Analysis

  • max time kernel
    145s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-03-2024 05:55

General

  • Target

    50d55c187abcd975629a918970b0a2f1.exe

  • Size

    4.9MB

  • MD5

    50d55c187abcd975629a918970b0a2f1

  • SHA1

    2c248c8f093561cc2318179ea1179fd5b172e6be

  • SHA256

    ffc320e5f95d05b9eb4b50db80a8f2f29b20bc166ed6476c570d7276ce8432db

  • SHA512

    9a4ff95a3a2fd2b4dbeb98c7d1061d1991be5868093f3095e29ee3db8369b41e507d8d0f6bd85b77619431f60cc5532fc6a7a59612a6b30583194c07adee1d5b

  • SSDEEP

    98304:9ayPd4hW/JfMkTQmWPKql6M96BRqchrx91hDORM7seCKaZSwWyQ+kivmjw38:9FJRkm6Kql6MMBRqchrx9ktBZ78jwM

Malware Config

Extracted

Family

amadey

Version

4.18

Attributes
  • install_dir

    154561dcbf

  • install_file

    Dctooux.exe

  • strings_key

    2cd47fa043c815e1a033c67832f3c6a5

  • url_paths

    /j4Fvskd3/index.php

rc4.plain

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

5.42.65.68:29093

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 20 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50d55c187abcd975629a918970b0a2f1.exe
    "C:\Users\Admin\AppData\Local\Temp\50d55c187abcd975629a918970b0a2f1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1500
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\run.vbs"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2584
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\coms.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\coms.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2616
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2548
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1396
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
            5⤵
              PID:2328
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
              5⤵
                PID:2068
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                5⤵
                  PID:2768
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                  5⤵
                    PID:2332
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                    5⤵
                      PID:1428
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    4⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:844
                • C:\Users\Admin\AppData\Local\Temp\RarSFX0\fud.exe
                  "C:\Users\Admin\AppData\Local\Temp\RarSFX0\fud.exe"
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in Windows directory
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of WriteProcessMemory
                  PID:2672
                  • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                    "C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of WriteProcessMemory
                    PID:2872
                    • C:\Users\Admin\1000062002\nativecrypt.exe
                      "C:\Users\Admin\1000062002\nativecrypt.exe"
                      5⤵
                      • Executes dropped EXE
                      • Modifies system certificate store
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2372
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
                      5⤵
                      • Loads dropped DLL
                      • Suspicious use of WriteProcessMemory
                      PID:1804
                      • C:\Windows\system32\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
                        6⤵
                        • Blocklisted process makes network request
                        • Loads dropped DLL
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of WriteProcessMemory
                        PID:1792
                        • C:\Windows\system32\netsh.exe
                          netsh wlan show profiles
                          7⤵
                            PID:2972
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\309405411416_Desktop.zip' -CompressionLevel Optimal
                            7⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2808
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll, Main
                        5⤵
                        • Blocklisted process makes network request
                        • Loads dropped DLL
                        PID:1716

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\1000062002\nativecrypt.exe

                Filesize

                425KB

                MD5

                867db3f60c59188cb4baf8a5aa399752

                SHA1

                64a62a163ef37dc75601aaa3a9b1459f6972ddd1

                SHA256

                5197def97c9d6e3f9c0e55f4a91a424ece5a89d4882a0d413a9260123010ec4c

                SHA512

                f9e6ab200331855e4686abe63cac501e6965fd4a80b26fbbeb70875500e9f0733187c5534e22309ef31cf8fc017f07cf1bd029dd2e093af57651349e8a015f45

              • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe

                Filesize

                239KB

                MD5

                5c88372ce2e49e96bfa49cad2dc4ab2c

                SHA1

                3054890aef8558596822b86e4ffe787dffec6bfb

                SHA256

                f89a3063c119e649ac1bb650f1ac3de4b1f4b7fa850307928a48b03d4c36f387

                SHA512

                405d8d84cf512e2c767d0006d670fff7ba8ae5aeffa4a590c08dad79b6671afa7d8caac52bcd46df25f46d5d471d7fa3291b1158f5bdff6ce8283a1fec9b91bc

              • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe

                Filesize

                64KB

                MD5

                5bed3297eac16e638ebed6edaaa6ff19

                SHA1

                643cb5bcb3010952c65084424e784d45bf1be4fe

                SHA256

                3a51f908f35ab6dcaff9a05232bc8c815fe0331721ff628205f1dc177dbafbd0

                SHA512

                d3d973ead2dc8c518c0e4184c74b0734ada5945b4b781733af788035520e4be7a225c870b78742f6677d37cec211992f58d5d60caefbf1483ae620b0ee53c55a

              • C:\Users\Admin\AppData\Local\Temp\309405411416

                Filesize

                62KB

                MD5

                c2f8f3580f3fd9e6e873a40d1b159cff

                SHA1

                9237e6fd4e74689c47c3832e88ed89dd891a6eff

                SHA256

                7c1e648faeede5c019138eef45d3432791525822ac38eed5eade40e984f0845b

                SHA512

                6f9fe55550f3d64a45e0daadb7885f086d1cdc9d1035ec2e18f3dd66e46a6d001f981a6fbc559b7aa481998d854aeb0888aa84dbe238f1b4f93384ac44686425

              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\coms.exe

                Filesize

                1.7MB

                MD5

                f490aee5849be465c1e5391da9939978

                SHA1

                2fee8ecd10007ab3edb6df784dd7748df2ddb5a7

                SHA256

                4a17de18cba0847f60f881fe52528f8d7c7c656b15aaf71cddb150d5294a2be2

                SHA512

                d132727eeda6dd504ddfe97d12a6188848715b0b0f7a67aa08015ebc7f65623d3c9d24d70c0d81e0c5f6664e3df78572a2a654e5df935938b9a5c2da86f4d381

              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\coms.exe

                Filesize

                2.4MB

                MD5

                8c97e1ebf724d297c332e607af6b698e

                SHA1

                92d4fe3ae03092a23396d1712b9de365a06e8ab6

                SHA256

                bbae4d27fe17a95244976a832bc376b65304336df674202f06d26cbcfa00018e

                SHA512

                e496438299407cd86b6cf87c2cc191cbdeb421d5bb033346e19e30b0ee54cae0f4eb2a7502872654d987276c06e51d3a887130b9704024dac14ced7df541ef7d

              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\run.vbs

                Filesize

                252B

                MD5

                96544ef7574c29c4c5dbfc2c56718bf5

                SHA1

                dce5192f6b4a6deadef71d3e84c561f8369e9607

                SHA256

                d32bda698c5647d80a4ff9ad8c6493a70ee1fbd69a1adc47ee2cb7d72f82a1ea

                SHA512

                706ffeb527846b9b8937d91d3684b76992b9c6b840d68d028093fb4b832d8aa413a9c460b41e3da1edff9979f32c04ceac28149887cba93cdc4264c2d2b376af

              • C:\Users\Admin\AppData\Local\Temp\TmpAC47.tmp

                Filesize

                2KB

                MD5

                1420d30f964eac2c85b2ccfe968eebce

                SHA1

                bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                SHA256

                f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                SHA512

                6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

              • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll

                Filesize

                109KB

                MD5

                ca684dc5ebed4381701a39f1cc3a0fb2

                SHA1

                8c4a375aa583bd1c705597a7f45fd18934276770

                SHA256

                b8c5ad09c5b62fa8d8bcb8e1c317700274b4756d04fc964ccae38103c318ddd2

                SHA512

                8b414799e37d50f664e04e704ab06a8f6f25cb9f9c24f157e998a72aad9c0a0cd9435b42c629dc26643f039725d22a89ca3468dc39009d11d910420a80e9c510

              • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll

                Filesize

                1.2MB

                MD5

                4876ee75ce2712147c41ff1277cd2d30

                SHA1

                3733dc92318f0c6b92cb201e49151686281acda6

                SHA256

                bbfba2d40f48c16a53b5806555c08aff1982c3fe4a77964963edbab9d7e672ed

                SHA512

                9bf25d4d0dfebd287b0c84abb64612b3db00a26b0217490b35925e77487d6c872632c936cedf1205c46ecbf9d4dfc9bc7600bee05afc550b30ae0d0964c5afe9

