Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2024 11:28

General

  • Target

    bdbbdc8e5dd9a3197d56c4e1ef566bdf1643f53441a0e7896602946f886c6f96.exe

  • Size

    5.1MB

  • MD5

    796b79421c4b0c8aa23243f6d0f60626

  • SHA1

    4894fdd0b41f66d94fd5d6817d17b6621ba29edb

  • SHA256

    bdbbdc8e5dd9a3197d56c4e1ef566bdf1643f53441a0e7896602946f886c6f96

  • SHA512

    2049b4327e46f2463ef45f7e6fddad02b8ad98f51ab2158f3cfdadca322ba3a96a86c51f4e06a2eba1a8175197bec697ddee56e60c9070981c032918c38d4f91

  • SSDEEP

    98304:RgwGEKt/X7ClJS7KGC11LephEnSY+2+1BPi/LPm8oJxrqgqCvc2:ET0HepynQBKDPhozrbRU2

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://drive-connect.cyou/api

Extracted

Family

lumma

C2

https://drive-connect.cyou/api

https://covery-mover.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bdbbdc8e5dd9a3197d56c4e1ef566bdf1643f53441a0e7896602946f886c6f96.exe
    "C:\Users\Admin\AppData\Local\Temp\bdbbdc8e5dd9a3197d56c4e1ef566bdf1643f53441a0e7896602946f886c6f96.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4764
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\V1Q12.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\V1Q12.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:804
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1E05d2.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1E05d2.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1232
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3088
          • C:\Users\Admin\AppData\Local\Temp\1014365001\W4KLQf7.exe
            "C:\Users\Admin\AppData\Local\Temp\1014365001\W4KLQf7.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:5004
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Microsoft\Windows\hyper-v.exe"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:5012
            • C:\Windows\SysWOW64\systeminfo.exe
              systeminfo
              6⤵
              • System Location Discovery: System Language Discovery
              • Gathers system information
              PID:2112
          • C:\Users\Admin\AppData\Local\Temp\1014371001\6de653f3a6.exe
            "C:\Users\Admin\AppData\Local\Temp\1014371001\6de653f3a6.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4608
            • C:\Users\Admin\AppData\Local\Temp\1014371001\6de653f3a6.exe
              "C:\Users\Admin\AppData\Local\Temp\1014371001\6de653f3a6.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:4136
          • C:\Users\Admin\AppData\Local\Temp\1014372001\422b094200.exe
            "C:\Users\Admin\AppData\Local\Temp\1014372001\422b094200.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2272
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1014372001\422b094200.exe" & rd /s /q "C:\ProgramData\HLNY58Q9RQIE" & exit
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3892
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 10
                7⤵
                • System Location Discovery: System Language Discovery
                • Delays execution with timeout.exe
                PID:2988
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 2096
              6⤵
              • Program crash
              PID:4484
          • C:\Users\Admin\AppData\Local\Temp\1014373001\d408429d9a.exe
            "C:\Users\Admin\AppData\Local\Temp\1014373001\d408429d9a.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3780
          • C:\Users\Admin\AppData\Local\Temp\1014375001\a748fff257.exe
            "C:\Users\Admin\AppData\Local\Temp\1014375001\a748fff257.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3440
          • C:\Users\Admin\AppData\Local\Temp\1014376001\b8309e5f66.exe
            "C:\Users\Admin\AppData\Local\Temp\1014376001\b8309e5f66.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4664
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3N10H.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3N10H.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2552
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4E643j.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4E643j.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Windows security modification
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5112
  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:3180
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2272 -ip 2272
    1⤵
      PID:4552
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:3484
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:4648

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1014365001\W4KLQf7.exe

      Filesize

      3.7MB

      MD5

      12c766cab30c7a0ef110f0199beda18b

      SHA1

      efdc8eb63df5aae563c7153c3bd607812debeba4

      SHA256

      7b2070ca45ec370acba43623fb52931ee52bee6f0ce74e6230179b058fa2c316

      SHA512

      32cad9086d9c7a8d88c3bfcb0806f350f0df9624637439f1e34ab2efffa0c273faef0c226c388ed28f07381aef0655af9e3eb3e9557cbfd2d8c915b556b1cf10

