Analysis

  • max time kernel
    93s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-01-2025 10:17

General

  • Target

    Launcher.bat

  • Size

    2KB

  • MD5

    d7f990b9df5038c0eeab8525eeab05e7

  • SHA1

    f217d29ccae0525807a9b6ddac1906c4dedd2d97

  • SHA256

    2b33969e45b9a684b8a14b2b8becb4fc93f4b8e32cf2b4f6aaefc9f20200bc07

  • SHA512

    9a3fad6820c2734fd05148a3e743fe61c8ace54ded02a4146b08a9ffef15761e77993a0bd7577342556b09eb18b0df0cfea10161425bd0f945956b07c983f20c

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://wholersorie.shop/api

https://framekgirus.shop/api

https://tirepublicerj.shop/api

https://noisycuttej.shop/api

https://rabidcowse.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Launcher.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3756
    • C:\Users\Admin\AppData\Local\Temp\lua.exe
      lua.exe icon.txt
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3872
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /sc daily /st 14:47 /f /tn WindowsErrorRecovery_ODA3 /tr ""C:\Users\Admin\AppData\Local\ODA3\ODA3.exe" "C:\Users\Admin\AppData\Local\ODA3\icon.txt""
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:400
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /sc daily /st 14:47 /f /tn Setup /tr "C:/Windows/System32/oobe/Setup.exe" /rl highest
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2932
      • C:\Users\Admin\AppData\Roaming\files\Roblox.exe
        "C:\Users\Admin\AppData\Roaming\files\Roblox.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3580
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c move Very Very.cmd & Very.cmd
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3988
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            5⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:3524
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "opssvc wrsa"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4568
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            5⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:4936
          • C:\Windows\SysWOW64\findstr.exe
            findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4688
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 88358
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4060
          • C:\Windows\SysWOW64\extrac32.exe
            extrac32 /Y /E Namely
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2768
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "Projects" Oven
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4624
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b 88358\Briefly.com + Ft + Aluminium + After + Shepherd + Profession + Ahead + Eagle + Build + Exceed + County + Eds 88358\Briefly.com
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3692
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Boston + ..\Subaru + ..\Hon + ..\Mixer + ..\Surplus + ..\Stunning X
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2068
          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\88358\Briefly.com
            Briefly.com X
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:1444
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            5⤵
            • System Location Discovery: System Language Discovery
            PID:5088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\88358\Briefly.com

    Filesize

    927B

    MD5

    44573b96edbe776a81627d5eb8caa82b

    SHA1

    20df5b9fe95cc48e3806e6204e315e7a637b5ab8

    SHA256

    28b25d641d312bb24af0e35f243ac1f58786ac4044ecbc236e8fad500307ae9a

    SHA512

    261d7bdfa66cd466b622bb93a80fa8a026c95bf8ed3ed818cc8ffd3489a89ed4bdfda949b15601f793c39bed8daaadda29ef0407ee653a1f3ecdd02c93c05dcc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\88358\Briefly.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\88358\X

    Filesize

    451KB

    MD5

    e872ef145dd334dcf5562940e6641cd0

    SHA1

    3199371bd8c82081ca8c43e827ffc28e57685b20

    SHA256

    8be6e0ed7358a1b2aadfeaf7b1ac9f8e552388385934353dd4ead4eafaa92c32

    SHA512

    b78b7f345c7eaa596efa5dc7d7279c91bcfc4d22744906d7e4763205aab98817b3921cfbfba4bd54c71ee7b79a42be2108e404b7743866f45006115716c35db5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\After

    Filesize

    58KB

    MD5

    a12d07b0098d2699971d42963276de2d

    SHA1

    5193808007206067d8107b9cd5f178319243beda

    SHA256

    b9d87bda11dd6b7821b3e5626bde95c196814589b317cdf7d59663bff34d4bdd

    SHA512

    1616aca22f1acdda8eb40b0f84507a19d7bb891eb223ae3eabc49f1b79fb11b79aabd127965abde1dc7932c17e1e7846066202e0edf4a7307873985a3e10d0ac

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Ahead

    Filesize

    62KB

    MD5

    9d49faa6f53a0928d354c7b77ecab55f

    SHA1

    270bab8f8a6a96f522904806bd115188a1b6a2ba

    SHA256

    dec6d54d902c5557ff9e80e58ff45f43b002bd46d1427b691c8806acfd85fb5c

    SHA512

    f1aa6b83f339254e7d0c931dd2eda5f6b1c1247f70e19c425d9656a8fb32be8a257ab6ed9b49cd674f7554df3cc7fcfaf2b5b3fcd4436160d0885aef01a59fd4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Aluminium

    Filesize

    86KB

    MD5

    10622036576a3509f11d8e6beddfc95c

    SHA1

    c2844a9c011c0473630cb3fb62c093633d95cdaa

    SHA256

    697ae84e4291b067700ff7b8be3d17c43b9aade780aabf35c49b409995f9786e

    SHA512

    3e6303d4c18a1338741be729bb2853feda2990bb2a3a529a028547ead5391a66b6f621c467231d6735ed3131b9a6e7ee413acb698b9434e400e9a3835f9d94bc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Boston

    Filesize

    82KB

    MD5

    dbaedcb6665215950d059f1421e2bfa0

    SHA1

    f97e4bd50a1adfd6e2e3ae3273980720a0df31c2

    SHA256

    d70f7d3302ef306f60cc78ee181fb065ee7f2940014548af2233895a5aaa15fa

    SHA512

    625985ab8c513a6f4320c0e832afbc152413b8d359462df70d05f783820986126d8a94bad9ea853235df2abe0d5eafc893b8ebf381b728c4bb8745a4de0c8be0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Build

    Filesize

    58KB

    MD5

    99f1e77037465079f718ef79267612ff

    SHA1

    736ff3fe87993de164a4639347ab2c23a0fc6e90

    SHA256

    193ee221072a3ff82d087d2c881054078cdc222191780f5afe261fea9af63cf7

    SHA512

    4fa3762e6fab1df0fdde3e3536c7b4f8c8d5fd97f469fc2e734498393ab39b0b2fc02ec2a3f19bb2d1280fe8f71b318aea12b88bbe1cf4aca88ecc9cd52c4aec

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\County

    Filesize

    86KB

    MD5

    974d56281350d3e278b3a8059d971b2c

    SHA1

    7161a8e39e515a541888d5e605eb944ab57116c3

    SHA256

    87cec3014db6914ad63b22311943fddb2e14f9383146e6a87ee5330d5f9bea55

    SHA512

    682892e1391382355c063186d3d5432fcb28bf367d033b58330d4df2a1d3aed10aa578ef63d1175d3d16cbab946eb27888b7b8505c49aead20c15f18fb1e8165

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Eagle

    Filesize

    133KB

    MD5

    3d7e12929165839aefeff0485220020c

    SHA1

    7c43a4ac680b8cd5342d545fdced260b3366a82f

    SHA256

    24ee30a875cf96387548a3aa201f24591acb3f8a02c352e616cb8d13d9419aa8

    SHA512

    e79db17bd841f3a93ceba0e8fa9f61ab2939693b8649471d6fd40d77dc54331bb32457b6b5b5087fe5ca7e946e00e6596b8b19a9e07b0bec877ee43cf7ea6b08

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Eds

    Filesize

    27KB

    MD5

    4182f91c2e55a8fd23f65dea47928475

    SHA1

    9c181fef313d7d9402fee381e27b0756cde0c7e8

    SHA256

    3b17dee4e4d576ececa45230ee3e379e78c506c2fc63050a52e6097a79775249

    SHA512

    0b6e5a94918f73d8d5b2dbd10644cea55ee367ff4e1560d1f2db2f1de4693edd631fc40ba38bfb041992cf139745bfb3b508c964257725db9fccb9224dd3aaf8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Exceed

    Filesize

    87KB

    MD5

    4019ab86608a140be754a4daf374144c

    SHA1

    ccea8a2febc0e888186e7baaff5c8a9997177763

    SHA256

    6fd18a6177d3b0434652a5db1774476f8e7b27c6b2450551d3d0feb079565bf0

    SHA512

    d14af008c68591a717ffdcca5db22d9559ed1e224ea53634bb875e2dbf1ea13d78d30dcde6eb815ef0156a91db0c2564bbedd5fd07dd71c3713d1914ed0b43c5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Ft

    Filesize

    126KB

    MD5

    7fc164f2672813daefc45ae2b5c6aa6d

    SHA1

    c7b1e870592a8d5b0dbd063533d1cefc2f5ac5d2

    SHA256

    5523e256f49474769d59d9ecf59f4826551eeb9a7b73c9ee5dcf325f4d1e0163

    SHA512

    502a6d39e4f3aa584047e453ac5053dc89bf3092ed96ec4d2c39fa6caa584cf3d9ced847d0e0746e7e798826739be07c1175bbf396d386908c6c2369f4e13d10

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Hon

    Filesize

    89KB

    MD5

    9529767cacc03415d96fd9652d841801

    SHA1

    617f41f1a0fb1025020a8cffffb46a4457f0f896

    SHA256

    6689bd33856ce7b359fd61cc7031376b5e04b2f1287def80dbf83ed82cf102d3

    SHA512

    9f4546370dc6881603ccec1f2a9f121dd8b8f8c72543dc5d34c0bebca0f87a0410a9d9e405ae021e67990af5be919fc29efe5845056a1ed476cd3766cb50667b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Mixer

    Filesize

    84KB

    MD5

    ff03b4ec16e822730640c40998651bfa

    SHA1

    db1adefb3fb077e8e0a4bac5343193ab9900f0fe

    SHA256

    cb704fa92c9a2babec7b01a9ddac260d42470871691cfc9938c64d7d9580c76b

    SHA512

    e086c3de540196413c13d591e13c4a90a04bd51de591a58ee153117040729d26bb72ca78fe769023646126a210bf1d2e78a54ddf858c5de5df26ff06158ede68

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Namely

    Filesize

    479KB

    MD5

    f012632b43abc18a94a91c3171a51686

    SHA1

    2dbad43fd426d50f946ea805cdd5e73595dcd96e

    SHA256

    ccdc8b4f72b7d33375d20b5d5c4b1496b373d6e5bd01e3649ace2bc95f8a0c20

    SHA512

    21f4cab5e0e8138c7e6556a2f0893ca1699cfdbe4b41926c3358ddce2ebbc43ba42da2f1568f71d525df5c3f1ae428e0f1f13b879c4c030ff4494cae3c4755ae

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Oven

    Filesize

    935B

    MD5

    e7baaa5a9619a0165e5466810df3c1f7

    SHA1

    01589a53014c4098debcf625a0306526ca4971ab

    SHA256

    f25e40da39e290656cc4ef129f34a6300b47cde6e0336a1bbb26507d4045d1c4

    SHA512

    727f7cbbd34503fb7e5072043fbfa681b96f814b14c596c9ff78e6e0662856bb338136ea54c36c69bfba2a87dda04fda4ed9e9bff9ff6e126433101414e34a7d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Profession

    Filesize

    52KB

    MD5

    78ba8a5aa1b7c31e40c49252bfcb6f69

    SHA1

    5b61c745cbcd472acb7cd28093d8ef946f6f7dbe

    SHA256

    9b6a140f26989a189f3ad3af9635f3347a50c638e82f518d3e587cdc3bd4aacc

    SHA512

    00396de63d9c5d9a5fc123495f9e7f5e421d06e0c79ed48cf765914c9da5282e1ca3e4f942e7fc6c7a12c4759f8abb4e16a3d8d69f1c4105e2dc3efb9d272052

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Shepherd

    Filesize

    149KB

    MD5

    f2e685babf2db8ac3a3e40159d7fbc06

    SHA1

    137173db47949caf1eba201d59fae3021683f3be

    SHA256

    3f2755c14f7735314ef973e81007f0a02be20f826d0b98ddad36be16e886ae31

    SHA512

    11a1c95b2479e5b3822364711c65baa86db657660d9763147490185e71dc39ca98227433fe70522179be2142dd37d82e18ba6dd7d6d4bd8303ec7e414a53d9ab

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Stunning

    Filesize

    31KB

    MD5

    e430854dd18636fdaaba282c740d9c35

    SHA1

    8f194acfca01504469fe48fa0819fbf104c52ff5

    SHA256

    7a5c6fbe14b785c3bf2a27581df0b9cef2d045454755c9ffdd7257b472d65189

    SHA512

    5f569e877eef4ccafa8deed943fb81203e7941a1c1234f4aae342071791dc3d8e586f6d6643ab4a02a3afe4987c87e8f2d86e3270539653256fd1c4baacd1043

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Subaru

    Filesize

    98KB

    MD5

    23788431b17624d0100f3619f3133c6d

    SHA1

    0a0b3dffa236b137586d3181ca43479b348b89e6

    SHA256

    d1af338d8787aa0c4e79d37e8fb1cf709a4dc741e9ad668dfdaa011ce1cbbcc7

    SHA512

    d342c0a666d03bf5d2c6a801621d0c59e44d498fea7d9aab0f568b3573d4657c2b47123ee11743e5d23a493a46961a1d6d232ce10ce7171d7c5d6ee04a6bc100

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Surplus

    Filesize

    67KB

    MD5

    282e8e6fe01cca0b082491d3bfae9c6f

    SHA1

    a434fb1e4cd68c2180e663ff86068b868b961ca0

    SHA256

    af377703eb7e3f249c5eff649fa47c2eed8e573ec64e607c3a20ff0300e6b151

    SHA512

    2d8d389876c1a68b63895eb1511da41aa003e5eff30f4e78f9f196161a605b7081b6be35f575f53f7625620e796db37043af6bbe4d075a4556f0d18ffb18518d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Very

    Filesize

    20KB

    MD5

    fac7e28ec4ae3e000133d5d455d4a712

    SHA1

    8aa80092450b70d2922705681839303f0ca81094

    SHA256

    218da93f7a010fa6f13090bde77323f4810be971e18fb1eefaafa256b9d16577

    SHA512

    e5b6e3be962dd17354f56dcd80433a4b752d24652bbe9e309fc08a71c2a5de57ecb6c39a5bc0bbf8ebd15cf80e7b1deea987200765f8b0156ed4c7349679cfc5

  • memory/3872-20-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-4-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-43-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-42-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-41-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-40-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-39-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-38-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-37-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-36-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-35-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-34-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-32-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-31-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-30-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-28-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-27-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-26-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-25-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-24-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-23-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-22-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-21-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-60-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-16-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-15-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-13-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-12-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-11-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-10-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-9-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-8-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-7-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-6-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-5-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-44-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-3-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-1-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-47-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-29-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-18-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-19-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-17-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-14-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-2-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-0-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-125-0x00000000023B0000-0x00000000023B1000-memory.dmp

    Filesize

    4KB

  • memory/3872-45-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-46-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-33-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-48-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-49-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-50-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-51-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-52-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-53-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-54-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-55-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-56-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-57-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-58-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-59-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-62-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-82-0x00000000023B0000-0x00000000023B1000-memory.dmp

    Filesize

    4KB

  • memory/3872-84-0x00000000023B0000-0x00000000023B1000-memory.dmp

    Filesize

    4KB

  • memory/3872-86-0x00000000023B0000-0x00000000023B1000-memory.dmp

    Filesize

    4KB

  • memory/3872-90-0x00000000023B0000-0x00000000023B1000-memory.dmp

    Filesize

    4KB

  • memory/3872-83-0x00000000023B0000-0x00000000023B1000-memory.dmp

    Filesize

    4KB

  • memory/3872-61-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB

  • memory/3872-64-0x000000007EEF0000-0x000000007EF00000-memory.dmp

    Filesize

    64KB