Analysis

  • max time kernel
    294s
  • max time network
    285s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29-07-2024 05:01

General

  • Target

    2ba07be231761eec14d70ee50bd11356d632cacdbd5901d6713289cd9512d50b.exe

  • Size

    1.8MB

  • MD5

    3e4e8517cd4fcfad4e3d0d2c1373d5ef

  • SHA1

    c0a88abdd618e5cec8c18b5d7031d8565d1aa966

  • SHA256

    2ba07be231761eec14d70ee50bd11356d632cacdbd5901d6713289cd9512d50b

  • SHA512

    8f737d5334ac9839ca8696a6782403f7ef0919b69d9069d84739f9d9849a25cf9902fbce303138151af749f27959da204da60de13d9186a8b90596d6bc7f6848

  • SSDEEP

    49152:Oy+VflhoqhnjNnpOPxVe0i6Qe7iZ9fx54Hk1QXPO0:xulZhnj9wo0fQe7iZ9fxMk1eO

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

redline

Botnet

25072023

C2

185.215.113.67:40960

Extracted

Family

redline

Botnet

Logs

C2

185.215.113.9:9137

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Monster Stealer. 2 IoCs
  • Monster

    Monster is a Golang stealer that was discovered in 2024.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 14 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 39 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Detects Pyinstaller 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ba07be231761eec14d70ee50bd11356d632cacdbd5901d6713289cd9512d50b.exe
    "C:\Users\Admin\AppData\Local\Temp\2ba07be231761eec14d70ee50bd11356d632cacdbd5901d6713289cd9512d50b.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Users\Admin\AppData\Local\Temp\1000001001\build.exe
        "C:\Users\Admin\AppData\Local\Temp\1000001001\build.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1660
        • C:\Users\Admin\AppData\Local\Temp\onefile_1660_133667029431322000\stub.exe
          "C:\Users\Admin\AppData\Local\Temp\1000001001\build.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1720
      • C:\Users\Admin\AppData\Local\Temp\1000002001\crypted.exe
        "C:\Users\Admin\AppData\Local\Temp\1000002001\crypted.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1712
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1712 -s 108
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:632
      • C:\Users\Admin\AppData\Local\Temp\1000003001\5447jsX.exe
        "C:\Users\Admin\AppData\Local\Temp\1000003001\5447jsX.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2036
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 64
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2900
      • C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe
        "C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1640
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 64
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1292
      • C:\Users\Admin\AppData\Local\Temp\1000005001\2.exe
        "C:\Users\Admin\AppData\Local\Temp\1000005001\2.exe"
        3⤵
        • Executes dropped EXE
        PID:1856
      • C:\Users\Admin\AppData\Local\Temp\1000009001\25072023.exe
        "C:\Users\Admin\AppData\Local\Temp\1000009001\25072023.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1624
      • C:\Users\Admin\AppData\Local\Temp\1000010001\pered.exe
        "C:\Users\Admin\AppData\Local\Temp\1000010001\pered.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3040
        • C:\Users\Admin\AppData\Local\Temp\1000010001\pered.exe
          "C:\Users\Admin\AppData\Local\Temp\1000010001\pered.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2112
      • C:\Users\Admin\AppData\Local\Temp\1000012001\2020.exe
        "C:\Users\Admin\AppData\Local\Temp\1000012001\2020.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2716
        • C:\Users\Admin\AppData\Local\Temp\1000012001\2020.exe
          "C:\Users\Admin\AppData\Local\Temp\1000012001\2020.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2332
      • C:\Users\Admin\AppData\Local\Temp\1000027001\buildred.exe
        "C:\Users\Admin\AppData\Local\Temp\1000027001\buildred.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2340
      • C:\Users\Admin\AppData\Local\Temp\1000036001\Authenticator.exe
        "C:\Users\Admin\AppData\Local\Temp\1000036001\Authenticator.exe"
        3⤵
        • Executes dropped EXE
        PID:1968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1000001001\build.exe