    • C:\Users\Admin\AppData\Local\Temp\1014371001\6de653f3a6.exe

      Filesize

      710KB

      MD5

      28e568616a7b792cac1726deb77d9039

      SHA1

      39890a418fb391b823ed5084533e2e24dff021e1

      SHA256

      9597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2

      SHA512

      85048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5

    • C:\Users\Admin\AppData\Local\Temp\1014372001\422b094200.exe

      Filesize

      384KB

      MD5

      dfd5f78a711fa92337010ecc028470b4

      SHA1

      1a389091178f2be8ce486cd860de16263f8e902e

      SHA256

      da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d

      SHA512

      a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656

    • C:\Users\Admin\AppData\Local\Temp\1014373001\d408429d9a.exe

      Filesize

      2.5MB

      MD5

      2a78ce9f3872f5e591d643459cabe476

      SHA1

      9ac947dfc71a868bc9c2eb2bd78dfb433067682e

      SHA256

      21a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae

      SHA512

      03e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9

    • C:\Users\Admin\AppData\Local\Temp\1014375001\a748fff257.exe

      Filesize

      1.7MB

      MD5

      656562cca191b9d58ce38dd8b98b7879

      SHA1

      29133dce961cadbfa01da2581dc43cd6b2c2a745

      SHA256

      61b227734b42abc0b52830af310f124bf668f033aaeec5cf5c58b001261a2ca3

      SHA512

      e7675dad6a82442ff43347de725fb0d223fc264205951494e35144e9c9ecea77042cc5e25fbc9bc5191897a126adbb6abc88c233f88a067a01efea6a0c10ce03

    • C:\Users\Admin\AppData\Local\Temp\1014376001\b8309e5f66.exe

      Filesize

      2.7MB

      MD5

      a64f923cacadf2e7020d0e9b7383276c

      SHA1

      59146faef7928db615b58a1eb9757ff8b2ad0337

      SHA256

      2f7d1a912f1c224867bffc00e2ce664df0b131abdf1128d7f50cfd373f9196f5

      SHA512

      a8f9f8ad1bc2aa54a0092e4dcc77e020151a0137bc9b28dcc494f27c0c45fd124801b064400b813c7aee76d4337c1239a5da96bf99e9ffbbe47231b0597f5bef

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4E643j.exe

      Filesize

      2.7MB

      MD5

      a8b5991e09ce4327c3dc6454e1ba9818

      SHA1

      f3903c130e0e209051a1fb6d08a3a336493749ff

      SHA256

      2164957626fcf6b193ea8261a9f7fba73c54d3762ac26996fdf09b10142b8240

      SHA512

      ba62dc7f35a41aa3c0cb57bcb0f1ef29c3754be6ef0d3c67eba3fc83ae5357d59aa569fa9578efde6d1e6bccc50bc6cb5eda6feb7a6d0ca541925f9e8c70126c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\V1Q12.exe

      Filesize

      3.5MB

      MD5

      b33ba2ea53c41f4b2d968337753dba37

      SHA1

      49afce4322c5949d3ff6e9bdc16a1df74d440ef6

      SHA256

      9cc9379aded92f7406458ef4ce613836fe4854731fc4e9012168b65900b30e9b

      SHA512

      28e0732da5c58105ed352d2ee572825014d6ea424d0f1cf17d44a99981629f4f2d3fe893e1b4285f5adb3c1d9f4ff62eae7a2ed74419f3ea6da2c6ff0c37239d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1E05d2.exe

      Filesize

      3.2MB

      MD5

      5e1f79c85746f02bba8f07ddf1d40582

      SHA1

      e5121c356beeda93810ce5298cace9fb22ef8367

      SHA256

      fb9ca04eb63973f5badd7bae3dd967f942ac21eb7b3853b76b00e480e32c6ef3

      SHA512

      defbdd6351fc7bcc070894fa6d88939884163161cb5700c839a80a47c1e225456b25c372a1af7852417a22dc38ec7bd825e154ee589bca678b46fb6695ac513e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3N10H.exe

      Filesize

      1.7MB

      MD5

      039f3a3212526175709fc44ab3520993

      SHA1

      a0ab9b621974da2bbac97b3f312268651985cca0

      SHA256

      e3099fcf1b2c3583ab423bea894b8c3382de3647443ef90bef157d6593eff31c

      SHA512

      a332a0fb26489267896ef806c8dc83ee436172dadfeb4ce2e8f75b21a78deb4c2e5ba7684324e47cb789038ec4f615ec8a32eab0b25a50c687e66c13940fc056

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sacm2qex.0vd.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/1232-33-0x0000000000DC1000-0x0000000000E29000-memory.dmp

      Filesize

      416KB

    • memory/1232-32-0x0000000000DC0000-0x00000000010EF000-memory.dmp

      Filesize

      3.2MB

    • memory/1232-18-0x0000000000DC0000-0x00000000010EF000-memory.dmp

      Filesize

      3.2MB

    • memory/1232-16-0x0000000000DC1000-0x0000000000E29000-memory.dmp

      Filesize

      416KB

    • memory/1232-17-0x0000000000DC0000-0x00000000010EF000-memory.dmp

      Filesize

      3.2MB

    • memory/1232-15-0x0000000077BD4000-0x0000000077BD6000-memory.dmp

      Filesize

      8KB

    • memory/1232-14-0x0000000000DC0000-0x00000000010EF000-memory.dmp

      Filesize

      3.2MB

    • memory/2272-118-0x0000000000400000-0x000000000064B000-memory.dmp

      Filesize

      2.3MB

    • memory/2272-116-0x0000000000400000-0x000000000064B000-memory.dmp

      Filesize

      2.3MB

    • memory/2552-37-0x0000000000830000-0x0000000000EBB000-memory.dmp

      Filesize

      6.5MB

    • memory/2552-38-0x0000000000830000-0x0000000000EBB000-memory.dmp

      Filesize

      6.5MB

    • memory/3088-30-0x0000000000CB0000-0x0000000000FDF000-memory.dmp

      Filesize

      3.2MB

    • memory/3088-117-0x0000000000CB0000-0x0000000000FDF000-memory.dmp

      Filesize

      3.2MB

    • memory/3088-168-0x0000000000CB0000-0x0000000000FDF000-memory.dmp

      Filesize

      3.2MB

    • memory/3088-219-0x0000000000CB0000-0x0000000000FDF000-memory.dmp

      Filesize

      3.2MB

    • memory/3088-245-0x0000000000CB0000-0x0000000000FDF000-memory.dmp

      Filesize

      3.2MB

    • memory/3088-221-0x0000000000CB0000-0x0000000000FDF000-memory.dmp

      Filesize

      3.2MB

    • memory/3088-66-0x0000000000CB0000-0x0000000000FDF000-memory.dmp

      Filesize

      3.2MB

    • memory/3088-108-0x0000000000CB0000-0x0000000000FDF000-memory.dmp

      Filesize

      3.2MB

    • memory/3088-65-0x0000000000CB0000-0x0000000000FDF000-memory.dmp

      Filesize

      3.2MB

    • memory/3088-217-0x0000000000CB0000-0x0000000000FDF000-memory.dmp

      Filesize

      3.2MB

    • memory/3088-195-0x0000000000CB0000-0x0000000000FDF000-memory.dmp

      Filesize

      3.2MB

    • memory/3088-215-0x0000000000CB0000-0x0000000000FDF000-memory.dmp

      Filesize

      3.2MB

    • memory/3088-226-0x0000000000CB0000-0x0000000000FDF000-memory.dmp

      Filesize

      3.2MB

    • memory/3088-213-0x0000000000CB0000-0x0000000000FDF000-memory.dmp

      Filesize

      3.2MB

    • memory/3088-142-0x0000000000CB0000-0x0000000000FDF000-memory.dmp

      Filesize

      3.2MB

    • memory/3088-211-0x0000000000CB0000-0x0000000000FDF000-memory.dmp

      Filesize

      3.2MB

    • memory/3180-46-0x0000000000CB0000-0x0000000000FDF000-memory.dmp

      Filesize

      3.2MB

    • memory/3440-244-0x0000000000E60000-0x00000000014FC000-memory.dmp

      Filesize

      6.6MB

    • memory/3440-243-0x0000000000E60000-0x00000000014FC000-memory.dmp

      Filesize

      6.6MB

    • memory/3484-208-0x0000000000CB0000-0x0000000000FDF000-memory.dmp

      Filesize

      3.2MB

    • memory/3484-209-0x0000000000CB0000-0x0000000000FDF000-memory.dmp

      Filesize

      3.2MB

    • memory/3780-196-0x00000000012F0000-0x0000000001347000-memory.dmp

      Filesize

      348KB

    • memory/4136-88-0x0000000000400000-0x0000000000457000-memory.dmp

      Filesize

      348KB

    • memory/4136-84-0x0000000000400000-0x0000000000457000-memory.dmp

      Filesize

      348KB

    • memory/4136-87-0x0000000000400000-0x0000000000457000-memory.dmp

      Filesize

      348KB

    • memory/4648-224-0x0000000000CB0000-0x0000000000FDF000-memory.dmp

      Filesize

      3.2MB

    • memory/4664-263-0x0000000000100000-0x00000000003B4000-memory.dmp

      Filesize

      2.7MB

    • memory/4664-265-0x0000000000100000-0x00000000003B4000-memory.dmp

      Filesize

      2.7MB

    • memory/4664-266-0x0000000000100000-0x00000000003B4000-memory.dmp

      Filesize

      2.7MB

    • memory/5004-92-0x0000000000400000-0x00000000007BD000-memory.dmp

      Filesize

      3.7MB

    • memory/5004-119-0x0000000002310000-0x0000000002389000-memory.dmp

      Filesize

      484KB

    • memory/5004-120-0x0000000002310000-0x0000000002389000-memory.dmp

      Filesize

      484KB

    • memory/5004-145-0x0000000010000000-0x0000000010731000-memory.dmp

      Filesize

      7.2MB

    • memory/5012-152-0x0000000004FA0000-0x0000000004FC2000-memory.dmp

      Filesize

      136KB

    • memory/5012-186-0x00000000072D0000-0x00000000072E1000-memory.dmp

      Filesize

      68KB

    • memory/5012-188-0x0000000007300000-0x000000000730E000-memory.dmp

      Filesize

      56KB

    • memory/5012-189-0x0000000007310000-0x0000000007324000-memory.dmp

      Filesize

      80KB

    • memory/5012-190-0x0000000007420000-0x000000000743A000-memory.dmp

      Filesize

      104KB

    • memory/5012-191-0x0000000007350000-0x0000000007358000-memory.dmp

      Filesize

      32KB

    • memory/5012-185-0x0000000007360000-0x00000000073F6000-memory.dmp

      Filesize

      600KB

    • memory/5012-184-0x0000000007130000-0x000000000713A000-memory.dmp

      Filesize

      40KB

    • memory/5012-182-0x0000000007710000-0x0000000007D8A000-memory.dmp

      Filesize

      6.5MB

    • memory/5012-183-0x00000000070D0000-0x00000000070EA000-memory.dmp

      Filesize

      104KB

    • memory/5012-181-0x0000000006F90000-0x0000000007033000-memory.dmp

      Filesize

      652KB

    • memory/5012-180-0x0000000006F70000-0x0000000006F8E000-memory.dmp

      Filesize

      120KB

    • memory/5012-169-0x0000000006360000-0x0000000006392000-memory.dmp

      Filesize

      200KB

    • memory/5012-170-0x000000006FA70000-0x000000006FABC000-memory.dmp

      Filesize

      304KB

    • memory/5012-166-0x0000000005DA0000-0x0000000005DBE000-memory.dmp

      Filesize

      120KB

    • memory/5012-167-0x0000000005DE0000-0x0000000005E2C000-memory.dmp

      Filesize

      304KB

    • memory/5012-165-0x0000000005870000-0x0000000005BC4000-memory.dmp

      Filesize

      3.3MB

    • memory/5012-153-0x0000000005690000-0x00000000056F6000-memory.dmp

      Filesize

      408KB

    • memory/5012-154-0x0000000005700000-0x0000000005766000-memory.dmp

      Filesize

      408KB

    • memory/5012-151-0x0000000004FF0000-0x0000000005618000-memory.dmp

      Filesize

      6.2MB

    • memory/5012-150-0x0000000002460000-0x0000000002496000-memory.dmp

      Filesize

      216KB

    • memory/5112-91-0x0000000000B20000-0x0000000000DD8000-memory.dmp

      Filesize

      2.7MB

    • memory/5112-80-0x0000000000B20000-0x0000000000DD8000-memory.dmp

      Filesize

      2.7MB

    • memory/5112-44-0x0000000000B20000-0x0000000000DD8000-memory.dmp

      Filesize

      2.7MB

    • memory/5112-43-0x0000000000B20000-0x0000000000DD8000-memory.dmp

      Filesize

      2.7MB

    • memory/5112-42-0x0000000000B20000-0x0000000000DD8000-memory.dmp

      Filesize

      2.7MB