Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-03-2024 17:51

General

  • Target

    55e41212ac3799812e7ec931e47d6d19c32e4a61dad8920bb36a5a741d534411.exe

  • Size

    1.8MB

  • MD5

    44ca8413034b9e8a806e81dc4728f9bd

  • SHA1

    2bbd957b38fee713f4afcb2f944ec557cfed76de

  • SHA256

    55e41212ac3799812e7ec931e47d6d19c32e4a61dad8920bb36a5a741d534411

  • SHA512

    7791e34684468fc8b0d65c99f487030d356ff40895ad9074bf45364876b354191fb5255774787f5a9a55e5eaa6db3164fdd4375d97eb48e505f5bb3675f0e92d

  • SSDEEP

    49152:mkMY+1dIb+bOrjnYCyWzFSvKkwZj+eety0OfmOW79:v+1dIb+bOrjnvzFSsVdLmOW7

Malware Config

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

4.185.137.132:1632

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

lumma

C2

https://resergvearyinitiani.shop/api

https://relevantvoicelesskw.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 3 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55e41212ac3799812e7ec931e47d6d19c32e4a61dad8920bb36a5a741d534411.exe
    "C:\Users\Admin\AppData\Local\Temp\55e41212ac3799812e7ec931e47d6d19c32e4a61dad8920bb36a5a741d534411.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    PID:3192
  • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe
      "C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3616
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
          PID:4696
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 1224
            4⤵
            • Program crash
            PID:432
      • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe
        "C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4540
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          3⤵
            PID:4904
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2232
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
          2⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2740
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
            3⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1932
            • C:\Windows\system32\netsh.exe
              netsh wlan show profiles
              4⤵
                PID:2880
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\570491262506_Desktop.zip' -CompressionLevel Optimal
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4176
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
            2⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            PID:3032
          • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe
            "C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"
            2⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            PID:532
          • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe
            "C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"
            2⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:2392
            • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
              "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
              3⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:840
              • C:\Users\Admin\AppData\Local\Temp\1000022001\c0597e6e66.exe
                "C:\Users\Admin\AppData\Local\Temp\1000022001\c0597e6e66.exe"
                4⤵
                • Executes dropped EXE
                PID:2868
              • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
                4⤵
                  PID:1624
            • C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe
              "C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1624
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                3⤵
                  PID:2580
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 1228
                    4⤵
                    • Program crash
                    PID:1508
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 848
                    4⤵
                    • Program crash
                    PID:1196
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 848
                    4⤵
                    • Program crash
                    PID:440
              • C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe
                "C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:5000
              • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
                "C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"
                2⤵
                  PID:4924
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 4696 -ip 4696
                1⤵
                  PID:4648
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2580 -ip 2580
                  1⤵
                    PID:1620
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2580 -ip 2580
                    1⤵
                      PID:4092
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2580 -ip 2580
                      1⤵
                        PID:4988

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe

                        Filesize

                        1.8MB

                        MD5

                        44ca8413034b9e8a806e81dc4728f9bd

                        SHA1

                        2bbd957b38fee713f4afcb2f944ec557cfed76de

                        SHA256

                        55e41212ac3799812e7ec931e47d6d19c32e4a61dad8920bb36a5a741d534411

                        SHA512

                        7791e34684468fc8b0d65c99f487030d356ff40895ad9074bf45364876b354191fb5255774787f5a9a55e5eaa6db3164fdd4375d97eb48e505f5bb3675f0e92d

                      • C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe

                        Filesize

                        534KB

                        MD5

                        a3f8b60a08da0f600cfce3bb600d5cb3

                        SHA1

                        b00d7721767b717b3337b5c6dade4ebf2d56345e

                        SHA256

                        0c608a9b1e70bf8b51a681a8390c8e4743501c45b84cf4d59727aba2fc33cadb

                        SHA512

                        14f63e415133ca438d3c217d5fb3ecf0ad76e19969c54d356f46282230230f1b254fbfc8ae5f78809dc189a9648be2dc1398927b3f089c525cd1105a3843f60d

