Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-12-2024 19:55

General

  • Target

    8bb5b63c02b4de956f77bad2d4a46b3aff4b931281c923db036016ad9ed3f8ec.exe

  • Size

    3.1MB

  • MD5

    2ac272fb2ffce59ba9a41c321a1ca05b

  • SHA1

    b96d37991e9443f22e3f49196e5059093fe18c23

  • SHA256

    8bb5b63c02b4de956f77bad2d4a46b3aff4b931281c923db036016ad9ed3f8ec

  • SHA512

    31d9ad1a6f88218ce56e5a0cea77eee364091f72fd3e5a2e96c7ce300bbec3b98c2440bc40b52740614a229ab71903e7222d3d6f905c73f56396545ce18df42d

  • SSDEEP

    49152:XGqnrH5AgOUIYV3hIuasD65jgJCP2tOcb84c2:2QrrBIg3hQsO500c

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

amadey

Version

5.04

Botnet

397a17

C2

http://89.110.69.103

http://94.156.177.33

Attributes
  • install_dir

    0efeaab28d

  • install_file

    Gxtuum.exe

  • strings_key

    6dea7a0890c1d404d1b67c90aea6ece4

  • url_paths

    /Lv2D7fGdopb/index.php

    /b9kdj3s3C0/index.php

rc4.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://infect-crackle.cyou/api

Extracted

Family

lumma

C2

https://infect-crackle.cyou/api

https://se-blurry.biz/api

https://zinc-sneark.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8bb5b63c02b4de956f77bad2d4a46b3aff4b931281c923db036016ad9ed3f8ec.exe
    "C:\Users\Admin\AppData\Local\Temp\8bb5b63c02b4de956f77bad2d4a46b3aff4b931281c923db036016ad9ed3f8ec.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3084
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:820
      • C:\Users\Admin\AppData\Local\Temp\1012982001\qtmPs7h.exe
        "C:\Users\Admin\AppData\Local\Temp\1012982001\qtmPs7h.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2648
        • C:\Windows\SysWOW64\cmd.exe
          "cmd" /c ping 127.0.0.1 -n 10 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "word" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:3880
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 10
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:1224
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "word" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"
            5⤵
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            PID:1384
        • C:\Windows\SysWOW64\cmd.exe
          "cmd" /c ping 127.0.0.1 -n 18 > nul && copy "C:\Users\Admin\AppData\Local\Temp\1012982001\qtmPs7h.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe" && ping 127.0.0.1 -n 18 > nul && "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:4036
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 18
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:3984
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 18
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:3148
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1756
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4808
              • C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe
                "C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:728
                • C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe
                  "C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:2604
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 1256
                    9⤵
                    • Program crash
                    PID:1396
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 1284
                    9⤵
                    • Program crash
                    PID:4192
            • C:\Users\Admin\AppData\Local\Temp\word.exe
              "C:\Users\Admin\AppData\Local\Temp\word.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2032
              • C:\Users\Admin\AppData\Local\Temp\word.exe
                "C:\Users\Admin\AppData\Local\Temp\word.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                PID:1420
      • C:\Users\Admin\AppData\Local\Temp\1012992001\7qg0CPF.exe
        "C:\Users\Admin\AppData\Local\Temp\1012992001\7qg0CPF.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1052
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp3AA3.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp3AA3.tmp.bat
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3560
  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:452
  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:2652
  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:2708
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2604 -ip 2604
    1⤵
      PID:5052
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2604 -ip 2604
      1⤵
        PID:4656

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\word.exe.log

        Filesize

        1KB

        MD5

        7dca233df92b3884663fa5a40db8d49c

        SHA1

        208b8f27b708c4e06ac37f974471cc7b29c29b60

        SHA256

        90c83311e35da0b5f8aa65aa2109745feb68ee9540e863f4ed909872e9c6a84c

        SHA512

        d134b96fd33c79c85407608f76afc5a9f937bff453b1c90727a3ed992006c7d4c8329be6a2b5ba6b11da1a32f7cd60e9bc380be388b586d6cd5c2e6b1f57bd07