    Filesize

    10.7MB

    MD5

    c8cf26425a6ce325035e6da8dfb16c4e

    SHA1

    31c2b3a26c05b4bf8dea8718d1df13a0c2be22ee

    SHA256

    9f7be9bf913d8378f094b3f6416db9aa4c80c380000202f7cfaddadb6efc41b4

    SHA512

    0321e48e185c22165ac6429e08afac1ccfdf393249436c8eac8a6d64794b3b399740aa5b2be23d568f57495d17e9220280ed1c2ea8f012b2c4021beb02cbc646

  • C:\Users\Admin\AppData\Local\Temp\1000002001\crypted.exe

    Filesize

    944KB

    MD5

    371d606aa2fcd2945d84a13e598da55f

    SHA1

    0f8f19169f79b3933d225a2702dc51f906de4dcd

    SHA256

    59c6d955b28461cd8d1f8f8c9a97d4f7a2e741dd62c69e67f0b71ecb3f7f040a

    SHA512

    01c5b0afd03518406fa452cbb79d452865c6daf0140f32ad4b78e51a0b786f6c19bba46a4d017dcdcc37d6edf828f0c87249964440e2abbfb42a437e1cfd91a4

  • C:\Users\Admin\AppData\Local\Temp\1000003001\5447jsX.exe

    Filesize

    392KB

    MD5

    5dd9c1ffc4a95d8f1636ce53a5d99997

    SHA1

    38ae8bf6a0891b56ef5ff0c1476d92cecae34b83

    SHA256

    d695267de534c2c99ec2823acc193fdbec9f398b0f78155ae2b982457ff631aa

    SHA512

    148d1b324391c4bb63b152a3c91a586b6821c4f5cde2a3f7afa56ad92074672619554fba3b2baca9802ff1ed9b42081574163304d450f7ccf664638599b23c2a

  • C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe

    Filesize

    1.4MB

    MD5

    04e90b2cf273efb3f6895cfcef1e59ba

    SHA1

    79afcc39db33426ee8b97ad7bfb48f3f2e4c3449

    SHA256

    e015f535c8a9fab72f2e06863c559108b1a25af90468cb9f80292c3ba2c33f6e

    SHA512

    72aa08242507f6dd39822a34c68d6185927f6772a3fc03a0850d7c8542b21a43e176f29e5fbb3a4e54bc02fa68c807a01091158ef68c5a2f425cc432c95ea555

  • C:\Users\Admin\AppData\Local\Temp\1000005001\2.exe

    Filesize

    268KB

    MD5

    0cfbd964c7a770b205c37e167d041740

    SHA1

    e36595a435fda01b5f9340ec9dd54b382f9c06dc

    SHA256

    8a0f1bf4f7bd77f8b750140a1432f04649e07338de23d6a0e108df4776d9801c

    SHA512

    1acff3c629b9b54ee32a651c36e980d3a8b406f9b58a6230fdbd822e6532fb3d65d0359625701c211c0727759623d230df94305793db461b17461c0975713b75

  • C:\Users\Admin\AppData\Local\Temp\1000009001\25072023.exe

    Filesize

    304KB

    MD5

    a9a37926c6d3ab63e00b12760fae1e73

    SHA1

    944d6044e111bbad742d06852c3ed2945dc9e051

    SHA256

    27955c80c620c31df686ccd2a92bce1d07e97c16fda6bd141812e9b0bdd7b06b

    SHA512

    575485d1c53b1bf145c7385940423b16089cf9ab75404e2e9c7af42b594480470f0e28dadcddbd66e4cd469e45326a6eb4eb2362ccc37edb2a956d224e04cf97

  • C:\Users\Admin\AppData\Local\Temp\1000010001\pered.exe

    Filesize

    10.9MB

    MD5

    faf1270013c6935ae2edaf8e2c2b2c08

    SHA1

    d9a44759cd449608589b8f127619d422ccb40afa

    SHA256

    1011889e66c56fd137bf85b832c4afc1fd054222b2fcbaae6608836d27e8f840

    SHA512

    4a9ca18f796d4876effc5692cfeb7ce6d1cffdd2541b68753f416d2b0a7eff87588bc05793145a2882fc62a48512a862fa42826761022fed1696c20864c89098

  • C:\Users\Admin\AppData\Local\Temp\1000012001\2020.exe

    Filesize

    12.3MB

    MD5

    95606667ac40795394f910864b1f8cc4

    SHA1

    e7de36b5e85369d55a948bedb2391f8fae2da9cf

    SHA256

    6f2964216c81a6f67309680b7590dfd4df31a19c7fc73917fa8057b9a194b617

    SHA512

    fab43d361900a8d7f1a17c51455d4eedbbd3aec23d11cdb92ec1fb339fc018701320f18a2a6b63285aaafafea30fa614777d30cdf410ffd7698a48437760a142

  • C:\Users\Admin\AppData\Local\Temp\1000027001\buildred.exe

    Filesize

    304KB

    MD5

    4e0235942a9cde99ee2ee0ee1a736e4f

    SHA1

    d084d94df2502e68ee0443b335dd621cd45e2790

    SHA256

    a0d7bc2ccf07af7960c580fd43928b5fb02b901f9962eafb10f607e395759306

    SHA512

    cfc4b7d58f662ee0789349b38c1dec0c4e6dc1d2e660f5d92f8566d49c4850b2bf1d70e43edf84db7b21cb8e316e8bcc3e20b797e32d9668c69a029b15804e3f

  • C:\Users\Admin\AppData\Local\Temp\1000036001\Authenticator.exe

    Filesize

    11.0MB

    MD5

    dae181fa127103fdc4ee4bf67117ecfb

    SHA1

    02ce95a71cadd1fd45351690dc5e852bec553f85

    SHA256

    f18afd984df441d642187620e435e8b227c0e31d407f82a67c6c8b36f94bd980

    SHA512

    d2abe0aec817cede08c406b65b3d6f2c6930599ead28ea828c29d246e971165e3af655a10724ca3c537e70fe5c248cdc01567ed5a0922b183a9531b126368e3f

  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

    Filesize

    1.8MB

    MD5

    3e4e8517cd4fcfad4e3d0d2c1373d5ef

    SHA1

    c0a88abdd618e5cec8c18b5d7031d8565d1aa966

    SHA256

    2ba07be231761eec14d70ee50bd11356d632cacdbd5901d6713289cd9512d50b

    SHA512

    8f737d5334ac9839ca8696a6782403f7ef0919b69d9069d84739f9d9849a25cf9902fbce303138151af749f27959da204da60de13d9186a8b90596d6bc7f6848

  • C:\Users\Admin\AppData\Local\Temp\Tmp5542.tmp

    Filesize

    2KB

    MD5

    1420d30f964eac2c85b2ccfe968eebce

    SHA1

    bdf9a6876578a3e38079c4f8cf5d6c79687ad750

    SHA256

    f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

    SHA512

    6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

  • C:\Users\Admin\AppData\Local\Temp\_MEI27162\python311.dll

    Filesize

    5.5MB

    MD5

    86e0ad6ba8a9052d1729db2c015daf1c

    SHA1

    48112072903fff2ec5726cca19cc09e42d6384c7

    SHA256

    5ecda62f6fd2822355c560412f6d90be46a7f763f0ffeec9854177904632ac2d

    SHA512

    5d6e32f9ff90a9a584183dad1583aea2327b4aea32184b0ebbec3df41b0b833e6bb3cd40822dd64d1033125f52255812b17e4fa0add38fcda6bab1724dfaa2eb

  • C:\Users\Admin\AppData\Local\Temp\_MEI30402\api-ms-win-core-file-l2-1-0.dll

    Filesize

    14KB

    MD5

    afb7cd2310f1c2a3a5a1cc7736697487

    SHA1

    d435168703dba9a2b6e955a1332111687a4d09d7

    SHA256

    2e75641d7330b804c3cc6ef682306d2b0f89c4358dac3e1376b5fb2ebd6e2838

    SHA512

    3a05ff62f4c2cd71d5ecd5732c9d3f8ef91077a056e4082530fed64409b26cab7f4617e03ca65faf1738faffec49f2de65f0f082cbbda1b12bdd07b85b985c26

  • C:\Users\Admin\AppData\Local\Temp\_MEI30402\api-ms-win-core-processthreads-l1-1-1.dll

    Filesize

    15KB

    MD5

    5fbb3fc0ca37ed94744d6af8638b7c9a

    SHA1

    09415405267ee64c92e0fd43ead7dbfe2f028647

    SHA256

    4c0ba89e487ec98966cc0b68bdeb07bbeb958f3a4ad866382a4185baf31f9041

    SHA512

    150d318ef5480d9f0e23ee23ae5ba7eb070996e4cae0746d6a5ba53b716ecfbc694ad8044e4aa7d7dc16984b2af26f01e5ca6f665ac73c878f6a18fc60364453

  • C:\Users\Admin\AppData\Local\Temp\_MEI30402\ucrtbase.dll

    Filesize

    964KB

    MD5

    cd7a487bb5ca20005a81402eee883569

    SHA1

    f427aaf18b53311a671e60b94bd897a904699d19

    SHA256

    f4723261c04974542a2c618fe58f4995f2dcaf6996656bb027d65adeeca6caf7

    SHA512

    24da7a345429f2bc7a1b1e230f2d4400b8d57ecdf822d87d63fd4db0aed888b3ea3e98f8cb3f5b83986bfb846c1bd6eac2ac9382caba267c6ceca6ee77d79417

  • C:\Users\Admin\AppData\Local\Temp\onefile_1660_133667029431322000\python310.dll

    Filesize

    4.3MB

    MD5

    c80b5cb43e5fe7948c3562c1fff1254e

    SHA1

    f73cb1fb9445c96ecd56b984a1822e502e71ab9d

    SHA256

    058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20

    SHA512

    faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81

  • C:\Users\Admin\AppData\Local\Temp\onefile_1660_133667029431322000\stub.exe

    Filesize

    18.0MB

    MD5

    1cf17408048317fc82265ed6a1c7893d

    SHA1

    9bfec40d6eb339c5a6c2ad6e5fa7cebc147654c5

    SHA256

    1352ad9860a42137b096d9675a7b8d578fbc596d965de3cb352619cbe6aaf4e9

    SHA512

    66322d7cb5931017acaa29970da48642d03ce35007f130511b2848b67169c1dd4167f1e5a31e5e1dfe5f7122846482bdb878b5cd695ac58009033fd620813a0f

  • C:\Users\Public\Desktop\Google Chrome.lnk

    Filesize

    2KB

    MD5

    61c364d59bcd93c689e92013bae8f0c7

    SHA1

    1a0640647c1c3a48b0d5df3a8de36ff3646a7ee5

    SHA256

    c05bedefb25c3049260c7623e41d81b7f8c22cee295b3d99aded27faa52b9cf3

    SHA512

    b4658999924d6d2dd8f1617ffbfbacc3cedb71fddcc35259b0b695f629b2518d1cc3e8fa2c9204baca1f591c984b5314ac6a11cec83dcb48d21c3188702a984b

  • \Users\Admin\AppData\Local\Temp\_MEI30402\api-ms-win-core-file-l1-2-0.dll

    Filesize

    14KB

    MD5

    fb8b3af45dca952911937032195294b8

    SHA1

    d4acbd029249c205a3c241731738a7b6ea07e685

    SHA256

    4b0f7c14614724b0a54d236efa2f346dcc0bc37d995503c54ff630a7d20c7883

    SHA512

    e53486631886a4b9e2470b7409bad5c160946912c999df2180c313f052877c58b7574d73ec901db8a53c3663fd59cb36010842fd9ed7fafb64ab786ab4058a7f

  • \Users\Admin\AppData\Local\Temp\_MEI30402\api-ms-win-core-localization-l1-2-0.dll

    Filesize

    17KB

    MD5

    0f38dd38b314e7e7ada9f09506d9df32

    SHA1

    5c83750cf4aea5293d704df043f505ea4d05e239

    SHA256

    5f3dc66fb6ed58b324512c57ef781d1092c1c2ae7e0cb5d287907f9b4bb77248

    SHA512

    c80dfdf3a3eeefacf631f31691aec278d01b08b4c2ec151d3eeef2256c37202ff6aad363f872e7f9d8b969663db72f213f68e3d4e709a2df39fce643689d1604

  • \Users\Admin\AppData\Local\Temp\_MEI30402\api-ms-win-core-timezone-l1-1-0.dll

    Filesize

    14KB

    MD5

    683d6579333e3973206b54af6be2c5ea

    SHA1

    e9aebf6246633ead1750acbfaae4fdd6f767bec9

    SHA256

    c446925083f68506717f84e9303d1ac9394bd32c1d98087784499f103617f1d2

    SHA512

    858f87f00a28cf66215298673bbb8b4ef24ef7a160b932dfed421d4c5d78f469aea0c712d97cf154a264425137a25651d230a4137e1c6bdd4992096acf8370c7

  • memory/1624-218-0x0000000000EC0000-0x0000000000F12000-memory.dmp

    Filesize

    328KB

  • memory/1660-142-0x000000013FD00000-0x00000001407D8000-memory.dmp

    Filesize

    10.8MB

  • memory/1660-212-0x000000013FD00000-0x00000001407D8000-memory.dmp

    Filesize

    10.8MB

  • memory/1720-164-0x000000013FBC0000-0x0000000140DFE000-memory.dmp

    Filesize

    18.2MB

  • memory/1812-5-0x0000000001180000-0x000000000162B000-memory.dmp

    Filesize

    4.7MB

  • memory/1812-3-0x0000000001180000-0x000000000162B000-memory.dmp

    Filesize

    4.7MB

  • memory/1812-2-0x0000000001181000-0x00000000011AF000-memory.dmp

    Filesize

    184KB

  • memory/1812-1-0x0000000076EB0000-0x0000000076EB2000-memory.dmp

    Filesize

    8KB

  • memory/1812-0-0x0000000001180000-0x000000000162B000-memory.dmp

    Filesize

    4.7MB

  • memory/1812-9-0x0000000001180000-0x000000000162B000-memory.dmp

    Filesize

    4.7MB

  • memory/1812-11-0x0000000001180000-0x000000000162B000-memory.dmp

    Filesize

    4.7MB

  • memory/1812-17-0x0000000001180000-0x000000000162B000-memory.dmp

    Filesize

    4.7MB

  • memory/1856-217-0x0000000000400000-0x000000000282D000-memory.dmp

    Filesize

    36.2MB

  • memory/1968-543-0x0000000140000000-0x00000001402FB000-memory.dmp

    Filesize

    3.0MB

  • memory/1968-554-0x0000000140000000-0x00000001402FB000-memory.dmp

    Filesize

    3.0MB

  • memory/1968-553-0x0000000000400000-0x0000000000F06000-memory.dmp

    Filesize

    11.0MB

  • memory/1968-546-0x0000000140000000-0x00000001402FB000-memory.dmp

    Filesize

    3.0MB

  • memory/1968-541-0x0000000140000000-0x00000001402FB000-memory.dmp

    Filesize

    3.0MB

  • memory/1968-540-0x0000000140000000-0x00000001402FB000-memory.dmp

    Filesize

    3.0MB

  • memory/1968-542-0x0000000140000000-0x00000001402FB000-memory.dmp

    Filesize

    3.0MB

  • memory/1968-544-0x0000000140000000-0x00000001402FB000-memory.dmp

    Filesize

    3.0MB

  • memory/1968-537-0x0000000140000000-0x00000001402FB000-memory.dmp

    Filesize

    3.0MB

  • memory/1968-539-0x0000000140000000-0x00000001402FB000-memory.dmp

    Filesize

    3.0MB

  • memory/1968-538-0x0000000140000000-0x00000001402FB000-memory.dmp

    Filesize

    3.0MB

  • memory/1968-531-0x0000000140000000-0x00000001402FB000-memory.dmp

    Filesize

    3.0MB

  • memory/2340-466-0x00000000003F0000-0x0000000000442000-memory.dmp

    Filesize

    328KB

  • memory/2800-130-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-545-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-479-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-101-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-518-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-24-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-19-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-134-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-334-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-143-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-22-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-20-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-213-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-215-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-52-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-23-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-214-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-18-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-232-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-570-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-571-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-572-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-573-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-574-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-575-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-576-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-577-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-578-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-579-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-580-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-581-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB

  • memory/2800-582-0x00000000010A0000-0x000000000154B000-memory.dmp

    Filesize

    4.7MB