Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-12-2024 11:10

General

  • Target

    6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e_Sigmanly.exe

  • Size

    2.9MB

  • MD5

    dac73e7813dc3500e5f677b5f31191df

  • SHA1

    bf5eaa68905a19d7cda4cc824267d5fbfc27785a

  • SHA256

    6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e

  • SHA512

    7e26aa8fa617887d322ff823d6133dc677cd6c7e5ff2d1b14f6db689dff185e4f668802037bcd38e2134965892f71aabb4b274ae5568adb6e2ad065f93d593ba

  • SSDEEP

    49152:CdKtEEZolFDH6eU4kCfdnZlAVVXmZUiUHHUw0aAVP:ntEEZuFDaeU4kCfhZloXmVy0

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://sordid-snaked.cyou/api

https://awake-weaves.cyou/api

https://wrathful-jammy.cyou/api

https://debonairnukk.xyz/api

https://diffuculttan.xyz/api

https://effecterectz.xyz/api

https://deafeninggeh.biz/api

https://immureprech.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 19 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 30 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 20 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e_Sigmanly.exe
    "C:\Users\Admin\AppData\Local\Temp\6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e_Sigmanly.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Users\Admin\AppData\Local\Temp\1018024001\74bc2a85f9.exe
        "C:\Users\Admin\AppData\Local\Temp\1018024001\74bc2a85f9.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2888
      • C:\Users\Admin\AppData\Local\Temp\1018469001\4d947324df.exe
        "C:\Users\Admin\AppData\Local\Temp\1018469001\4d947324df.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2176
        • C:\Users\Admin\AppData\Local\Temp\1018469001\4d947324df.exe
          "C:\Users\Admin\AppData\Local\Temp\1018469001\4d947324df.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          PID:1488
      • C:\Users\Admin\AppData\Local\Temp\1018471001\5d6ab90cc5.exe
        "C:\Users\Admin\AppData\Local\Temp\1018471001\5d6ab90cc5.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2368
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Add-MpPreference -ExclusionPath "C:\bemchi"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:404
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2004
      • C:\Users\Admin\AppData\Local\Temp\1018472001\ea9abd8cc3.exe
        "C:\Users\Admin\AppData\Local\Temp\1018472001\ea9abd8cc3.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2472
        • C:\Users\Admin\AppData\Local\Temp\1018472001\ea9abd8cc3.exe
          "C:\Users\Admin\AppData\Local\Temp\1018472001\ea9abd8cc3.exe"
          4⤵
          • Executes dropped EXE
          PID:2280
        • C:\Users\Admin\AppData\Local\Temp\1018472001\ea9abd8cc3.exe
          "C:\Users\Admin\AppData\Local\Temp\1018472001\ea9abd8cc3.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3044
      • C:\Users\Admin\AppData\Local\Temp\1018473001\f0b23bdcb7.exe
        "C:\Users\Admin\AppData\Local\Temp\1018473001\f0b23bdcb7.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:2044
      • C:\Users\Admin\AppData\Local\Temp\1018474001\vmLn5k4.exe
        "C:\Users\Admin\AppData\Local\Temp\1018474001\vmLn5k4.exe"
        3⤵
        • Executes dropped EXE
        PID:900
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 900 -s 80
          4⤵
          • Loads dropped DLL
          PID:2496
      • C:\Users\Admin\AppData\Local\Temp\1018475001\9222a4ebad.exe
        "C:\Users\Admin\AppData\Local\Temp\1018475001\9222a4ebad.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:2368
        • C:\Users\Admin\AppData\Local\Temp\1018475001\9222a4ebad.exe
          "C:\Users\Admin\AppData\Local\Temp\1018475001\9222a4ebad.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1944
      • C:\Users\Admin\AppData\Local\Temp\1018476001\3c0bb9c756.exe
        "C:\Users\Admin\AppData\Local\Temp\1018476001\3c0bb9c756.exe"
        3⤵
        • Enumerates VirtualBox registry keys
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2380
      • C:\Users\Admin\AppData\Local\Temp\1018477001\e98aaaa641.exe
        "C:\Users\Admin\AppData\Local\Temp\1018477001\e98aaaa641.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:1988
        • C:\Users\Admin\AppData\Local\Temp\1018477001\e98aaaa641.exe
          "C:\Users\Admin\AppData\Local\Temp\1018477001\e98aaaa641.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1716
      • C:\Users\Admin\AppData\Local\Temp\1018478001\a66c511a07.exe
        "C:\Users\Admin\AppData\Local\Temp\1018478001\a66c511a07.exe"
        3⤵
        • Executes dropped EXE
        PID:2416
      • C:\Users\Admin\AppData\Local\Temp\1018479001\b14ea5fb12.exe
        "C:\Users\Admin\AppData\Local\Temp\1018479001\b14ea5fb12.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1140
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Add-MpPreference -ExclusionPath "C:\djviza"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:704
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2076
      • C:\Users\Admin\AppData\Local\Temp\1018480001\6772c9c20a.exe
        "C:\Users\Admin\AppData\Local\Temp\1018480001\6772c9c20a.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:2968
      • C:\Users\Admin\AppData\Local\Temp\1018481001\3ec98498f6.exe
        "C:\Users\Admin\AppData\Local\Temp\1018481001\3ec98498f6.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:10168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1018024001\74bc2a85f9.exe