      • C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe

        Filesize

        5.0MB

        MD5

        b183e5ff29a1532a84e5a38983ab9e4e

        SHA1

        230c9cbd2e14598aaf73ae78c85c998a6b923a51

        SHA256

        81a45f430c102365b46c663203ae5708b6befe2848f01efc7b702aff7170c901

        SHA512

        31be2761821fb6bc81a010a3f68fa6901aa5e9768e9c57db53b52e0495c7340abccc9191500aa39540fef159578403e78d2af31ac364b89774d5f359b54c6c1e

      • C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe

        Filesize

        2.5MB

        MD5

        d1e3f88d0caf949d5f1b4bf4efbb95a4

        SHA1

        61ffd2589a1965bf9cb874833c4c9b106b3e43e8

        SHA256

        c505f3b2f40b8a68e7cacfe2a9925498ab0f7ef29aa7023bb472597021066b2e

        SHA512

        5d4c43e858371f24ebafb56388a586c081d7b0289a3b039dbb2b011e9864e8e9f5dc7037fcb3e88f4bec4259a09ce5f3ccdae3161b43dff140e0e4ca7bff96c3

      • C:\Users\Admin\AppData\Local\Temp\1012982001\qtmPs7h.exe

        Filesize

        799KB

        MD5

        89bd66e4285cb7295300a941964af529

        SHA1

        232d9fee67a3c3652a80e1c1a258f0d789c6a6cf

        SHA256

        a46bf8412717f75bf098966cb1f5074836e78f5699bb5073dcc45d59ca790047

        SHA512

        72d1c8c4b74bacca619a58062441203c6cfea81d064dc1933af7a3cb9758d924b011a6935e8d255aad58159a4ecbb3677cc6a6e80f6daa8b135711195a5c8498

      • C:\Users\Admin\AppData\Local\Temp\1012992001\7qg0CPF.exe

        Filesize

        5.9MB

        MD5

        3297554944a2e2892096a8fb14c86164

        SHA1

        4b700666815448a1e0f4f389135fddb3612893ec

        SHA256

        e0a9fcd5805e66254aa20f8ddb3bdfca376a858b19222b178cc8893f914a6495

        SHA512

        499aa1679f019e29b4d871a472d24b89adddc68978317f85f095c7278f25f926cbf532c8520c2f468b3942a3e37e9be20aea9f83c68e8b5e0c9adbf69640ad25

      • C:\Users\Admin\AppData\Local\Temp\Costura\A54E036D2DCD19384E8EA53862E0DD8F\32\sqlite.interop.dll

        Filesize

        1.4MB

        MD5

        6f2fdecc48e7d72ca1eb7f17a97e59ad

        SHA1

        fcbc8c4403e5c8194ee69158d7e70ee7dbd4c056

        SHA256

        70e48ef5c14766f3601c97451b47859fddcbe7f237e1c5200cea8e7a7609d809

        SHA512

        fea98a3d6fff1497551dc6583dd92798dcac764070a350fd381e856105a6411c94effd4b189b7a32608ff610422b8dbd6d93393c5da99ee66d4569d45191dc8b

      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

        Filesize

        3.1MB

        MD5

        2ac272fb2ffce59ba9a41c321a1ca05b

        SHA1

        b96d37991e9443f22e3f49196e5059093fe18c23

        SHA256

        8bb5b63c02b4de956f77bad2d4a46b3aff4b931281c923db036016ad9ed3f8ec

        SHA512

        31d9ad1a6f88218ce56e5a0cea77eee364091f72fd3e5a2e96c7ce300bbec3b98c2440bc40b52740614a229ab71903e7222d3d6f905c73f56396545ce18df42d

