Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    26-03-2024 19:02

General

  • Target

    a8bfbfee006bab5f05721b2e5f16866efe2d9ea0a07f36649c0226b56bc9871e.exe

  • Size

    1.8MB

  • MD5

    80186d924ae6d515238c30f5dabe5dc8

  • SHA1

    b378c980669df3fe1ea89b96859b738ef8ea3e79

  • SHA256

    a8bfbfee006bab5f05721b2e5f16866efe2d9ea0a07f36649c0226b56bc9871e

  • SHA512

    43c77c42f7ebf0f652f1bcb141d7edd5946404f688106dc8b8d76899938513f2c540fb7456c128f99f83cb477591fa4591cc6bc8aa811a46b0fa50ffe92ce725

  • SSDEEP

    24576:2HOFOBO+pz4ZBrWVxk6F7BqyBs5J8EZCfHgFnUXzPZmZV7mx7JqW8phBSpuxmoKO:GLrWjWVxhNBqyOHeHi6BmZCNcFSMIxH

Malware Config

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

4.185.137.132:1632

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 3 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 6 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8bfbfee006bab5f05721b2e5f16866efe2d9ea0a07f36649c0226b56bc9871e.exe
    "C:\Users\Admin\AppData\Local\Temp\a8bfbfee006bab5f05721b2e5f16866efe2d9ea0a07f36649c0226b56bc9871e.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:3040
  • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe
      "C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3172
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
          PID:4104
      • C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe
        "C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2964
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2164
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2060
          • C:\Windows\system32\netsh.exe
            netsh wlan show profiles
            4⤵
              PID:3944
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\181651180316_Desktop.zip' -CompressionLevel Optimal
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3080
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
          2⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          PID:1512
        • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe
          "C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4984
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1772
            • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe
              "C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4528
            • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe
              "C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"
              4⤵
              • Executes dropped EXE
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3816

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Defense Evasion

      Virtualization/Sandbox Evasion

      2
      T1497

      Subvert Trust Controls

      1
      T1553

      Install Root Certificate

      1
      T1553.004

      Modify Registry

      1
      T1112

      Credential Access

      Unsecured Credentials

      4
      T1552

      Credentials In Files

      3
      T1552.001

      Credentials in Registry

      1
      T1552.002

      Discovery

      Query Registry

      4
      T1012

      Virtualization/Sandbox Evasion

      2
      T1497

      System Information Discovery

      2
      T1082

      Collection

      Data from Local System

      4
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
        Filesize

        1.8MB

        MD5

        80186d924ae6d515238c30f5dabe5dc8

        SHA1

        b378c980669df3fe1ea89b96859b738ef8ea3e79

        SHA256

        a8bfbfee006bab5f05721b2e5f16866efe2d9ea0a07f36649c0226b56bc9871e

        SHA512

        43c77c42f7ebf0f652f1bcb141d7edd5946404f688106dc8b8d76899938513f2c540fb7456c128f99f83cb477591fa4591cc6bc8aa811a46b0fa50ffe92ce725

      • C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe
        Filesize

        162B

        MD5

        1b7c22a214949975556626d7217e9a39

        SHA1

        d01c97e2944166ed23e47e4a62ff471ab8fa031f

        SHA256

        340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

        SHA512

        ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

      • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe
        Filesize

        464KB

        MD5

        c084d6f6ba40534fbfc5a64b21ef99ab

        SHA1

        0b4a17da83c0a8abbc8fab321931d5447b32b720

        SHA256

        afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624

        SHA512

        a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1

      • C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe
        Filesize

        541KB

        MD5

        3b069f3dd741e4360f26cb27cb10320a

        SHA1

        6a9503aaf1e297f2696482ddf1bd4605a8710101

        SHA256

        f63bdc068c453e7e22740681a0c280d02745807b1695ce86e5067069beca533e

        SHA512

        bda58c074f7bd5171d7e3188a48cbdc457607ff06045e64a9e8e33fcb6f66f941d75a7bf57eb0ef262491622b4a9936342384237fa61c1add3365d5006c6d0d9

      • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe
        Filesize

        1.7MB

        MD5

        85a15f080b09acace350ab30460c8996

        SHA1

        3fc515e60e4cfa5b3321f04a96c7fb463e4b9d02

        SHA256

        3a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b

        SHA512

        ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f

      • C:\Users\Admin\AppData\Local\Temp\Tmp382D.tmp
        Filesize

        2KB

        MD5

        1420d30f964eac2c85b2ccfe968eebce

        SHA1

        bdf9a6876578a3e38079c4f8cf5d6c79687ad750

        SHA256

        f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

        SHA512

        6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sr0lhn3x.v5p.ps1
        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\tmpF3A4.tmp
        Filesize

        46KB

        MD5

        02d2c46697e3714e49f46b680b9a6b83

        SHA1

        84f98b56d49f01e9b6b76a4e21accf64fd319140

        SHA256

        522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

        SHA512

        60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

      • C:\Users\Admin\AppData\Local\Temp\tmpF53D.tmp
        Filesize

        46KB

        MD5

        14ccc9293153deacbb9a20ee8f6ff1b7

        SHA1

        46b4d7b004ff4f1f40ad9f107fe7c7e3abc9a9f3

        SHA256

        3195ce0f7aa2eae2b21c447f264e2bd4e1dc5208353ac72d964a750de9a83511

        SHA512

        916f2178be05dc329461d2739271972238b22052b5935883da31e6c98d2697bd2435c9f6a2d1fcafb4811a1d867c761055532669aac2ea1a3a78c346cdeba765

      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
        Filesize

        109KB

        MD5

        2afdbe3b99a4736083066a13e4b5d11a

        SHA1

        4d4856cf02b3123ac16e63d4a448cdbcb1633546

        SHA256

        8d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee

        SHA512

        d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f

      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
        Filesize

        1.2MB

        MD5

        92fbdfccf6a63acef2743631d16652a7

        SHA1

        971968b1378dd89d59d7f84bf92f16fc68664506

        SHA256

        b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72

        SHA512

        b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117

      • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe
        Filesize

        541KB

        MD5

        1fc4b9014855e9238a361046cfbf6d66

        SHA1

        c17f18c8246026c9979ab595392a14fe65cc5e9f

        SHA256

        f38c27ecbeed9721f0885d3b2f2f767d60a5d1c0a5c98433357f570987da3e50

        SHA512

        2af234cac24ec4a508693d9affa7f759d4b29bb3c9ddffd9e6350959fd4da26501553399d2b02a8eeae8dace6bfe9b2ce50462ce3c6547497f5b0ea6ed226b12

      • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe
        Filesize

        304KB

        MD5

        cc90e3326d7b20a33f8037b9aab238e4

        SHA1

        236d173a6ac462d85de4e866439634db3b9eeba3

        SHA256

        bd73ee49a23901f9fb235f8a5b29adc72cc637ad4b62a9760c306900cb1678b7

        SHA512

        b5d197a05a267bf66509b6d976924cd6f5963532a9f9f22d1763701d4fba3dfa971e0058388249409884bc29216fb33a51846562a5650f81d99ce14554861521

      • memory/1772-214-0x0000000000400000-0x0000000000592000-memory.dmp
        Filesize

        1.6MB

      • memory/2440-27-0x0000000005410000-0x0000000005411000-memory.dmp
        Filesize

        4KB

      • memory/2440-177-0x0000000000FF0000-0x00000000014B4000-memory.dmp
        Filesize

        4.8MB

      • memory/2440-23-0x0000000005390000-0x0000000005391000-memory.dmp
        Filesize

        4KB

      • memory/2440-22-0x00000000053F0000-0x00000000053F1000-memory.dmp
        Filesize

        4KB

      • memory/2440-21-0x00000000053B0000-0x00000000053B1000-memory.dmp
        Filesize

        4KB

      • memory/2440-20-0x00000000053C0000-0x00000000053C1000-memory.dmp
        Filesize

        4KB

      • memory/2440-19-0x0000000000FF0000-0x00000000014B4000-memory.dmp
        Filesize

        4.8MB

      • memory/2440-116-0x0000000000FF0000-0x00000000014B4000-memory.dmp
        Filesize