              • \Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe

                Filesize

                45KB

                MD5

                79d3a766df86b51b836b612e43a6eb30

                SHA1

                a00f5d2fefb9bd1d96acee64431a041ca0700b6e

                SHA256

                b7e8b319297b200f89f1a1c8d6a97c6bad423f0f3001e7ea02a5ddfa4d70ad57

                SHA512

                242c119e6e25656853c7f1518aa9af477c881b87bb18cca4c05c0e0b562e254a8db568f36ee474a269fdae49052dfdef99b121e38badbe09c1ac56dc3e683b4c

              • \Users\Admin\AppData\Local\Temp\RarSFX0\coms.exe

                Filesize

                1.9MB

                MD5

                5260eaef9de88ac32e9a7ad735c6e23c

                SHA1

                93be8fc659c8b7dc7f78a0380f2fdc8453e76cb0

                SHA256

                4eb29cc0ec4f751297016bfea73220d0b0740e1601ebfd4533d78f992c392c88

                SHA512

                69a1263d7c58022ad7922a7ac83355436cdf825c3b774044063198c427026b9b132ff2381dd29aa289bf90f899d878764a8b9bc6376c9953576fbb1b4449d79f

              • \Users\Admin\AppData\Local\Temp\RarSFX0\coms.exe

                Filesize

                1.8MB

                MD5

                895826ed199daa571f4a67df2ee79044

                SHA1

                64158c1105b3f98f518c6a2a12f6dd1c9e1a6efb

                SHA256

                fc7d59d64d1f0ee62fc060dccc4e0c160674814194f84e2f94086b22856edfa8

                SHA512

                f037f548c7c48416a81b674dfef93b1203158c69dbd4541e7a6d31fffc91847b2095b1ba06b4c9af9c43bc6edd1f99d6f386727ec5de614a7c74b6b95f755ec7

              • \Users\Admin\AppData\Local\Temp\RarSFX0\fud.exe

                Filesize

                419KB

                MD5

                27499cf0e73817392b9f50cc9e82c2b3

                SHA1

                a0efab9cdb4b2a4a920f4ab76095d24806d7812f

                SHA256

                bbe53788c93f1feb8c52908d74ae463d58addef354242fb4bfa423560ea82458

                SHA512

                94b6768d229da70e558ede3b339b99f3c67657f5ce6b76d123a9df0226c3c6677e9585dd42fa5a74df901e7b0cc3dd0a89a0c9bfc82271706b4af97a00f4f414

              • memory/844-172-0x0000000000400000-0x0000000000442000-memory.dmp

                Filesize

                264KB

              • memory/844-195-0x0000000000890000-0x0000000000B93000-memory.dmp

                Filesize

                3.0MB

              • memory/844-171-0x0000000000400000-0x0000000000442000-memory.dmp

                Filesize

                264KB

              • memory/844-191-0x0000000000400000-0x0000000000442000-memory.dmp

                Filesize

                264KB

              • memory/1396-181-0x0000000000400000-0x000000000045A000-memory.dmp

                Filesize

                360KB

              • memory/1396-206-0x0000000073B10000-0x00000000741FE000-memory.dmp

                Filesize

                6.9MB

              • memory/1396-198-0x0000000000400000-0x000000000045A000-memory.dmp

                Filesize

                360KB

              • memory/1396-200-0x0000000000400000-0x000000000045A000-memory.dmp

                Filesize

                360KB

              • memory/1396-185-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                Filesize

                4KB

              • memory/1396-201-0x0000000073B10000-0x00000000741FE000-memory.dmp

                Filesize

                6.9MB

              • memory/1396-196-0x0000000000400000-0x000000000045A000-memory.dmp

                Filesize

                360KB

              • memory/1396-177-0x0000000000400000-0x000000000045A000-memory.dmp

                Filesize

                360KB

              • memory/1396-179-0x0000000000400000-0x000000000045A000-memory.dmp

                Filesize

                360KB

              • memory/1396-183-0x0000000000400000-0x000000000045A000-memory.dmp

                Filesize

                360KB

              • memory/2068-218-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                Filesize

                4KB

              • memory/2328-202-0x0000000000090000-0x000000000011C000-memory.dmp

                Filesize

                560KB

              • memory/2328-209-0x0000000000090000-0x000000000011C000-memory.dmp

                Filesize

                560KB

              • memory/2328-207-0x0000000000090000-0x000000000011C000-memory.dmp

                Filesize

                560KB

              • memory/2328-204-0x0000000000090000-0x000000000011C000-memory.dmp

                Filesize

                560KB

              • memory/2372-72-0x0000000000220000-0x000000000027F000-memory.dmp

                Filesize

                380KB

              • memory/2372-71-0x0000000000CC0000-0x0000000000DC0000-memory.dmp

                Filesize

                1024KB

              • memory/2372-74-0x0000000000400000-0x0000000000B13000-memory.dmp

                Filesize

                7.1MB

              • memory/2372-79-0x0000000004D10000-0x0000000004D66000-memory.dmp

                Filesize

                344KB

              • memory/2372-73-0x0000000002760000-0x00000000027B8000-memory.dmp

                Filesize

                352KB

              • memory/2372-75-0x0000000073B10000-0x00000000741FE000-memory.dmp

                Filesize

                6.9MB

              • memory/2372-101-0x0000000000CC0000-0x0000000000DC0000-memory.dmp

                Filesize

                1024KB

              • memory/2372-81-0x0000000004D80000-0x0000000004DC0000-memory.dmp

                Filesize

                256KB

              • memory/2372-103-0x0000000073B10000-0x00000000741FE000-memory.dmp

                Filesize

                6.9MB

              • memory/2372-78-0x0000000004D80000-0x0000000004DC0000-memory.dmp

                Filesize

                256KB

              • memory/2372-122-0x0000000000400000-0x0000000000B13000-memory.dmp

                Filesize

                7.1MB

              • memory/2372-123-0x0000000000CC0000-0x0000000000DC0000-memory.dmp

                Filesize

                1024KB

              • memory/2372-124-0x0000000073B10000-0x00000000741FE000-memory.dmp

                Filesize

                6.9MB

              • memory/2372-77-0x0000000004D80000-0x0000000004DC0000-memory.dmp

                Filesize

                256KB

              • memory/2372-76-0x0000000004D80000-0x0000000004DC0000-memory.dmp

                Filesize

                256KB

              • memory/2548-169-0x0000000073B10000-0x00000000741FE000-memory.dmp

                Filesize

                6.9MB

              • memory/2548-193-0x0000000004A40000-0x0000000004A80000-memory.dmp

                Filesize

                256KB

              • memory/2548-189-0x0000000004A40000-0x0000000004A80000-memory.dmp

                Filesize

                256KB

              • memory/2548-188-0x0000000073B10000-0x00000000741FE000-memory.dmp

                Filesize

                6.9MB

              • memory/2548-176-0x0000000004A40000-0x0000000004A80000-memory.dmp

                Filesize

                256KB

              • memory/2548-170-0x0000000004A40000-0x0000000004A80000-memory.dmp

                Filesize

                256KB

              • memory/2548-167-0x0000000000400000-0x0000000000552000-memory.dmp

                Filesize

                1.3MB

              • memory/2548-166-0x0000000000400000-0x0000000000552000-memory.dmp

                Filesize

                1.3MB

              • memory/2548-165-0x0000000000400000-0x0000000000552000-memory.dmp

                Filesize

                1.3MB

              • memory/2548-159-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                Filesize