    Filesize

    2.8MB

    MD5

    06eb241ef8e97b95ab72fd5b38302220

    SHA1

    50ee0588fd084de8ff5ec5fb30fed03c5734cadd

    SHA256

    9e011b1567decb2222dbba5c1608b15d201876a5369d553fe42d72fa102aeb19

    SHA512

    d5e880586150844303f02aec7d9593283097f1b55bebcc448275a1402313449919d8b718c5a9b25e48d8f790b0ffeb968baa7a8b05de59f14a2bac77be4a1d9e

  • C:\Users\Admin\AppData\Local\Temp\1018469001\4d947324df.exe

    Filesize

    3.1MB

    MD5

    c00a67d527ef38dc6f49d0ad7f13b393

    SHA1

    7b8f2de130ab5e4e59c3c2f4a071bda831ac219d

    SHA256

    12226ccae8c807641241ba5178d853aad38984eefb0c0c4d65abc4da3f9787c3

    SHA512

    9286d267b167cba01e55e68c8c5582f903bed0dd8bc4135eb528ef6814e60e7d4dda2b3611e13efb56aa993635fbab218b0885daf5daea6043061d8384af40ca

  • C:\Users\Admin\AppData\Local\Temp\1018471001\5d6ab90cc5.exe

    Filesize

    21KB

    MD5

    14becdf1e2402e9aa6c2be0e6167041e

    SHA1

    72cbbae6878f5e06060a0038b25ede93b445f0df

    SHA256

    7a769963165063758f15f6e0cece25c9d13072f67fa0d3c25a03a5104fe0783a

    SHA512

    16b837615505f352e134afd9d8655c9cabfa5bfcfbee2c0c34f2d7d9588aa71f875e4e5feb8cdf0f7bacc00f7c1ca8dabd3b3d92afc99abf705c05c78e298b4a

  • C:\Users\Admin\AppData\Local\Temp\1018472001\ea9abd8cc3.exe

    Filesize

    758KB

    MD5

    afd936e441bf5cbdb858e96833cc6ed3

    SHA1

    3491edd8c7caf9ae169e21fb58bccd29d95aefef

    SHA256

    c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf

    SHA512

    928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325

  • C:\Users\Admin\AppData\Local\Temp\1018473001\f0b23bdcb7.exe

    Filesize

    1.8MB

    MD5

    25fb9c54265bbacc7a055174479f0b70

    SHA1

    4af069a2ec874703a7e29023d23a1ada491b584e

    SHA256

    552f8be2c6b2208a89c728f68488930c661b3a06c35a20d133ef7d3c63a86b9c

    SHA512

    7dfd9e0f3fa2d68a6ce8c952e3b755559db73bb7a06c95ad6ed8ac16dedb49be8b8337afc07c9c682f0c4be9db291a551286353e2e2b624223487dc1c8b54668