                      • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe

                        Filesize

                        464KB

                        MD5

                        c084d6f6ba40534fbfc5a64b21ef99ab

                        SHA1

                        0b4a17da83c0a8abbc8fab321931d5447b32b720

                        SHA256

                        afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624

                        SHA512

                        a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1

                      • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe

                        Filesize

                        2.6MB

                        MD5

                        bbd72e413bb1eccfbad1fe270aa48516

                        SHA1

                        06560b4af80d8eb5374e2c34e21d584ebce2e525

                        SHA256

                        b9fb061fe6926c1effce70d6ffb1910b73b00a211f499e229c82a58d8e6b628f

                        SHA512

                        36faa6c708f4ae78c521043c5a546839c7cb040b0c8cda0a200af0aa3f75fc02309982489de3d6f02b05ca1461b202a675ae4c9755cf1c1435f7d406fd27ec35

                      • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe

                        Filesize

                        2.9MB

                        MD5

                        cb355df0768161443b528421bd7667f1

                        SHA1

                        66fb8598ee4d81d1a51ffdfd7c9c9d4956788d7a

                        SHA256

                        9a0b9159df4347a4a616c01a23b23ea99a04ba7afa2035fbf4db2ef22b5b074a

                        SHA512

                        9e316b711cd18308c3131c4ab2cbabc88f7e8c21aeaae8811b7b3173bcf9c8df6a7249c9863db55876be73d53bb06ecb7389ca737f782aaa259f18a6d3bd2376

                      • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe

                        Filesize

                        1.8MB

                        MD5

                        93ed2a088a1405ce772759195252bf1c

                        SHA1

                        2fac4eb5809ba517bd8aea6a3646439cf0789d09

                        SHA256

                        2c24796f39ad3ccc607be99574202488fa3954473dac2c72887cf5ae01ce5faa

                        SHA512

                        201e8ebb3438bf6a0525ce7a7930d5361784f8d2079a950252e45e80577b19881cc20fc09b45bbf3d2b8eeba90ab9c2c24cae66f7721ac22f9598f40d9644938

                      • C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe

                        Filesize

                        451KB

                        MD5

                        b2b60c50903a73efffcb4e33ce49238f

                        SHA1

                        9b6f27fc410748ae1570978d7a6aba95a1041eea

                        SHA256

                        29d409af265261b204f6eeeedb5e9bb1f7a829b723a5d1d78384066744bddbe1

                        SHA512

                        2c66a1615de77157f57c662de2e3ec97deb8cb6aadc0a03ff0acc3b269affd5ae0d50dfef85939ca9c1a8c6d47ff915061157e7da92dc286cb6ddd9b06a88126

                      • C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe

                        Filesize

                        541KB

                        MD5

                        3b069f3dd741e4360f26cb27cb10320a

                        SHA1

                        6a9503aaf1e297f2696482ddf1bd4605a8710101

                        SHA256

                        f63bdc068c453e7e22740681a0c280d02745807b1695ce86e5067069beca533e

                        SHA512

                        bda58c074f7bd5171d7e3188a48cbdc457607ff06045e64a9e8e33fcb6f66f941d75a7bf57eb0ef262491622b4a9936342384237fa61c1add3365d5006c6d0d9

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_352z2znh.5rg.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                        Filesize

                        109KB

                        MD5

                        2afdbe3b99a4736083066a13e4b5d11a

                        SHA1

                        4d4856cf02b3123ac16e63d4a448cdbcb1633546

                        SHA256

                        8d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee

                        SHA512

                        d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f

                      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                        Filesize

                        1.2MB

                        MD5

                        92fbdfccf6a63acef2743631d16652a7

                        SHA1

                        971968b1378dd89d59d7f84bf92f16fc68664506

                        SHA256

                        b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72

                        SHA512

                        b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117

                      • memory/532-191-0x0000000000840000-0x0000000000BD7000-memory.dmp

                        Filesize

                        3.6MB

                      • memory/532-187-0x0000000000840000-0x0000000000BD7000-memory.dmp

                        Filesize

                        3.6MB

                      • memory/532-322-0x0000000000840000-0x0000000000BD7000-memory.dmp

                        Filesize

                        3.6MB

                      • memory/532-152-0x0000000000840000-0x0000000000BD7000-memory.dmp

                        Filesize

                        3.6MB

                      • memory/532-156-0x0000000000840000-0x0000000000BD7000-memory.dmp

                        Filesize

                        3.6MB

                      • memory/532-162-0x0000000000840000-0x0000000000BD7000-memory.dmp

                        Filesize

                        3.6MB

                      • memory/532-193-0x0000000000840000-0x0000000000BD7000-memory.dmp

                        Filesize

                        3.6MB

                      • memory/532-207-0x0000000000840000-0x0000000000BD7000-memory.dmp

                        Filesize

                        3.6MB

                      • memory/2016-192-0x00000000004F0000-0x00000000009B5000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2016-23-0x00000000052F0000-0x00000000052F1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2016-26-0x00000000052A0000-0x00000000052A1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2016-27-0x0000000005320000-0x0000000005321000-memory.dmp

                        Filesize

                        4KB

                      • memory/2016-28-0x0000000005310000-0x0000000005311000-memory.dmp

                        Filesize

                        4KB

                      • memory/2016-29-0x00000000004F0000-0x00000000009B5000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2016-22-0x00000000052C0000-0x00000000052C1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2016-39-0x00000000004F0000-0x00000000009B5000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2016-186-0x00000000004F0000-0x00000000009B5000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2016-24-0x0000000005290000-0x0000000005291000-memory.dmp

                        Filesize

                        4KB

                      • memory/2016-52-0x00000000004F0000-0x00000000009B5000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2016-25-0x00000000052B0000-0x00000000052B1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2016-21-0x00000000052D0000-0x00000000052D1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2016-161-0x00000000004F0000-0x00000000009B5000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2016-20-0x00000000004F0000-0x00000000009B5000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2016-154-0x00000000004F0000-0x00000000009B5000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2016-19-0x00000000004F0000-0x00000000009B5000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2016-194-0x00000000004F0000-0x00000000009B5000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2016-226-0x00000000004F0000-0x00000000009B5000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2016-125-0x00000000004F0000-0x00000000009B5000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2016-328-0x00000000004F0000-0x00000000009B5000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2016-112-0x00000000004F0000-0x00000000009B5000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2232-98-0x0000000073640000-0x0000000073DF0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/2232-90-0x00000000053F0000-0x0000000005994000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/2232-94-0x0000000004E40000-0x0000000004ED2000-memory.dmp

                        Filesize

                        584KB

                      • memory/2232-153-0x0000000073640000-0x0000000073DF0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/2232-155-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

                        Filesize

                        64KB

                      • memory/2232-157-0x00000000062D0000-0x00000000068E8000-memory.dmp

                        Filesize

                        6.1MB

                      • memory/2232-163-0x0000000005D90000-0x0000000005DDC000-memory.dmp

                        Filesize

                        304KB

                      • memory/2232-160-0x0000000005D50000-0x0000000005D8C000-memory.dmp

                        Filesize

                        240KB

                      • memory/2232-159-0x0000000005CF0000-0x0000000005D02000-memory.dmp

                        Filesize

                        72KB

                      • memory/2232-108-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

                        Filesize

                        64KB

                      • memory/2232-81-0x0000000000400000-0x0000000000450000-memory.dmp

                        Filesize

                        320KB

                      • memory/2232-113-0x0000000004CF0000-0x0000000004CFA000-memory.dmp

                        Filesize

                        40KB

                      • memory/2232-158-0x0000000007C60000-0x0000000007D6A000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2392-291-0x0000000000C60000-0x0000000001115000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2580-246-0x0000000000400000-0x000000000044B000-memory.dmp

                        Filesize

                        300KB

                      • memory/2580-249-0x0000000000400000-0x000000000044B000-memory.dmp

                        Filesize

                        300KB

                      • memory/3192-11-0x0000000004F10000-0x0000000004F11000-memory.dmp

                        Filesize

                        4KB

                      • memory/3192-7-0x0000000004E90000-0x0000000004E91000-memory.dmp

                        Filesize

                        4KB

                      • memory/3192-1-0x0000000077A34000-0x0000000077A36000-memory.dmp

                        Filesize

                        8KB

                      • memory/3192-2-0x0000000000F10000-0x00000000013D5000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/3192-3-0x0000000004EC0000-0x0000000004EC1000-memory.dmp

                        Filesize

                        4KB

                      • memory/3192-4-0x0000000004ED0000-0x0000000004ED1000-memory.dmp

                        Filesize

                        4KB

                      • memory/3192-5-0x0000000004EB0000-0x0000000004EB1000-memory.dmp

                        Filesize

                        4KB

                      • memory/3192-6-0x0000000004F00000-0x0000000004F01000-memory.dmp

                        Filesize

                        4KB

                      • memory/3192-8-0x0000000004EA0000-0x0000000004EA1000-memory.dmp

                        Filesize

                        4KB

                      • memory/3192-0-0x0000000000F10000-0x00000000013D5000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/3192-16-0x0000000000F10000-0x00000000013D5000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/3192-9-0x0000000004EF0000-0x0000000004EF1000-memory.dmp

                        Filesize

                        4KB

                      • memory/3192-10-0x0000000004F20000-0x0000000004F21000-memory.dmp

                        Filesize

                        4KB

                      • memory/3616-88-0x0000000073640000-0x0000000073DF0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/3616-50-0x0000000000F30000-0x0000000000FBC000-memory.dmp

                        Filesize

                        560KB

                      • memory/3616-62-0x0000000005AF0000-0x0000000005B00000-memory.dmp

                        Filesize

                        64KB

                      • memory/3616-51-0x0000000073640000-0x0000000073DF0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/4176-174-0x00007FF95E1C0000-0x00007FF95EC81000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4176-176-0x000001B132D10000-0x000001B132D20000-memory.dmp

                        Filesize

                        64KB

                      • memory/4176-169-0x000001B132C80000-0x000001B132CA2000-memory.dmp

                        Filesize

                        136KB

                      • memory/4176-178-0x000001B1337D0000-0x000001B1337E2000-memory.dmp

                        Filesize

                        72KB

                      • memory/4176-177-0x000001B132D10000-0x000001B132D20000-memory.dmp

                        Filesize

                        64KB

                      • memory/4176-175-0x000001B132D10000-0x000001B132D20000-memory.dmp

                        Filesize

                        64KB

                      • memory/4540-76-0x0000000004D70000-0x0000000004D80000-memory.dmp

                        Filesize

                        64KB

                      • memory/4540-74-0x0000000073640000-0x0000000073DF0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/4540-73-0x00000000003A0000-0x000000000041A000-memory.dmp

                        Filesize

                        488KB

                      • memory/4540-91-0x0000000002770000-0x0000000004770000-memory.dmp

                        Filesize

                        32.0MB

                      • memory/4540-89-0x0000000073640000-0x0000000073DF0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/4540-142-0x0000000002770000-0x0000000004770000-memory.dmp

                        Filesize

                        32.0MB

                      • memory/4696-93-0x00000000010D0000-0x0000000001102000-memory.dmp

                        Filesize

                        200KB

                      • memory/4696-97-0x0000000000400000-0x0000000000448000-memory.dmp

                        Filesize

                        288KB

                      • memory/4696-86-0x0000000000400000-0x0000000000448000-memory.dmp

                        Filesize

                        288KB

                      • memory/4696-80-0x0000000000400000-0x0000000000448000-memory.dmp

                        Filesize

                        288KB

                      • memory/4696-143-0x00000000010D0000-0x0000000001102000-memory.dmp

                        Filesize

                        200KB

                      • memory/4696-151-0x00000000010D0000-0x0000000001102000-memory.dmp

                        Filesize

                        200KB

                      • memory/4696-150-0x0000000000400000-0x0000000000448000-memory.dmp

                        Filesize

                        288KB

                      • memory/4696-96-0x00000000010D0000-0x0000000001102000-memory.dmp

                        Filesize

                        200KB

                      • memory/4696-95-0x00000000010D0000-0x0000000001102000-memory.dmp

                        Filesize

                        200KB

                      • memory/4696-147-0x00000000010D0000-0x0000000001102000-memory.dmp

                        Filesize

                        200KB

                      • memory/4696-92-0x00000000010D0000-0x0000000001102000-memory.dmp

                        Filesize

                        200KB

                      • memory/4696-148-0x00000000010D0000-0x0000000001102000-memory.dmp

                        Filesize

                        200KB

                      • memory/4696-149-0x00000000010D0000-0x0000000001102000-memory.dmp

                        Filesize

                        200KB