      • C:\Users\Admin\AppData\Local\Temp\tmp3AA3.tmp.bat

        Filesize

        186B

        MD5

        790dd6f9aab53b59e358a126dc5d59fc

        SHA1

        ec6bf3eb0fa5d2e37c694bf71254e0ce0be1a5fc

        SHA256

        7ca8c160037742b7da30366775d7aae7882a98e1fbfdbbefb743c2a93d6b1c52

        SHA512

        a9d819b8d771febfa027de6f201d4effaf7bdd3334255707dddceb57b2b322649698903ee5d72f0e431780d29b01abedd5250d372100e6c66c0639965f86c7ef

      • C:\Users\Admin\AppData\Local\Temp\word.exe

        Filesize

        76KB

        MD5

        0e362e7005823d0bec3719b902ed6d62

        SHA1

        590d860b909804349e0cdc2f1662b37bd62f7463

        SHA256

        2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

        SHA512

        518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

      • C:\Users\Admin\AppData\Local\Temp\word.txt

        Filesize

        91B

        MD5

        54a7b213557bd804a52d11eaeafecdb8

        SHA1

        316067f592e2071aeac3cce4ccc84cc911230651

        SHA256

        bee9c27623f39a58f4cc5fe5840ae056ac88c1c123223c775a292591500721dd

        SHA512

        8d25d38e60a0b7329e532ebbd0cee26c3499bcfffc65ea32974de35f7e246d4d1364140ce4f8407001dd6fa42af6c72a483adb125b2694c07833a12cf15b7f21

      • C:\Users\Admin\AppData\Roaming\AdminUserCash\CREDIT~1

        Filesize

        116KB

        MD5

        f70aa3fa04f0536280f872ad17973c3d

        SHA1

        50a7b889329a92de1b272d0ecf5fce87395d3123

        SHA256

        8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

        SHA512

        30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

      • memory/452-24-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/452-25-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/452-27-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/452-29-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/728-232-0x0000000005940000-0x0000000005AD0000-memory.dmp

        Filesize

        1.6MB

      • memory/728-233-0x00000000055C0000-0x00000000055E2000-memory.dmp

        Filesize

        136KB

      • memory/728-226-0x0000000000AE0000-0x0000000000D62000-memory.dmp

        Filesize

        2.5MB

      • memory/820-21-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/820-20-0x0000000000661000-0x00000000006C9000-memory.dmp

        Filesize

        416KB

      • memory/820-32-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/820-31-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/820-30-0x0000000000661000-0x00000000006C9000-memory.dmp

        Filesize

        416KB

      • memory/820-212-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/820-26-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/820-195-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/820-22-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/820-59-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/820-137-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/820-33-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/820-227-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/820-228-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/820-16-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/820-169-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/820-168-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/820-163-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/820-160-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/820-155-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/820-231-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/820-238-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/1052-95-0x0000000008F90000-0x0000000008FE0000-memory.dmp