        4.8MB

      • memory/2440-26-0x0000000005420000-0x0000000005421000-memory.dmp
        Filesize

        4KB

      • memory/2440-24-0x00000000053A0000-0x00000000053A1000-memory.dmp
        Filesize

        4KB

      • memory/2440-36-0x0000000000FF0000-0x00000000014B4000-memory.dmp
        Filesize

        4.8MB

      • memory/2440-37-0x0000000000FF0000-0x00000000014B4000-memory.dmp
        Filesize

        4.8MB

      • memory/2440-18-0x0000000000FF0000-0x00000000014B4000-memory.dmp
        Filesize

        4.8MB

      • memory/2440-276-0x0000000000FF0000-0x00000000014B4000-memory.dmp
        Filesize

        4.8MB

      • memory/2440-271-0x0000000000FF0000-0x00000000014B4000-memory.dmp
        Filesize

        4.8MB

      • memory/2440-266-0x0000000000FF0000-0x00000000014B4000-memory.dmp
        Filesize

        4.8MB

      • memory/2440-61-0x0000000000FF0000-0x00000000014B4000-memory.dmp
        Filesize

        4.8MB

      • memory/2440-108-0x0000000000FF0000-0x00000000014B4000-memory.dmp
        Filesize

        4.8MB

      • memory/2440-25-0x00000000053D0000-0x00000000053D1000-memory.dmp
        Filesize

        4KB

      • memory/2440-80-0x0000000000FF0000-0x00000000014B4000-memory.dmp
        Filesize

        4.8MB

      • memory/2964-136-0x000000001B400000-0x000000001B410000-memory.dmp
        Filesize

        64KB

      • memory/2964-113-0x000000001DCD0000-0x000000001DDDA000-memory.dmp
        Filesize

        1.0MB

      • memory/2964-118-0x000000001B400000-0x000000001B410000-memory.dmp
        Filesize

        64KB

      • memory/2964-115-0x000000001DC00000-0x000000001DC3C000-memory.dmp
        Filesize

        240KB

      • memory/2964-114-0x000000001B3E0000-0x000000001B3F2000-memory.dmp
        Filesize

        72KB

      • memory/2964-176-0x000000001B400000-0x000000001B410000-memory.dmp
        Filesize

        64KB

      • memory/2964-167-0x00007FFCFB590000-0x00007FFCFC052000-memory.dmp
        Filesize

        10.8MB

      • memory/2964-120-0x000000001DC60000-0x000000001DC7E000-memory.dmp
        Filesize

        120KB

      • memory/2964-130-0x000000001E730000-0x000000001E8F2000-memory.dmp
        Filesize

        1.8MB

      • memory/2964-111-0x000000001B400000-0x000000001B410000-memory.dmp
        Filesize

        64KB

      • memory/2964-110-0x00007FFCFB590000-0x00007FFCFC052000-memory.dmp
        Filesize

        10.8MB

      • memory/2964-133-0x000000001EF90000-0x000000001F4B8000-memory.dmp
        Filesize

        5.2MB

      • memory/2964-119-0x000000001E2E0000-0x000000001E356000-memory.dmp
        Filesize

        472KB

      • memory/2964-109-0x0000000000710000-0x000000000079C000-memory.dmp
        Filesize

        560KB

      • memory/3040-2-0x0000000000A90000-0x0000000000F54000-memory.dmp
        Filesize

        4.8MB

      • memory/3040-7-0x0000000004D80000-0x0000000004D81000-memory.dmp
        Filesize

        4KB

      • memory/3040-9-0x0000000004E10000-0x0000000004E11000-memory.dmp
        Filesize

        4KB

      • memory/3040-5-0x0000000004DA0000-0x0000000004DA1000-memory.dmp
        Filesize

        4KB

      • memory/3040-8-0x0000000004D90000-0x0000000004D91000-memory.dmp
        Filesize

        4KB

      • memory/3040-4-0x0000000004DC0000-0x0000000004DC1000-memory.dmp
        Filesize

        4KB

      • memory/3040-3-0x0000000004DB0000-0x0000000004DB1000-memory.dmp
        Filesize

        4KB

      • memory/3040-1-0x0000000077A16000-0x0000000077A18000-memory.dmp
        Filesize

        8KB

      • memory/3040-0-0x0000000000A90000-0x0000000000F54000-memory.dmp
        Filesize

        4.8MB

      • memory/3040-10-0x0000000004E00000-0x0000000004E01000-memory.dmp
        Filesize

        4KB

      • memory/3040-15-0x0000000000A90000-0x0000000000F54000-memory.dmp
        Filesize

        4.8MB

      • memory/3040-6-0x0000000004DE0000-0x0000000004DE1000-memory.dmp
        Filesize

        4KB

      • memory/3080-164-0x00007FFCFB590000-0x00007FFCFC052000-memory.dmp
        Filesize

        10.8MB

      • memory/3080-169-0x000001F6D2120000-0x000001F6D212A000-memory.dmp
        Filesize

        40KB

      • memory/3080-175-0x00007FFCFB590000-0x00007FFCFC052000-memory.dmp
        Filesize

        10.8MB

      • memory/3080-168-0x000001F6D2140000-0x000001F6D2152000-memory.dmp
        Filesize

        72KB

      • memory/3080-163-0x000001F6D2090000-0x000001F6D20B2000-memory.dmp
        Filesize

        136KB

      • memory/3080-165-0x000001F6B81B0000-0x000001F6B81C0000-memory.dmp
        Filesize

        64KB

      • memory/3080-166-0x000001F6B81B0000-0x000001F6B81C0000-memory.dmp
        Filesize

        64KB

      • memory/3172-112-0x0000000002930000-0x0000000004930000-memory.dmp
        Filesize

        32.0MB

      • memory/3172-57-0x00000000002A0000-0x000000000031A000-memory.dmp
        Filesize

        488KB

      • memory/3172-58-0x00000000733D0000-0x0000000073B81000-memory.dmp
        Filesize

        7.7MB

      • memory/3172-62-0x0000000004E90000-0x0000000004EA0000-memory.dmp
        Filesize

        64KB

      • memory/3172-66-0x00000000733D0000-0x0000000073B81000-memory.dmp
        Filesize

        7.7MB

      • memory/3172-67-0x0000000002930000-0x0000000004930000-memory.dmp
        Filesize

        32.0MB

      • memory/4104-82-0x00000000061E0000-0x00000000067F8000-memory.dmp
        Filesize

        6.1MB

      • memory/4104-69-0x00000000733D0000-0x0000000073B81000-memory.dmp
        Filesize

        7.7MB

      • memory/4104-84-0x0000000007AC0000-0x0000000007AD2000-memory.dmp
        Filesize

        72KB

      • memory/4104-83-0x0000000007B90000-0x0000000007C9A000-memory.dmp
        Filesize

        1.0MB

      • memory/4104-81-0x0000000005070000-0x0000000005080000-memory.dmp
        Filesize

        64KB

      • memory/4104-79-0x0000000004E40000-0x0000000004E4A000-memory.dmp
        Filesize

        40KB

      • memory/4104-70-0x0000000004E80000-0x0000000004F12000-memory.dmp
        Filesize

        584KB

      • memory/4104-117-0x00000000733D0000-0x0000000073B81000-memory.dmp
        Filesize

        7.7MB

      • memory/4104-68-0x0000000005390000-0x0000000005936000-memory.dmp
        Filesize

        5.6MB

      • memory/4104-85-0x0000000007B20000-0x0000000007B5C000-memory.dmp
        Filesize

        240KB

      • memory/4104-86-0x0000000007CA0000-0x0000000007CEC000-memory.dmp
        Filesize

        304KB

      • memory/4104-63-0x0000000000400000-0x0000000000450000-memory.dmp
        Filesize

        320KB

      • memory/4104-87-0x00000000085B0000-0x0000000008616000-memory.dmp
        Filesize

        408KB

      • memory/4104-135-0x0000000005070000-0x0000000005080000-memory.dmp
        Filesize

        64KB

      • memory/4104-88-0x00000000088B0000-0x0000000008900000-memory.dmp
        Filesize

        320KB