Analysis

  • max time kernel
    142s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 11:39

General

  • Target

    72e18d1f94925f558f47baf67848e00775a07622df025ebce3c1264296d6d44e.exe

  • Size

    3.1MB

  • MD5

    df3fc9d0e3234bec4a4a21004056d0e3

  • SHA1

    3a689c14f50b7569fd3452e640c53cd9b7c173b2

  • SHA256

    72e18d1f94925f558f47baf67848e00775a07622df025ebce3c1264296d6d44e

  • SHA512

    4190a7991d8f1ac68eb19ccd53ecbb0fe39fcb9b0c590aebecf5fc8c879b47bef639cf7882d9a120209bc60ef649c77a36289a84a3830b03243dc722670b9121

  • SSDEEP

    49152:Nx4TiaIdRZA4sxc8K3ZVrTy996ouxTYZNJfYd2ysTv2:N+OPrm4sxnK3ZVrTyPICTJfYd2f2

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Extracted

Family

lumma

C2

https://founpiuer.store/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 22 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72e18d1f94925f558f47baf67848e00775a07622df025ebce3c1264296d6d44e.exe
    "C:\Users\Admin\AppData\Local\Temp\72e18d1f94925f558f47baf67848e00775a07622df025ebce3c1264296d6d44e.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1408
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1636
      • C:\Users\Admin\AppData\Local\Temp\1004350001\ec1f0e751c.exe
        "C:\Users\Admin\AppData\Local\Temp\1004350001\ec1f0e751c.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:8
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 1540
          4⤵
          • Program crash
          PID:2992
      • C:\Users\Admin\AppData\Local\Temp\1004351001\e76da298b6.exe
        "C:\Users\Admin\AppData\Local\Temp\1004351001\e76da298b6.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4032
      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
        "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
        3⤵
          PID:400
        • C:\Users\Admin\AppData\Local\Temp\1004353001\a7cc243579.exe
          "C:\Users\Admin\AppData\Local\Temp\1004353001\a7cc243579.exe"
          3⤵
          • Modifies Windows Defender Real-time Protection settings
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Windows security modification
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3212
        • C:\Users\Admin\AppData\Local\Temp\1004354001\sxqnmytm.exe
          "C:\Users\Admin\AppData\Local\Temp\1004354001\sxqnmytm.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3716
          • C:\Windows\Temp\{607B92B6-2023-41C8-8013-6CC1214751D2}\.cr\sxqnmytm.exe
            "C:\Windows\Temp\{607B92B6-2023-41C8-8013-6CC1214751D2}\.cr\sxqnmytm.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\1004354001\sxqnmytm.exe" -burn.filehandle.attached=684 -burn.filehandle.self=540
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1436
            • C:\Windows\Temp\{1BF56BB8-01AE-49FB-8613-0545930A2BB4}\.ba\ActiveISO.exe
              "C:\Windows\Temp\{1BF56BB8-01AE-49FB-8613-0545930A2BB4}\.ba\ActiveISO.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:5040
              • C:\Users\Admin\AppData\Roaming\remoteFastzq5\ActiveISO.exe
                C:\Users\Admin\AppData\Roaming\remoteFastzq5\ActiveISO.exe
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of WriteProcessMemory
                PID:1788
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\SysWOW64\cmd.exe
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of WriteProcessMemory
                  PID:636
                  • C:\Users\Admin\AppData\Local\Temp\DriverProtectv1.exe
                    C:\Users\Admin\AppData\Local\Temp\DriverProtectv1.exe
                    8⤵
                    • Loads dropped DLL
                    PID:2324
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 8 -ip 8
      1⤵
        PID:3688
      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:2992
      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:3548

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\1004350001\ec1f0e751c.exe

        Filesize

        3.0MB

        MD5

        f4066dbb286bd3eff3217e23f69af979

        SHA1

        1716f539fdc3cbedd555ed0c20d2a1ea4e20a38c

        SHA256

        0618b31240c08f9ff8b79078e5fbfa16a248ecf2958f4a17416df82480d16aa1

        SHA512

        6a305ee9b8aa6546baea7b486bb55edc3afa5ad9e1aa196852fd7e2e9682919a7780304b6deaafbefa7ccc380e9926bea8640ae5aae6d0a638c1e63e9bc35e5e