  • C:\Users\Admin\AppData\Local\Temp\1018474001\vmLn5k4.exe

    Filesize

    8.7MB

    MD5

    1c848c274240a7b5561550c4867c336f

    SHA1

    fe286e578f0652077cd858850939a152835dcc6c

    SHA256

    8b5af8709908fa9da7792816d03feb6287ded45a9cb5a5afd4f061113638a092

    SHA512

    7d96fd7398ce1a3199ea4cb0c7bc4e0f7b76692d9200dd27499b3f96e50a0b91cc77169ad542be46c74fc09e13a84597d180c4c4f0fd23ce45e8c3fa99c8042d

  • C:\Users\Admin\AppData\Local\Temp\1018475001\9222a4ebad.exe

    Filesize

    1.1MB

    MD5

    ef08a45833a7d881c90ded1952f96cb4

    SHA1

    f04aeeb63a1409bd916558d2c40fab8a5ed8168b

    SHA256

    33c236dc81af2a47d595731d6fa47269b2874b281152530fdffdda9cbeb3b501

    SHA512

    74e84f710c90121527f06d453e9286910f2e8b6ac09d2aeb4ab1f0ead23ea9b410c5d1074d8bc759bc3e766b5bc77d156756c7df093ba94093107393290ced97

  • C:\Users\Admin\AppData\Local\Temp\1018476001\3c0bb9c756.exe

    Filesize

    4.3MB

    MD5

    63014ddb15ca6ee8aed525a9e2df6d85

    SHA1

    5739c8445d8dd442d361cfbbf46944ef24e7bc32

    SHA256

    20f1886866cbc38597da35d91a554c4078744d74a07c46ca2633c76a62216c50

    SHA512

    5fc0d017cbaee34bab83480d819a9803605716d57ad787a48b033216974538f272a97c70be223dd518f518ba207201174585d0d597b767d190246eb83eaee641

  • C:\Users\Admin\AppData\Local\Temp\1018477001\e98aaaa641.exe

    Filesize

    791KB

    MD5

    e8af4d0d0b47ac68d762b7f288ae8e6e

    SHA1

    1d65f31526cc20ab41d6b1625d6674d7f13e326c

    SHA256

    b83449768e7af68867c8bc42b19ff012722d88ea66aef69df48661e63e0eb15e

    SHA512

    80fad90314ff639f538a72c5e4ca2bf9ae52b9309caa7cd6f87d61791505bb3612b7f3190ab9b67348c5d71f4d29bb9d101e3f66d525eb9b5e2060a10b2d187a

  • C:\Users\Admin\AppData\Local\Temp\1018478001\a66c511a07.exe

    Filesize

    1.3MB

    MD5

    669ed3665495a4a52029ff680ec8eba9

    SHA1

    7785e285365a141e307931ca4c4ef00b7ecc8986

    SHA256

    2d2d405409b128eea72a496ccff0ed56f9ed87ee2564ae4815b4b116d4fb74d6

    SHA512

    bedc8f7c1894fc64cdd00ebc58b434b7d931e52c198a0fa55f16f4e3d44a7dc4643eaa78ec55a43cc360571345cd71d91a64037a135663e72eed334fe77a21e6

  • C:\Users\Admin\AppData\Local\Temp\1018479001\b14ea5fb12.exe

    Filesize

    21KB

    MD5

    04f57c6fb2b2cd8dcc4b38e4a93d4366

    SHA1

    61770495aa18d480f70b654d1f57998e5bd8c885

    SHA256

    51e4d0cbc184b8abfa6d84e219317cf81bd542286a7cc602c87eb703a39627c2

    SHA512

    53f95e98a5eca472ed6b1dfd6fecd1e28ea66967a1b3aa109fe911dbb935f1abf327438d4b2fe72cf7a0201281e9f56f4548f965b96e3916b9142257627e6ccd