                4KB

              • memory/2548-155-0x0000000000400000-0x0000000000552000-memory.dmp

                Filesize

                1.3MB

              • memory/2548-156-0x0000000000400000-0x0000000000552000-memory.dmp

                Filesize

                1.3MB

              • memory/2548-157-0x0000000000400000-0x0000000000552000-memory.dmp

                Filesize

                1.3MB

              • memory/2548-158-0x0000000000400000-0x0000000000552000-memory.dmp

                Filesize

                1.3MB

              • memory/2616-23-0x0000000073B10000-0x00000000741FE000-memory.dmp

                Filesize

                6.9MB

              • memory/2616-192-0x0000000073B10000-0x00000000741FE000-memory.dmp

                Filesize

                6.9MB

              • memory/2616-42-0x0000000004F70000-0x0000000004FB0000-memory.dmp

                Filesize

                256KB

              • memory/2616-153-0x00000000003C0000-0x00000000003C6000-memory.dmp

                Filesize

                24KB

              • memory/2616-154-0x0000000004F70000-0x0000000004FB0000-memory.dmp

                Filesize

                256KB

              • memory/2616-56-0x0000000000940000-0x0000000000984000-memory.dmp

                Filesize

                272KB

              • memory/2616-80-0x0000000073B10000-0x00000000741FE000-memory.dmp

                Filesize

                6.9MB

              • memory/2616-98-0x0000000004F70000-0x0000000004FB0000-memory.dmp

                Filesize

                256KB

              • memory/2616-164-0x0000000004F70000-0x0000000004FB0000-memory.dmp

                Filesize

                256KB

              • memory/2616-152-0x0000000000640000-0x000000000065A000-memory.dmp

                Filesize

                104KB

              • memory/2616-21-0x00000000009B0000-0x0000000000EE6000-memory.dmp

                Filesize

                5.2MB

              • memory/2672-36-0x0000000000400000-0x0000000000B12000-memory.dmp

                Filesize

                7.1MB

              • memory/2672-38-0x0000000000C80000-0x0000000000D80000-memory.dmp

                Filesize

                1024KB

              • memory/2672-18-0x0000000000C80000-0x0000000000D80000-memory.dmp

                Filesize

                1024KB

              • memory/2672-20-0x0000000000400000-0x0000000000B12000-memory.dmp

                Filesize

                7.1MB

              • memory/2672-19-0x0000000000220000-0x000000000028F000-memory.dmp

                Filesize

                444KB

              • memory/2672-24-0x0000000000C70000-0x0000000000C71000-memory.dmp

                Filesize

                4KB

              • memory/2808-135-0x00000000028F0000-0x0000000002970000-memory.dmp

                Filesize

                512KB

              • memory/2808-136-0x00000000028F0000-0x0000000002970000-memory.dmp

                Filesize

                512KB

              • memory/2808-132-0x000000001B350000-0x000000001B632000-memory.dmp

                Filesize

                2.9MB

              • memory/2808-134-0x0000000001F50000-0x0000000001F58000-memory.dmp

                Filesize

                32KB

              • memory/2808-131-0x00000000028F0000-0x0000000002970000-memory.dmp

                Filesize

                512KB

              • memory/2808-137-0x000007FEF5930000-0x000007FEF62CD000-memory.dmp

                Filesize

                9.6MB

              • memory/2808-130-0x000007FEF5930000-0x000007FEF62CD000-memory.dmp

                Filesize

                9.6MB

              • memory/2872-41-0x0000000000400000-0x0000000000B12000-memory.dmp

                Filesize

                7.1MB

              • memory/2872-39-0x0000000000BC0000-0x0000000000CC0000-memory.dmp

                Filesize

                1024KB

              • memory/2872-102-0x0000000000400000-0x0000000000B12000-memory.dmp

                Filesize

                7.1MB

              • memory/2872-96-0x0000000000BC0000-0x0000000000CC0000-memory.dmp

                Filesize

                1024KB

              • memory/2872-40-0x00000000002D0000-0x000000000033F000-memory.dmp

                Filesize

                444KB

              • memory/2872-133-0x0000000000400000-0x0000000000B12000-memory.dmp

                Filesize

                7.1MB

              • memory/2872-95-0x0000000000400000-0x0000000000B12000-memory.dmp

                Filesize

                7.1MB

              • memory/2872-161-0x0000000000400000-0x0000000000B12000-memory.dmp

                Filesize

                7.1MB