      • C:\Users\Admin\AppData\Local\Temp\1004351001\e76da298b6.exe

        Filesize

        2.1MB

        MD5

        fffdaffb81d0e752ae14ba04b8b6064f

        SHA1

        3056c80dfded82c41b439c8344f6aa62c745398c

        SHA256

        6b54559b4d5c5e0413800f434d2fc29409020ad60ba08e65f6df117907e651ae

        SHA512

        af6f7054117ee499a835100c2c9b069b4e036db9f271fba6e44c749346b515470362086aef59b4f56d1e7fb988eda6db55c7360a702a343e1564afdec66ff112

      • C:\Users\Admin\AppData\Local\Temp\1004353001\a7cc243579.exe

        Filesize

        2.6MB

        MD5

        7bc18fd9c7c32912b43ee71e2ba630e5

        SHA1

        a1b4099b9956c886a15320bc28f748aa30ab9c75

        SHA256

        ed3502300b972ed5fdcc443958734a9171bb5dcf2ea140a98fe29f29c8c57d5e

        SHA512

        23c85b9c9f78d3bc023aad881a752deff5e5518469df7c56d04a952267e4741a64b3b502b551eccc98c05b32aae22006bc93ab0c1a1719e717fd6e6958317313

      • C:\Users\Admin\AppData\Local\Temp\1004354001\sxqnmytm.exe

        Filesize

        14.4MB

        MD5

        155422526c81faf880ec711b7044ef44

        SHA1

        67b6a590e3aac3cca79d849ef1ac9f51f4e6702b

        SHA256

        3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a

        SHA512

        0a53e0b00e5c32782be998a082cc33bf5b19d162f81e39104f6fd6f64b1ea4947e69298493dcb49a1386904cc345c63395044c01be2d49c89647d7890522dbdc

      • C:\Users\Admin\AppData\Local\Temp\6e7ca8f7

        Filesize

        5.4MB

        MD5

        924a74faf3b38cde621c605742f48497

        SHA1

        241bf4cc4af5565fd5952867f46f2f53d225a567

        SHA256

        23ec00c466b674bf2cf7517ec440f183053506f070d3e8ea2fce14d65e3ddca9

        SHA512

        4086c23c8793cd6a0100d85452744df21284ea2448f7834b2a562a8d50c01afbd528892039b5e50514e56d37d7e36e816504892e477143af6afaa2a4fd3b69dc

      • C:\Users\Admin\AppData\Local\Temp\DriverProtectv1.exe

        Filesize

        2.3MB

        MD5

        967f4470627f823f4d7981e511c9824f

        SHA1

        416501b096df80ddc49f4144c3832cf2cadb9cb2

        SHA256

        b22bf1210b5fd173a210ebfa9092390aa0513c41e1914cbe161eb547f049ef91

        SHA512

        8883ead428c9d4b415046de9f8398aa1f65ae81fe7945a840c822620e18f6f9930cce2e10acff3b5da8b9c817ade3dabc1de576cbd255087267f77341900a41c

      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

        Filesize

        3.1MB

        MD5

        df3fc9d0e3234bec4a4a21004056d0e3

        SHA1

        3a689c14f50b7569fd3452e640c53cd9b7c173b2

        SHA256

        72e18d1f94925f558f47baf67848e00775a07622df025ebce3c1264296d6d44e

        SHA512

        4190a7991d8f1ac68eb19ccd53ecbb0fe39fcb9b0c590aebecf5fc8c879b47bef639cf7882d9a120209bc60ef649c77a36289a84a3830b03243dc722670b9121

      • C:\Windows\Temp\{1BF56BB8-01AE-49FB-8613-0545930A2BB4}\.ba\ActiveISO.exe

        Filesize

        1.2MB

        MD5

        b84dfabe933d1160f624693d94779ce5

        SHA1

        ac0133c09708fe4a3c626e3ba4cdf44d3a0e065f

        SHA256

        588cb61b36a001384a2833bd5df8d7982ca79d6ae17a3d83a94e01b1e79684bd

        SHA512

        eeaeef8d6b5fa02dedf9818babaa4b5ffdb87300521883aa290289dcc720b3d543279085ed3fc649b74654143e678502e56eb3f92c4baf53c075977de33c1b0e