  • C:\Users\Admin\AppData\Local\Temp\1018480001\6772c9c20a.exe

    Filesize

    4.3MB

    MD5

    c56fed47e77d1b3103c94496f1371878

    SHA1

    8b1ac848c5ef777e8de09157301043d6367f59ae

    SHA256

    2c57a53d4a3c03769ed9302fc18cff7a4a5f26e4164023814cc28e92565d7381

    SHA512

    a61f54e66cc8c4af23a79f5f4da2aa2a0fed8fb7452914bef6b9e9441ed075337ccb34300b0adb2be9bb93a54255578bcba2ebfac81d4fd7ca1fc396cff42184

  • C:\Users\Admin\AppData\Local\Temp\1018481001\3ec98498f6.exe

    Filesize

    1.9MB

    MD5

    1f39fac8d8f8c1e3e0697ebf585af36c

    SHA1

    f98243a6bdea8f7de4cfa02d157e94b1cf925f51

    SHA256

    ec2349f4f55242a8328a7f11c5013a7525fa05aa18a680c1d82f2d6d93e6e1ad

    SHA512

    ebf1551cc77e6f815f18ebd38ffc3b581fbc0b07642175db9178652e3cad6be0a38bf978ea09d46815ca64b1482a87261ac5e34303b14420ce89c7c684a7aaed

  • C:\Users\Admin\AppData\Local\Temp\Cab543A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    0197656eec0dd22f6b2365bec1df09b5

    SHA1

    8e0370dc27bb5eb7fc6f8686ce24a4db2b035210

    SHA256

    eb4124a66ae8c164bd27e7536e4bee8da0e6de06e1c085e36339623ee8af6cdb

    SHA512

    f9466d782b5b5ed2558d9d51952518772ea6b9fff7d7933fa97d020b764c6ef929b0074ee6f84ff8acceef07444ec5285b2289d4a01495553ad9201ad9c6a606

  • \Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

    Filesize

    2.9MB

    MD5

    dac73e7813dc3500e5f677b5f31191df

    SHA1

    bf5eaa68905a19d7cda4cc824267d5fbfc27785a

    SHA256

    6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e

    SHA512

    7e26aa8fa617887d322ff823d6133dc677cd6c7e5ff2d1b14f6db689dff185e4f668802037bcd38e2134965892f71aabb4b274ae5568adb6e2ad065f93d593ba

  • memory/1140-318-0x00000000000C0000-0x00000000000CC000-memory.dmp

    Filesize

    48KB

  • memory/1488-171-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/1488-176-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/1488-178-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/1488-173-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/1488-175-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1716-275-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1716-281-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1716-277-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1716-286-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1716-285-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/1716-283-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1716-279-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1944-2432-0x00000000009A0000-0x00000000009CC000-memory.dmp

    Filesize

    176KB

  • memory/1944-366-0x0000000004200000-0x0000000004298000-memory.dmp

    Filesize

    608KB

  • memory/1944-365-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/1944-2441-0x00000000042C0000-0x000000000430C000-memory.dmp

