000-0x0000000000676000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/1264-843-0x0000000000DC0000-0x0000000000E20000-memory.dmp

                    Filesize

                    384KB

                  • memory/1312-515-0x0000000002370000-0x0000000004370000-memory.dmp

                    Filesize

                    32.0MB

                  • memory/1312-504-0x000000007328E000-0x000000007328F000-memory.dmp

                    Filesize

                    4KB

                  • memory/1312-505-0x0000000000A30000-0x0000000000A90000-memory.dmp

                    Filesize

                    384KB

                  • memory/1416-536-0x0000000000400000-0x0000000000463000-memory.dmp

                    Filesize

                    396KB

                  • memory/1416-528-0x0000000000400000-0x0000000000463000-memory.dmp

                    Filesize

                    396KB

                  • memory/1416-527-0x0000000000400000-0x0000000000463000-memory.dmp

                    Filesize

                    396KB

                  • memory/1416-526-0x0000000000400000-0x0000000000463000-memory.dmp

                    Filesize

                    396KB

                  • memory/1416-525-0x0000000000400000-0x0000000000463000-memory.dmp

                    Filesize

                    396KB

                  • memory/1416-529-0x0000000000400000-0x0000000000463000-memory.dmp

                    Filesize

                    396KB

                  • memory/1416-532-0x0000000000400000-0x0000000000463000-memory.dmp

                    Filesize

                    396KB

                  • memory/1416-534-0x0000000000400000-0x0000000000463000-memory.dmp

                    Filesize

                    396KB

                  • memory/1780-554-0x0000000000A00000-0x0000000000A6A000-memory.dmp

                    Filesize

                    424KB

                  • memory/2096-1-0x0000000000800000-0x000000000086A000-memory.dmp

                    Filesize

                    424KB

                  • memory/2096-0-0x0000000074A3E000-0x0000000074A3F000-memory.dmp

                    Filesize

                    4KB

                  • memory/2096-16-0x0000000074A30000-0x000000007511E000-memory.dmp

                    Filesize

                    6.9MB

                  • memory/2256-610-0x0000000000A00000-0x0000000000A56000-memory.dmp

                    Filesize

                    344KB

                  • memory/2468-806-0x0000000000AF0000-0x0000000000B5A000-memory.dmp

                    Filesize

                    424KB

                  • memory/2520-8-0x0000000000400000-0x0000000000676000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/2520-431-0x0000000000400000-0x0000000000676000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/2520-189-0x0000000000400000-0x0000000000676000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/2520-238-0x0000000000400000-0x0000000000676000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/2520-219-0x0000000000400000-0x0000000000676000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/2520-170-0x0000000000400000-0x0000000000676000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/2520-15-0x0000000000400000-0x0000000000676000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/2520-13-0x0000000000400000-0x0000000000676000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/2520-11-0x0000000000400000-0x0000000000676000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/2520-4-0x0000000000400000-0x0000000000676000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/2520-369-0x0000000000400000-0x0000000000676000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/2520-3-0x0000000000400000-0x0000000000676000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/2520-208-0x0000000020120000-0x000000002037F000-memory.dmp

                    Filesize

                    2.4MB

                  • memory/2520-5-0x0000000000400000-0x0000000000676000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/2520-6-0x0000000000400000-0x0000000000676000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/2520-7-0x0000000000400000-0x0000000000676000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/2520-388-0x0000000000400000-0x0000000000676000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/2520-450-0x0000000000400000-0x0000000000676000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/2520-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                    Filesize

                    4KB

                  • memory/2752-620-0x0000000000400000-0x0000000000661000-memory.dmp

                    Filesize

                    2.4MB

                  • memory/2752-622-0x0000000000400000-0x0000000000661000-memory.dmp

                    Filesize

                    2.4MB

                  • memory/2752-624-0x0000000000400000-0x0000000000661000-memory.dmp

                    Filesize

                    2.4MB

                  • memory/2752-626-0x0000000000400000-0x0000000000661000-memory.dmp

                    Filesize

                    2.4MB