Analysis

  • max time kernel
    31s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 06:29

General

  • Target

    605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe

  • Size

    404KB

  • MD5

    24ee596bc8112bf2fb1a2bb592de5f48

  • SHA1

    b68b950551a71f04e1ecdda894ce35b7702a18c2

  • SHA256

    605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901

  • SHA512

    e6f5dd23b0ca48e871a1193b1cf46b011aab00a051db109c64d8ac38176bbd2b176ddaefbd47df17cd59f76529ea4c997cb11edb2ff47fe5fd3a5f92b1edc512

  • SSDEEP

    12288:rX25ztpOkX88ZnbKnBVRYRzv3UcwtfDWXBcJ45G35UEO:TC6s889Yr0D3UcqWXBwWy5Ut

Malware Config

Extracted

Family

vidar

Version

11

Botnet

486564c74cdd6745c0139d65a01027e6

C2

https://t.me/jamsemlg

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Extracted

Family

lumma

Extracted

Family

vidar

Version

11

Botnet

8b4d47586874b08947203f03e4db3962

C2

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Extracted

Family

lumma

C2

https://underlinemdsj.site/api

Signatures

  • Detect Vidar Stealer 20 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 18 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 6 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe
    "C:\Users\Admin\AppData\Local\Temp\605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:2916
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
          PID:2920
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          2⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2180
          • C:\ProgramData\IDAEHCFHJJ.exe
            "C:\ProgramData\IDAEHCFHJJ.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2256
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
              • System Location Discovery: System Language Discovery
              • Modifies system certificate store
              PID:2248
          • C:\ProgramData\GHJKEHJEGC.exe
            "C:\ProgramData\GHJKEHJEGC.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:660
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
                PID:1732
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:2524
            • C:\ProgramData\IDBAFHDGDG.exe
              "C:\ProgramData\IDBAFHDGDG.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:2332
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                4⤵
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                PID:2632
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminAEHDAKFIJJ.exe"
                  5⤵
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:2412
                  • C:\Users\AdminAEHDAKFIJJ.exe
                    "C:\Users\AdminAEHDAKFIJJ.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    PID:1608
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      7⤵
                      • System Location Discovery: System Language Discovery
                      PID:2872
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminKFBAECBAEG.exe"
                  5⤵
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:2408
                  • C:\Users\AdminKFBAECBAEG.exe
                    "C:\Users\AdminKFBAECBAEG.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    PID:2056
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      7⤵
                        PID:2896
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        7⤵
                        • System Location Discovery: System Language Discovery
                        PID:2776
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\IECBAFCAAKJD" & exit
                3⤵
                • System Location Discovery: System Language Discovery
                PID:772
                • C:\Windows\SysWOW64\timeout.exe
                  timeout /t 10
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Delays execution with timeout.exe
                  PID:1320

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\CFIECFIJDAAKEBGCGHIE

            Filesize

            6KB

            MD5

            d35016895f29dd6993413730160a386a

            SHA1

            a52d604a695e6b809cf7f8b3e492a1ad3201f9ce

            SHA256

            c62387eac98214d6b115c0c3cd2342b5bde180c6fb3f3180fbe29880f3f772c4

            SHA512

            6d8f14ade80b554ba9e3ad859708f8c97c9458a272c09da0a318b2c68345505b7a3fa68113ae851b65ccfeebe371adff3926abbb0edabc5684f495cd36b56f3d

          • C:\ProgramData\DHJEBGIE

            Filesize

            92KB

            MD5

            2cd7a684788f438d7a7ae3946df2e26f

            SHA1

            3e5a60f38395f3c10d9243ba696468d2bb698a14

            SHA256

            2ebed8dd3531958e857c87ddbf46376b8a10ea2f364d2399d9fcc604da0bee1d

            SHA512

            0fec4b36e2173d1ad5eca880e1be1d0c7093d459aeb612d371e4ac92fbeaea55beb36e9228d36d57fe1851bd4d57b26dd5b8edb4620fb17b91441e840669c7d1

          • C:\ProgramData\IDAAKEHJDHJK\JDBGDH

            Filesize

            46KB

            MD5

            02d2c46697e3714e49f46b680b9a6b83

            SHA1

            84f98b56d49f01e9b6b76a4e21accf64fd319140

            SHA256

            522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

            SHA512

            60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

          • C:\ProgramData\IDAAKEHJDHJK\JKECGD

            Filesize

            20KB

            MD5

            c9ff7748d8fcef4cf84a5501e996a641

            SHA1

            02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

            SHA256

            4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

            SHA512

            d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

          • C:\ProgramData\freebl3.dll

            Filesize

            165KB

            MD5

            ebd40e455e52c4f8dd7b5e878a9f1144

            SHA1

            93a315175e170d4c8c6e58fc6ea9fd7cf3ae6095

            SHA256

            29fe4201aeb40b09a71c03627ae4e17eecfbdd629b8318ee42c052e4ac22e9e0

            SHA512

            450318160a1a5014d2c8f986eb07342cc56f747d7b2f0d7cf4503d0c7942dd8921f44b258a0d692b6abda5bc74a4012a67e2a0ad0fe3116c2c809bebcc3ee610

          • C:\ProgramData\msvcp140.dll

            Filesize

            178KB

            MD5

            08018452ba5445238b23992250b7e5b6

            SHA1

            0fb0a00cf90c29af5ce1bfc3f99ac4327f030dc5

            SHA256

            4e401ed11beacbd20d9558a32e6aa32c1158a467c441e41ba801df045ef5829f

            SHA512

            adb8986ba8a93a1debd490c075ae231d94fe55b9b8cd1e6a77f01b69cffe3271622b7358097bfcebe079a784dec64e692167ad0c79b9a5cc2102de5ecc57f540

          • C:\ProgramData\nss3.dll

            Filesize

            182KB

            MD5

            394d1cd96503065462fb339788b1571e

            SHA1

            491a519fc6c7fb2d0e2ba66b1129e2063d14a1d7

            SHA256

            9c08985a026d3bcd69946f0c3f1334a64f37291fd9176f9395d05f40dbeaf4cb

            SHA512

            040af68275c464c50a37902e794bac4df68a5088e0b578bd872ef7e615b846e78c4a75039717b671bf21bbf7b0299caff470fe7dcef5bd32f0da5300e3aa55f2

          • C:\ProgramData\softokn3.dll

            Filesize

            9KB

            MD5

            85ec41a6cc19151a69777e244c609f8d

            SHA1

            cceaf26d9237a06249b3d31349ca028a4e16878e

            SHA256

            8d3de0746f1c06094686411b9dffc7d7c634bacf70ec3d7b004135b200c331e3

            SHA512

            df89fb27992c5062f10ec8afcbf316586dac6e0a5564e8203514c677610e2bffdc2f422c1a3da135c1475f82c2e6fbed81ee00f27ba1b25699e6438b53cccf3f

          • C:\ProgramData\vcruntime140.dll

            Filesize

            15KB

            MD5

            c7361e97f8ab7c9f89c51c64d740b0f1

            SHA1

            e07b78d88e504b28aeff0a9f59fc75c348022797

            SHA256

            fa69d3c5893f910bb61a8cd464258b1d62024850ce95e62bd2f2fc5e1d34178e

            SHA512

            9b956df20c59f8488db3743d1167f1f8902a8318fb5d9e8478857e2f35c6e0e82d56df3363f374eb5b10524a200876e5ad53c5fc2ad1977d820c224f645062b1

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

            Filesize

            471B

            MD5

            53531d3b1632c42fbb5282b61f41eb70

            SHA1

            3e57dd0a3966162c6bf62d02cef4abcff03c1159

            SHA256

            b949b4e92e2803878a2b71476a58d2cbfd53c95ab7bb1583ce4e77398f135105

            SHA512

            60d25185037c526ac8a8c928891c2ea5fe3a5d8d24fd536b36bdaea07953350aa25c45038c5b0db4166912da3ea502a959dd4de7dd6f602d2d6cdd1d349c73b0

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            27df5104d8f8ba13b06c61ff1451e5dc

            SHA1

            b50ab3866c82ee2d09115a3f81c99b7fb7972417

            SHA256

            b6a1c4e4bb5fc58b585d70cc7720291d095cd0710c4fad5708cbd0ed2eb0c5f6

            SHA512

            5b57842d1ee21f5877af40337d7a898f43fe19c397efbee8c1af53c4c6b5d625b6bb0b7a24062233a05ff68df9022b5c1ec05cf308fba33fbde406de73cf022d

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            3c47dacdff7ca2c645c1585820312d31

            SHA1

            64ca9183357064b57c4e7b38df1dbede0bd00c43

            SHA256

            ccfe1bf72d24405beefc3918cb74b75de23b9fe0423f6bf01588e04bce334808

            SHA512

            264aaec81b69ef2cba4407a8b9919e92d8ad1747643a198710fa7b3f5b5590948c567b348b265ecc8ccc02695edd4e446cf6d52791506a68eea4b93324cd4788

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

            Filesize

            400B

            MD5

            99dafa699c9d1cbe585a6f939f841bdd

            SHA1

            a2eb336d59fc690c9d8ef2c128da77b05f68e4b8

            SHA256

            df3523c42468c1038efcbcc5286c360c7d097b8b7426e91695004aa2187d6454

            SHA512

            8620903121067897cedeb1c0978cce3ca020b1dff44743a8c7207b592f87ceb87e8ce64bb6b316840afb5f5f151492c2077c5932a585077beac1ff26b1198247

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\76561199780418869[1].htm

            Filesize

            33KB

            MD5

            9686c3d7619ee7b5054a02f624033961

            SHA1

            ba561f7437bbf3ba2f5424bc0d9f11f68be1c580

            SHA256

            05aa2ef14bb927b763e5e6c003ba77619a2f8e1d3280376c03c5450f98d205c1

            SHA512

            cf9d344f1f29b1ea57523ab6a3d490736d01104612a1c9b53085a8e0221b253ae02ed205950bb181ffe86c041479067ed4617ea0e6c17b9464cec59c409883ad

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KIYAG1MM\76561199780418869[1].htm

            Filesize

            33KB

            MD5

            2066ee5c2b0d44c84bc10460ddb3a65a

            SHA1

            1ca49675bc006ec7e0b930e4e75b183bc1ddeba8

            SHA256

            4ddeb434945d30c15cddb63742511fb6d116d8a373b0077a85991239948d609e

            SHA512

            e2478f481e0c357decd23009dfcfc2ac662c7aaf55a84a12b7e77020a07d7f3f09132fef7f60610e0b0a1afcb0ae493cf46391e3f028b0303b8e1d3519a38df8

          • C:\Users\Admin\AppData\Local\Temp\Cab89DA.tmp

            Filesize

            70KB

            MD5

            49aebf8cbd62d92ac215b2923fb1b9f5

            SHA1

            1723be06719828dda65ad804298d0431f6aff976

            SHA256

            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

            SHA512

            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

          • C:\Users\Admin\AppData\Local\Temp\Tar89FC.tmp

            Filesize

            181KB

            MD5

            4ea6026cf93ec6338144661bf1202cd1

            SHA1

            a1dec9044f750ad887935a01430bf49322fbdcb7

            SHA256

            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

            SHA512

            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

          • \ProgramData\GHJKEHJEGC.exe

            Filesize

            404KB

            MD5

            4f828f95c11479c61692052d9254022a

            SHA1

            68f1fbe839f2d41f434bdde176ccc3e6f38ec503

            SHA256

            00c39991e9994d94f4fc657f7072c7e4137baf5aa27961cf5451daf6b3cda75a

            SHA512

            91cc6dc01a62337c542c31337057653c5e41ae7b88621bc1041786a260a5b78fb834869ce8aeca05ab8263c45a41fa7833ee262440d157206b1ddae675d814f5

          • \ProgramData\IDAEHCFHJJ.exe

            Filesize

            372KB

            MD5

            8a73502b83ceb6b31b9fefb595876844

            SHA1

            41094748fdc11cd79057c14c39210d6833a25323

            SHA256

            af60c2dd60ece7f8e83870b22b1c5c0e095c9c3669171c16eaaff406cda6eeb2

            SHA512

            e5bf9b9b78c8306c13df04db83bbe4c76f0914fffde4bd584a5b96da5150102167df61b1315382a5af68038c2d3cdbd2e2414082659757c402979d3c3772b82c

          • \ProgramData\IDBAFHDGDG.exe

            Filesize

            327KB

            MD5

            dfd49d1326704cfeee9852999782e4b6

            SHA1

            4bd1c441c55ec55a1cac7ca2bfe786a739cb01a4

            SHA256

            2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef

            SHA512

            fe9e9537f76bf36b6e6abd340ef135d5d017bb2b067239f6871f5a8952d2a5b823dd89838b8d31a928b40a1a70bd83010e5f3f49905672fbcd74b763d65504bf

          • \ProgramData\mozglue.dll

            Filesize

            593KB

            MD5

            c8fd9be83bc728cc04beffafc2907fe9

            SHA1

            95ab9f701e0024cedfbd312bcfe4e726744c4f2e

            SHA256

            ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

            SHA512

            fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

          • \ProgramData\nss3.dll

            Filesize

            2.0MB

            MD5

            1cc453cdf74f31e4d913ff9c10acdde2

            SHA1

            6e85eae544d6e965f15fa5c39700fa7202f3aafe

            SHA256

            ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

            SHA512

            dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

          • memory/660-553-0x0000000000E30000-0x0000000000E98000-memory.dmp

            Filesize

            416KB

          • memory/1608-799-0x0000000000CE0000-0x0000000000D48000-memory.dmp

            Filesize

            416KB

          • memory/2056-815-0x0000000001220000-0x0000000001280000-memory.dmp

            Filesize

            384KB

          • memory/2180-211-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/2180-362-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/2180-4-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/2180-5-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/2180-7-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/2180-11-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/2180-16-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/2180-15-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/2180-8-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/2180-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/2180-6-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/2180-3-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/2180-443-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/2180-424-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/2180-381-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/2180-162-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/2180-181-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/2180-200-0x0000000020190000-0x00000000203EF000-memory.dmp

            Filesize

            2.4MB

          • memory/2180-230-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/2248-523-0x0000000000400000-0x0000000000463000-memory.dmp

            Filesize

            396KB

          • memory/2248-521-0x0000000000400000-0x0000000000463000-memory.dmp

            Filesize

            396KB

          • memory/2248-535-0x0000000000400000-0x0000000000463000-memory.dmp

            Filesize

            396KB

          • memory/2248-532-0x0000000000400000-0x0000000000463000-memory.dmp

            Filesize

            396KB

          • memory/2248-527-0x0000000000400000-0x0000000000463000-memory.dmp

            Filesize

            396KB

          • memory/2248-572-0x0000000000400000-0x0000000000463000-memory.dmp

            Filesize

            396KB

          • memory/2248-533-0x0000000000400000-0x0000000000463000-memory.dmp

            Filesize

            396KB

          • memory/2248-525-0x0000000000400000-0x0000000000463000-memory.dmp

            Filesize

            396KB

          • memory/2248-519-0x0000000000400000-0x0000000000463000-memory.dmp

            Filesize

            396KB

          • memory/2256-499-0x00000000726F0000-0x0000000072DDE000-memory.dmp

            Filesize

            6.9MB

          • memory/2256-752-0x00000000726F0000-0x0000000072DDE000-memory.dmp

            Filesize

            6.9MB

          • memory/2256-498-0x0000000000FD0000-0x0000000001030000-memory.dmp

            Filesize

            384KB

          • memory/2256-497-0x00000000726FE000-0x00000000726FF000-memory.dmp

            Filesize

            4KB

          • memory/2332-618-0x0000000001300000-0x0000000001356000-memory.dmp

            Filesize

            344KB

          • memory/2504-292-0x0000000073ED0000-0x00000000745BE000-memory.dmp

            Filesize

            6.9MB

          • memory/2504-0-0x0000000073EDE000-0x0000000073EDF000-memory.dmp

            Filesize

            4KB

          • memory/2504-12-0x0000000073ED0000-0x00000000745BE000-memory.dmp

            Filesize

            6.9MB

          • memory/2504-1-0x0000000000AF0000-0x0000000000B5A000-memory.dmp

            Filesize

            424KB

          • memory/2524-576-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/2524-588-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/2524-578-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/2524-580-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/2524-584-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/2524-582-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/2524-587-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/2524-590-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/2632-638-0x0000000000400000-0x0000000000661000-memory.dmp

            Filesize

            2.4MB

          • memory/2632-640-0x0000000000400000-0x0000000000661000-memory.dmp

            Filesize

            2.4MB