    Filesize

    304KB

  • memory/2044-193-0x0000000000BC0000-0x000000000106B000-memory.dmp

    Filesize

    4.7MB

  • memory/2044-197-0x0000000000BC0000-0x000000000106B000-memory.dmp

    Filesize

    4.7MB

  • memory/2044-184-0x0000000000BC0000-0x000000000106B000-memory.dmp

    Filesize

    4.7MB

  • memory/2044-187-0x0000000000BC0000-0x000000000106B000-memory.dmp

    Filesize

    4.7MB

  • memory/2044-190-0x0000000000BC0000-0x000000000106B000-memory.dmp

    Filesize

    4.7MB

  • memory/2044-160-0x0000000000BC0000-0x000000000106B000-memory.dmp

    Filesize

    4.7MB

  • memory/2044-183-0x0000000000BC0000-0x000000000106B000-memory.dmp

    Filesize

    4.7MB

  • memory/2044-195-0x0000000000BC0000-0x000000000106B000-memory.dmp

    Filesize

    4.7MB

  • memory/2176-162-0x00000000057D0000-0x0000000005926000-memory.dmp

    Filesize

    1.3MB

  • memory/2176-163-0x0000000000650000-0x0000000000672000-memory.dmp

    Filesize

    136KB

  • memory/2176-61-0x0000000001250000-0x0000000001578000-memory.dmp

    Filesize

    3.2MB

  • memory/2368-236-0x00000000005F0000-0x0000000000616000-memory.dmp

    Filesize

    152KB

  • memory/2368-322-0x00000000049A0000-0x0000000004A62000-memory.dmp

    Filesize

    776KB

  • memory/2368-235-0x0000000000260000-0x0000000000376000-memory.dmp

    Filesize

    1.1MB

  • memory/2368-76-0x0000000000390000-0x000000000039C000-memory.dmp

    Filesize

    48KB

  • memory/2380-255-0x0000000000A00000-0x0000000001690000-memory.dmp

    Filesize

    12.6MB

  • memory/2380-319-0x0000000000A00000-0x0000000001690000-memory.dmp

    Filesize

    12.6MB

  • memory/2548-2-0x00000000012C1000-0x00000000012EF000-memory.dmp

    Filesize

    184KB

  • memory/2548-1-0x0000000077510000-0x0000000077512000-memory.dmp

    Filesize

    8KB

  • memory/2548-5-0x00000000012C0000-0x00000000015DD000-memory.dmp

    Filesize

    3.1MB

  • memory/2548-0-0x00000000012C0000-0x00000000015DD000-memory.dmp

    Filesize

    3.1MB

  • memory/2548-3-0x00000000012C0000-0x00000000015DD000-memory.dmp

    Filesize

    3.1MB

  • memory/2548-14-0x00000000012C0000-0x00000000015DD000-memory.dmp

    Filesize

    3.1MB

  • memory/2752-186-0x0000000000EA0000-0x00000000011BD000-memory.dmp

    Filesize

    3.1MB

  • memory/2752-131-0x0000000000EA0000-0x00000000011BD000-memory.dmp

    Filesize

    3.1MB

  • memory/2752-181-0x0000000006610000-0x0000000006ABB000-memory.dmp

    Filesize

    4.7MB

  • memory/2752-182-0x0000000006610000-0x0000000006ABB000-memory.dmp

    Filesize

    4.7MB

  • memory/2752-179-0x0000000000EA0000-0x00000000011BD000-memory.dmp

    Filesize

    3.1MB

  • memory/2752-20-0x0000000000EA0000-0x00000000011BD000-memory.dmp

    Filesize

    3.1MB

  • memory/2752-2451-0x0000000006610000-0x0000000007290000-memory.dmp

    Filesize

    12.5MB

  • memory/2752-44-0x0000000000EA0000-0x00000000011BD000-memory.dmp

    Filesize

    3.1MB

  • memory/2752-158-0x0000000006610000-0x0000000006ABB000-memory.dmp

    Filesize

    4.7MB

  • memory/2752-188-0x0000000000EA0000-0x00000000011BD000-memory.dmp

    Filesize

    3.1MB

  • memory/2752-40-0x0000000005FF0000-0x00000000062EB000-memory.dmp

    Filesize

    3.0MB

  • memory/2752-159-0x0000000006610000-0x0000000006ABB000-memory.dmp

    Filesize

    4.7MB

  • memory/2752-77-0x0000000005FF0000-0x00000000062EB000-memory.dmp

    Filesize

    3.0MB

  • memory/2752-192-0x0000000000EA0000-0x00000000011BD000-memory.dmp