      • C:\Windows\Temp\{1BF56BB8-01AE-49FB-8613-0545930A2BB4}\.ba\Bichromate.dll

        Filesize

        1.4MB

        MD5

        86b7452f87b5c7f79f8b8a3ad326035e

        SHA1

        a81ba71c0b3f93c6bcdc004ede3f98f205dd31ca

        SHA256

        58a6b1fe90145f8ae431d05952d1751e705ae46a81be1c2257f5e1e0ce0292c7

        SHA512

        4c0e8166a8ee81c9e851fe7d25915b1d85bbe3b274e88160ff948ddb8a15f67122a52ba3906da6a090f8ba064915c8df1780103e474bf8e6f3dd673fc304ce7b

      • C:\Windows\Temp\{1BF56BB8-01AE-49FB-8613-0545930A2BB4}\.ba\Qt5Core.dll

        Filesize

        5.8MB

        MD5

        6e8bfe548ca4de868c82279e5d127db0

        SHA1

        120cbd2177493859c40b943bed3d124555cc5bd9

        SHA256

        f7bddcd19a740e179827a99c23cc045d6f4ab8d5b6699592b1a1e8fcb6ddc22f

        SHA512

        9f4736a432ea496c010a5a37a87da1fcee6bafb2c6600eacaa8a0b0e9d47eb8bf0b044cf34d6212d871d4b1bd93339d148b67c72a8226145929d117756ece6b0

      • C:\Windows\Temp\{1BF56BB8-01AE-49FB-8613-0545930A2BB4}\.ba\Qt5Gui.dll

        Filesize

        6.2MB

        MD5

        34893cb3d9a2250f0edecd68aedb72c7

        SHA1

        37161412df2c1313a54749fe6f33e4dbf41d128a

        SHA256

        ca8334b2e63bc01f0749afeb9e87943c29882131efe58608ea25732961b2df34

        SHA512

        484e32832d69ec1799bd1bcc694418801c443c732ed59ecd76b3f67abf0b1c97d64ae123728dfa99013df846ba45be310502ef6f8da42155da2e89f2a1e8cb2c

      • C:\Windows\Temp\{1BF56BB8-01AE-49FB-8613-0545930A2BB4}\.ba\Qt5Network.dll

        Filesize

        1.3MB

        MD5

        fe5ed4c5da03077f98c3efa91ecefd81

        SHA1

        e23e839ec0602662788f761ebe7dd4b39c018a7f

        SHA256

        d992aaeb21cb567113126c2912cf75e892c8e3ead5d50147a11abe704b9e2e2b

        SHA512

        22514732a0edf8fc2b8770139599132429080b86d2844143d21bb834cbddaaa077d763969960e39e2050a69493c1aae191600e5df6107bde90fae589a054f071

      • C:\Windows\Temp\{1BF56BB8-01AE-49FB-8613-0545930A2BB4}\.ba\Qt5PrintSupport.dll

        Filesize

        316KB

        MD5

        d0634933db2745397a603d5976bee8e7

        SHA1

        ddec98433bcfec1d9e38557d803bc73e1ff883b6

        SHA256

        7d91d3d341dbba568e2d19382e9d58a42a0d78064c3ad7adfe3c7bb14742c2b1

        SHA512

        9271370cd22115f68bd62572640525e086a05d75f5bc768f06e20b90b48a182f29a658a07099c7bc1e99bf0ffcf1229709524e2af6745d6fed7b41c1addd09f1

      • C:\Windows\Temp\{1BF56BB8-01AE-49FB-8613-0545930A2BB4}\.ba\Qt5Widgets.dll

        Filesize

        5.3MB

        MD5

        c502bb8a4a7dc3724ab09292cd3c70d6

        SHA1

        ff44fddeec2d335ec0eaa861714b561f899675fd

        SHA256

        4266918226c680789d49cf2407a7fec012b0ed872adafb84c7719e645f9b2e6d

        SHA512

        73bef89503ce032fba278876b7dab9eac275632df7a72c77093d433c932272da997e8fbeb431a09d84baac7b2ab2e55222ff687893311949a5603e738bfa6617

      • C:\Windows\Temp\{1BF56BB8-01AE-49FB-8613-0545930A2BB4}\.ba\StarBurn.dll

        Filesize

        1.4MB

        MD5

        41e19ba2364f2c834b2487e1d02bb99a

        SHA1

        6c61d603dddfe384a93ad33775b70681d0a396d9

        SHA256

        c040a25377028b0c28db81a012de786c803a0e9d6f87ce460335a621d31f5340

        SHA512

        6ebf4a9e80f16c6a03ff357d2da9a34a4227bfd65eb66d1d335349a77ba066d069ba0d47d46229b3c77b59052c42d388678662f970b418d8cc3cfb1223427d8c

      • C:\Windows\Temp\{1BF56BB8-01AE-49FB-8613-0545930A2BB4}\.ba\jri

        Filesize

        4.3MB

        MD5

        66f309482f529590cf5ad56549effbef

        SHA1

        76c9117e6356203daed79c1caecb4808436aef36

        SHA256

        d704f5f01487ca3340454240868515de1a43a1b65e5b4a97a74ab409c8441f82

        SHA512

        9b2068943a6f6db6b9e885a3b3b7ea6da9f7a9971767780e02184e10674395b3dd7f3b539c04d9acbacf8f39042fdb90f3c9cb5986c2076846626ea5decb3d01

      • C:\Windows\Temp\{1BF56BB8-01AE-49FB-8613-0545930A2BB4}\.ba\msvcp140.dll

        Filesize

        557KB

        MD5

        7db24201efea565d930b7ec3306f4308

        SHA1

        880c8034b1655597d0eebe056719a6f79b60e03c

        SHA256

        72fe4598f0b75d31ce2dc621e8ef161338c6450bb017cd06895745690603729e

        SHA512

        bac5729a3eb53e9bc7b680671d028cabef5ea102dfaa48a7c453b67f8ecb358db9f8fb16b3b1d9ea5a2dff34f459f6ac87f3a563c736d81d31048766198ff11e

      • C:\Windows\Temp\{1BF56BB8-01AE-49FB-8613-0545930A2BB4}\.ba\vcruntime140.dll

        Filesize

        96KB

        MD5

        f12681a472b9dd04a812e16096514974

        SHA1

        6fd102eb3e0b0e6eef08118d71f28702d1a9067c

        SHA256

        d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

        SHA512

        7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

      • C:\Windows\Temp\{1BF56BB8-01AE-49FB-8613-0545930A2BB4}\.ba\vcruntime140_1.dll

        Filesize

        37KB

        MD5

        75e78e4bf561031d39f86143753400ff

        SHA1

        324c2a99e39f8992459495182677e91656a05206

        SHA256

        1758085a61527b427c4380f0c976d29a8bee889f2ac480c356a3f166433bf70e

        SHA512

        ce4daf46bce44a89d21308c63e2de8b757a23be2630360209c4a25eb13f1f66a04fbb0a124761a33bbf34496f2f2a02b8df159b4b62f1b6241e1dbfb0e5d9756

      • C:\Windows\Temp\{1BF56BB8-01AE-49FB-8613-0545930A2BB4}\.ba\yodpxub

        Filesize

        21KB

        MD5

        65ced4e3e5b641b3fee1e135e3604a1a

        SHA1

        860173020684e54f4eb9bc9e4fdab348b371214d

        SHA256

        1a5991a30e9d339cbb0143d4bd134509cf4effc7fead7f4f7dcc059990efd669

        SHA512

        cc4ec199a58a20d2c4543fd247b329422ce3ad15695c74d2aa4fc89dc780a274527b020157e6c23f8a2a4839209f5d742694881768dd12c9b80c622da17f31e6

      • C:\Windows\Temp\{607B92B6-2023-41C8-8013-6CC1214751D2}\.cr\sxqnmytm.exe

        Filesize

        14.3MB

        MD5

        73e9ab1674c64f040da642b6a4690356

        SHA1

        e5a508bf8a7170cbacd6e6ab0259073a2a07b3cf

        SHA256

        04bb4867d35e77e8e391f3829cf07a542a73815fc8be975a7733790d6e04243c

        SHA512

        f1df00e8f0b7b1c577429028cd550788dbf4f1da1e8aa97b8ab845e68c56663c350c562f26237a278a0b44b33f06dcb9667a50db4ddaf747da71053e4189afec

      • memory/8-44-0x0000000000771000-0x00000000007C9000-memory.dmp

        Filesize

        352KB

      • memory/8-42-0x0000000004F20000-0x0000000004F21000-memory.dmp

        Filesize

        4KB

      • memory/8-43-0x0000000004F10000-0x0000000004F11000-memory.dmp

        Filesize

        4KB

      • memory/8-64-0x0000000000771000-0x00000000007C9000-memory.dmp

        Filesize

        352KB

      • memory/8-65-0x0000000000770000-0x0000000000A7A000-memory.dmp

        Filesize

        3.0MB

      • memory/8-39-0x0000000000770000-0x0000000000A7A000-memory.dmp

        Filesize

        3.0MB

      • memory/636-209-0x00007FFB709D0000-0x00007FFB70BC5000-memory.dmp

        Filesize

        2.0MB

      • memory/636-213-0x00000000735C0000-0x000000007373B000-memory.dmp

        Filesize

        1.5MB

      • memory/1408-17-0x0000000000F80000-0x00000000012A5000-memory.dmp

        Filesize

        3.1MB

      • memory/1408-18-0x0000000000F81000-0x0000000000FE9000-memory.dmp

        Filesize

        416KB

      • memory/1408-4-0x0000000000F80000-0x00000000012A5000-memory.dmp

        Filesize

        3.1MB

      • memory/1408-3-0x0000000000F80000-0x00000000012A5000-memory.dmp

        Filesize

        3.1MB

      • memory/1408-2-0x0000000000F81000-0x0000000000FE9000-memory.dmp

        Filesize

        416KB

      • memory/1408-1-0x00000000772B4000-0x00000000772B6000-memory.dmp

        Filesize

        8KB

      • memory/1408-0-0x0000000000F80000-0x00000000012A5000-memory.dmp

        Filesize

        3.1MB

      • memory/1636-139-0x00000000001C0000-0x00000000004E5000-memory.dmp

        Filesize

        3.1MB

      • memory/1636-211-0x00000000001C0000-0x00000000004E5000-memory.dmp

        Filesize

        3.1MB

      • memory/1636-243-0x00000000001C0000-0x00000000004E5000-memory.dmp

        Filesize

        3.1MB

      • memory/1636-241-0x00000000001C0000-0x00000000004E5000-memory.dmp

        Filesize

        3.1MB

      • memory/1636-138-0x00000000001C0000-0x00000000004E5000-memory.dmp

        Filesize

        3.1MB

      • memory/1636-235-0x00000000001C0000-0x00000000004E5000-memory.dmp

        Filesize

        3.1MB

      • memory/1636-228-0x00000000001C0000-0x00000000004E5000-memory.dmp

        Filesize

        3.1MB

      • memory/1636-226-0x00000000001C0000-0x00000000004E5000-memory.dmp

        Filesize

        3.1MB

      • memory/1636-89-0x00000000001C0000-0x00000000004E5000-memory.dmp

        Filesize

        3.1MB

      • memory/1636-134-0x00000000001C0000-0x00000000004E5000-memory.dmp

        Filesize

        3.1MB

      • memory/1636-19-0x00000000001C0000-0x00000000004E5000-memory.dmp

        Filesize

        3.1MB

      • memory/1636-215-0x00000000001C0000-0x00000000004E5000-memory.dmp

        Filesize

        3.1MB

      • memory/1636-20-0x00000000001C1000-0x0000000000229000-memory.dmp

        Filesize

        416KB

      • memory/1636-208-0x00000000001C0000-0x00000000004E5000-memory.dmp

        Filesize

        3.1MB

      • memory/1636-54-0x00000000001C0000-0x00000000004E5000-memory.dmp

        Filesize

        3.1MB

      • memory/1636-45-0x00000000001C0000-0x00000000004E5000-memory.dmp

        Filesize

        3.1MB

      • memory/1636-41-0x00000000001C0000-0x00000000004E5000-memory.dmp

        Filesize

        3.1MB

      • memory/1636-40-0x00000000001C1000-0x0000000000229000-memory.dmp

        Filesize

        416KB

      • memory/1636-163-0x00000000001C0000-0x00000000004E5000-memory.dmp

        Filesize

        3.1MB

      • memory/1636-23-0x00000000001C0000-0x00000000004E5000-memory.dmp

        Filesize

        3.1MB

      • memory/1636-21-0x00000000001C0000-0x00000000004E5000-memory.dmp

        Filesize

        3.1MB

      • memory/1636-22-0x00000000001C0000-0x00000000004E5000-memory.dmp

        Filesize

        3.1MB

      • memory/1788-204-0x00007FFB52880000-0x00007FFB529F2000-memory.dmp

        Filesize

        1.4MB

      • memory/1788-205-0x00007FFB52880000-0x00007FFB529F2000-memory.dmp

        Filesize

        1.4MB

      • memory/1788-199-0x00007FFB51BA0000-0x00007FFB520EE000-memory.dmp

        Filesize

        5.3MB

      • memory/2324-221-0x00007FF7DE3C0000-0x00007FF7DE6A3000-memory.dmp

        Filesize

        2.9MB

      • memory/2324-234-0x00007FF7DE3C0000-0x00007FF7DE6A3000-memory.dmp

        Filesize

        2.9MB

      • memory/2324-242-0x00007FF7DE3C0000-0x00007FF7DE6A3000-memory.dmp

        Filesize

        2.9MB

      • memory/2324-236-0x00007FF7DE3C0000-0x00007FF7DE6A3000-memory.dmp

        Filesize

        2.9MB

      • memory/2324-229-0x00007FF7DE3C0000-0x00007FF7DE6A3000-memory.dmp

        Filesize

        2.9MB

      • memory/2324-225-0x00007FF7DE3C0000-0x00007FF7DE6A3000-memory.dmp

        Filesize

        2.9MB

      • memory/2992-137-0x00000000001C0000-0x00000000004E5000-memory.dmp

        Filesize

        3.1MB

      • memory/2992-136-0x00000000001C0000-0x00000000004E5000-memory.dmp

        Filesize

        3.1MB

      • memory/3212-86-0x0000000000D10000-0x0000000000FBC000-memory.dmp

        Filesize

        2.7MB

      • memory/3212-87-0x0000000000D10000-0x0000000000FBC000-memory.dmp

        Filesize

        2.7MB

      • memory/3212-91-0x0000000000D10000-0x0000000000FBC000-memory.dmp

        Filesize

        2.7MB

      • memory/3212-88-0x0000000000D10000-0x0000000000FBC000-memory.dmp

        Filesize

        2.7MB

      • memory/3212-120-0x0000000000D10000-0x0000000000FBC000-memory.dmp

        Filesize

        2.7MB

      • memory/3548-224-0x00000000001C0000-0x00000000004E5000-memory.dmp

        Filesize

        3.1MB

      • memory/3548-223-0x00000000001C0000-0x00000000004E5000-memory.dmp

        Filesize

        3.1MB

      • memory/4032-66-0x0000000000040000-0x000000000077D000-memory.dmp

        Filesize

        7.2MB

      • memory/4032-62-0x0000000000040000-0x000000000077D000-memory.dmp

        Filesize

        7.2MB

      • memory/5040-161-0x00007FFB52190000-0x00007FFB526DE000-memory.dmp

        Filesize

        5.3MB

      • memory/5040-165-0x00007FFB52880000-0x00007FFB529F2000-memory.dmp

        Filesize

        1.4MB