        Filesize

        320KB

      • memory/1052-87-0x0000000007AA0000-0x0000000007B16000-memory.dmp

        Filesize

        472KB

      • memory/1052-96-0x0000000009010000-0x0000000009032000-memory.dmp

        Filesize

        136KB

      • memory/1052-98-0x0000000009CB0000-0x0000000009CEC000-memory.dmp

        Filesize

        240KB

      • memory/1052-99-0x0000000009060000-0x0000000009081000-memory.dmp

        Filesize

        132KB

      • memory/1052-100-0x000000000AE80000-0x000000000B1AE000-memory.dmp

        Filesize

        3.2MB

      • memory/1052-126-0x000000000B410000-0x000000000B422000-memory.dmp

        Filesize

        72KB

      • memory/1052-94-0x0000000008E80000-0x0000000008F32000-memory.dmp

        Filesize

        712KB

      • memory/1052-92-0x0000000008CE0000-0x0000000008D2C000-memory.dmp

        Filesize

        304KB

      • memory/1052-91-0x0000000008940000-0x0000000008C94000-memory.dmp

        Filesize

        3.3MB

      • memory/1052-154-0x0000000000350000-0x0000000000D2C000-memory.dmp

        Filesize

        9.9MB

      • memory/1052-90-0x00000000088D0000-0x000000000893A000-memory.dmp

        Filesize

        424KB

      • memory/1052-78-0x0000000000350000-0x0000000000D2C000-memory.dmp

        Filesize

        9.9MB

      • memory/1052-89-0x0000000008800000-0x000000000881E000-memory.dmp

        Filesize

        120KB

      • memory/1052-79-0x0000000000350000-0x0000000000D2C000-memory.dmp

        Filesize

        9.9MB

      • memory/1052-80-0x0000000000350000-0x0000000000D2C000-memory.dmp

        Filesize

        9.9MB

      • memory/1052-88-0x0000000008390000-0x00000000083F6000-memory.dmp

        Filesize

        408KB

      • memory/1052-86-0x00000000078E0000-0x00000000078EA000-memory.dmp

        Filesize

        40KB

      • memory/1756-162-0x00000000074C0000-0x00000000074C6000-memory.dmp

        Filesize

        24KB

      • memory/1756-159-0x0000000000800000-0x00000000008CE000-memory.dmp

        Filesize

        824KB

      • memory/1756-161-0x00000000074A0000-0x00000000074BA000-memory.dmp

        Filesize

        104KB

      • memory/2032-186-0x0000000000AB0000-0x0000000000ACA000-memory.dmp

        Filesize

        104KB

      • memory/2604-234-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/2604-237-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/2648-53-0x00000000053E0000-0x000000000547C000-memory.dmp

        Filesize

        624KB

      • memory/2648-54-0x0000000005AC0000-0x0000000006064000-memory.dmp

        Filesize

        5.6MB

      • memory/2648-52-0x0000000000890000-0x000000000095E000-memory.dmp

        Filesize

        824KB

      • memory/2648-55-0x0000000005510000-0x00000000055A2000-memory.dmp

        Filesize

        584KB

      • memory/2648-57-0x0000000005700000-0x000000000570A000-memory.dmp

        Filesize

        40KB

      • memory/2648-56-0x0000000005350000-0x0000000005376000-memory.dmp

        Filesize

        152KB

      • memory/2652-165-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/2652-167-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/2708-230-0x0000000000660000-0x000000000097D000-memory.dmp

        Filesize

        3.1MB

      • memory/3084-0-0x0000000000D90000-0x00000000010AD000-memory.dmp

        Filesize

        3.1MB

      • memory/3084-3-0x0000000000D90000-0x00000000010AD000-memory.dmp

        Filesize

        3.1MB

      • memory/3084-2-0x0000000000D91000-0x0000000000DF9000-memory.dmp

        Filesize

        416KB

      • memory/3084-1-0x0000000077E44000-0x0000000077E46000-memory.dmp

        Filesize

        8KB

      • memory/3084-18-0x0000000000D90000-0x00000000010AD000-memory.dmp

        Filesize

        3.1MB

      • memory/3084-19-0x0000000000D91000-0x0000000000DF9000-memory.dmp

        Filesize

        416KB

      • memory/3084-4-0x0000000000D90000-0x00000000010AD000-memory.dmp

        Filesize

        3.1MB

      • memory/4808-174-0x0000000000400000-0x0000000000473000-memory.dmp

        Filesize

        460KB

      • memory/4808-224-0x0000000000400000-0x0000000000473000-memory.dmp

        Filesize

        460KB

      • memory/4808-214-0x0000000000400000-0x0000000000473000-memory.dmp

        Filesize

        460KB

      • memory/4808-172-0x0000000000400000-0x0000000000473000-memory.dmp

        Filesize

        460KB

      • memory/4808-170-0x0000000000400000-0x0000000000473000-memory.dmp

        Filesize

        460KB