    Filesize

    3.1MB

  • memory/2752-21-0x0000000000EA0000-0x00000000011BD000-memory.dmp

    Filesize

    3.1MB

  • memory/2752-194-0x0000000000EA0000-0x00000000011BD000-memory.dmp

    Filesize

    3.1MB

  • memory/2752-78-0x0000000005FF0000-0x00000000062EB000-memory.dmp

    Filesize

    3.0MB

  • memory/2752-140-0x0000000000EA0000-0x00000000011BD000-memory.dmp

    Filesize

    3.1MB

  • memory/2752-198-0x0000000000EA0000-0x00000000011BD000-memory.dmp

    Filesize

    3.1MB

  • memory/2752-18-0x0000000000EA0000-0x00000000011BD000-memory.dmp

    Filesize

    3.1MB

  • memory/2752-17-0x0000000000EA1000-0x0000000000ECF000-memory.dmp

    Filesize

    184KB

  • memory/2752-22-0x0000000000EA0000-0x00000000011BD000-memory.dmp

    Filesize

    3.1MB

  • memory/2752-42-0x0000000005FF0000-0x00000000062EB000-memory.dmp

    Filesize

    3.0MB

  • memory/2752-237-0x0000000000EA0000-0x00000000011BD000-memory.dmp

    Filesize

    3.1MB

  • memory/2752-16-0x0000000000EA0000-0x00000000011BD000-memory.dmp

    Filesize

    3.1MB

  • memory/2752-254-0x0000000006610000-0x00000000072A0000-memory.dmp

    Filesize

    12.6MB

  • memory/2752-256-0x0000000006610000-0x00000000072A0000-memory.dmp

    Filesize

    12.6MB

  • memory/2752-23-0x0000000000EA0000-0x00000000011BD000-memory.dmp

    Filesize

    3.1MB

  • memory/2752-347-0x0000000006610000-0x0000000007290000-memory.dmp

    Filesize

    12.5MB

  • memory/2752-321-0x0000000006610000-0x00000000072A0000-memory.dmp

    Filesize

    12.6MB

  • memory/2752-121-0x0000000000EA0000-0x00000000011BD000-memory.dmp

    Filesize

    3.1MB

  • memory/2752-303-0x0000000006610000-0x00000000072A0000-memory.dmp

    Filesize

    12.6MB

  • memory/2888-180-0x0000000000E80000-0x000000000117B000-memory.dmp

    Filesize

    3.0MB

  • memory/2888-45-0x0000000000E80000-0x000000000117B000-memory.dmp

    Filesize

    3.0MB

  • memory/2888-122-0x0000000000E80000-0x000000000117B000-memory.dmp

    Filesize

    3.0MB

  • memory/2888-43-0x0000000000E80000-0x000000000117B000-memory.dmp

    Filesize

    3.0MB

  • memory/2888-185-0x0000000000E80000-0x000000000117B000-memory.dmp

    Filesize

    3.0MB

  • memory/2888-189-0x0000000000E80000-0x000000000117B000-memory.dmp

    Filesize

    3.0MB

  • memory/2888-191-0x0000000000E80000-0x000000000117B000-memory.dmp

    Filesize

    3.0MB

  • memory/2888-103-0x0000000000E80000-0x000000000117B000-memory.dmp

    Filesize

    3.0MB

  • memory/2888-123-0x0000000000E80000-0x000000000117B000-memory.dmp

    Filesize

    3.0MB

  • memory/2888-141-0x0000000000E80000-0x000000000117B000-memory.dmp

    Filesize

    3.0MB

  • memory/2888-132-0x0000000000E80000-0x000000000117B000-memory.dmp

    Filesize

    3.0MB

  • memory/2968-348-0x00000000001D0000-0x0000000000E50000-memory.dmp

    Filesize

    12.5MB

  • memory/2968-350-0x00000000001D0000-0x0000000000E50000-memory.dmp

    Filesize

    12.5MB

  • memory/3044-113-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/3044-118-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/3044-111-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/3044-120-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/3044-117-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/3044-108-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/3044-115-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/3044-109-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB