Analysis

  • max time kernel
    145s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/08/2024, 22:02

General

  • Target

    c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5.exe

  • Size

    1.8MB

  • MD5

    7cf1f4552c8145f13d37d55125dc99cb

  • SHA1

    f76cd17dc7e085f3952718694e97091d1b8fc8a3

  • SHA256

    c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5

  • SHA512

    34a94e2c31549687eb55cefc0693d2177d90ad193f93a93241c2364fef9056926ee595acdbdde2ff527d3041118725485bb2c1e0610332f7fc2b171eafdb1362

  • SSDEEP

    24576:lJC31PpNWSdM1LliCaxIsg9otM2/s6glLBHPpOSY47zfS1SbNh4etIqZLxeBY+YG:QyciliJGF9o/sB3x1rVNh4eJsPTwG

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

20.52.165.210:39030

Extracted

Family

redline

C2

185.215.113.67:21405

Extracted

Family

stealc

Botnet

default

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

redline

Botnet

BUY TG @FATHEROFCARDERS

C2

45.66.231.214:9932

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 16 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5.exe
    "C:\Users\Admin\AppData\Local\Temp\c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4204
    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:388
      • C:\Users\Admin\AppData\Local\Temp\1000002001\GOLD.exe
        "C:\Users\Admin\AppData\Local\Temp\1000002001\GOLD.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3860
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1952
      • C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe
        "C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4020
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1380
          • C:\Users\Admin\AppData\Roaming\AUMOkr0Tag.exe
            "C:\Users\Admin\AppData\Roaming\AUMOkr0Tag.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2088
          • C:\Users\Admin\AppData\Roaming\svxykjkMcQ.exe
            "C:\Users\Admin\AppData\Roaming\svxykjkMcQ.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2588
      • C:\Users\Admin\AppData\Local\Temp\1000005001\newalp.exe
        "C:\Users\Admin\AppData\Local\Temp\1000005001\newalp.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4580
        • C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe
          "C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3020
      • C:\Users\Admin\AppData\Local\Temp\1000050001\06082025.exe
        "C:\Users\Admin\AppData\Local\Temp\1000050001\06082025.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4036
        • C:\Users\Admin\AppData\Local\Temp\5555.exe
          "C:\Users\Admin\AppData\Local\Temp\5555.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          PID:324
      • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default.exe
        "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:4052
      • C:\Users\Admin\AppData\Local\Temp\1000069001\FILE2233.exe
        "C:\Users\Admin\AppData\Local\Temp\1000069001\FILE2233.exe"
        3⤵
        • Executes dropped EXE
        PID:5060
      • C:\Users\Admin\AppData\Local\Temp\1000090001\MYNEWRDX.exe
        "C:\Users\Admin\AppData\Local\Temp\1000090001\MYNEWRDX.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4332
  • C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe
    C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe
    1⤵
    • Executes dropped EXE
    PID:2648
  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
    C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:4508
  • C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe
    C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe
    1⤵
    • Executes dropped EXE
    PID:2152
  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
    C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:796

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\mozglue.dll

          Filesize

          593KB

          MD5

          c8fd9be83bc728cc04beffafc2907fe9

          SHA1

          95ab9f701e0024cedfbd312bcfe4e726744c4f2e

          SHA256

          ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

          SHA512

          fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

        • C:\ProgramData\nss3.dll

          Filesize

          2.0MB

          MD5

          1cc453cdf74f31e4d913ff9c10acdde2

          SHA1

          6e85eae544d6e965f15fa5c39700fa7202f3aafe

          SHA256

          ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

          SHA512

          dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

        • C:\Users\Admin\AppData\Local\Temp\1000002001\GOLD.exe

          Filesize

          954KB

          MD5

          e71c0c5d72455dde6510ba23552d7d2f

          SHA1

          4dff851c07a9f9ebc9e71b7f675cc20b06a2439c

          SHA256

          de1d7fe86a0b70a7a268d2960109833f4d126d5d9e3acb36697e8ff59c56017f

          SHA512

          c6f4b1eb353a554ca49bab5e894a4d7c46e2674d32f2f0d5a9231400d14a9ea5604c079193cd0bed9fea409bb71b5779c0c03671e104cb0740fe8ade3e530ca6

        • C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe

          Filesize

          1.4MB

          MD5

          04e90b2cf273efb3f6895cfcef1e59ba

          SHA1

          79afcc39db33426ee8b97ad7bfb48f3f2e4c3449

          SHA256

          e015f535c8a9fab72f2e06863c559108b1a25af90468cb9f80292c3ba2c33f6e

          SHA512

          72aa08242507f6dd39822a34c68d6185927f6772a3fc03a0850d7c8542b21a43e176f29e5fbb3a4e54bc02fa68c807a01091158ef68c5a2f425cc432c95ea555

        • C:\Users\Admin\AppData\Local\Temp\1000005001\newalp.exe

          Filesize

          416KB

          MD5

          6093bb59e7707afe20ca2d9b80327b49

          SHA1

          fd599fa9d5ef5c980a445fc6c19efd1fcb80f2bc

          SHA256

          3acc0b21db1f774d15a1f1d8080aff0b8f83eefb70c5c673f1c6ed7b676cd6d3

          SHA512

          d28808686f73bcc13b8ad57c84585b9d55d1b6445807023897be45f229bcab89971fb320223772fa500a692ad0b6106eaa0b4cf35e807038a6050994106d18e1

        • C:\Users\Admin\AppData\Local\Temp\1000050001\06082025.exe

          Filesize

          304KB

          MD5

          0d76d08b0f0a404604e7de4d28010abc

          SHA1

          ef4270c06b84b0d43372c5827c807641a41f2374

          SHA256

          6dcda2619b61b0cafbfdebb7fbb82c8c2c0b3f9855a4306782874625d6ff067e

          SHA512

          979e0d3ec0dad1cc2acd5ec8b0a84a5161e46ee7a30f99d9a3ff3b7ce4eec7f5fa1f11fbe2a84267a7263e04434f4fc7fabc7858ef4c0b7667aeb6dcd3aa7165

        • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default.exe

          Filesize

          187KB

          MD5

          e78239a5b0223499bed12a752b893cad

          SHA1

          a429b46db791f433180ae4993ebb656d2f9393a4

          SHA256

          80befdb25413d68adbadd8f236a2e8c71b261d8befc04c99749e778b07bcde89

          SHA512

          cee5d5d4d32e5575852a412f6b3e17f8c0cbafe97fd92c7024934234a23c240dcc1f7a0452e2e5da949dec09dcfeb006e73862c5bbc549a2ab1cfb0241eaddfc

        • C:\Users\Admin\AppData\Local\Temp\1000069001\FILE2233.exe

          Filesize

          3.2MB

          MD5

          03fe60596aa8f9b633ac360fd9ec42d8

          SHA1

          1e7bc8d80c7a2a315639b09d332a549dc7ddcb4b

          SHA256

          e731f79ee3512fefe48e53b4424145efc6a1b2585220b9c6025038d5f1263055

          SHA512

          d6f080881874112c2876ed691a6c725ce0cc87196934fd8fa9ff488619c84e6e4a9c244c0840999b6a6cce95b4b7375648cf3011d79927e90a0c786895c0cfdf

        • C:\Users\Admin\AppData\Local\Temp\1000090001\MYNEWRDX.exe

          Filesize

          304KB

          MD5

          0f02da56dab4bc19fca05d6d93e74dcf

          SHA1

          a809c7e9c3136b8030727f128004aa2c31edc7a9

          SHA256

          e1d0fe3bada7fdec17d7279e6294731e2684399905f05e5a3449ba14542b1379

          SHA512

          522ec9042680a94a73cefa56e7902bacb166e23484f041c9e06dce033d3d16d13f7508f4d1e160c81198f61aa8c9a5aecfa62068150705ecf4803733f7e01ded

        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

          Filesize

          1.8MB

          MD5

          7cf1f4552c8145f13d37d55125dc99cb

          SHA1

          f76cd17dc7e085f3952718694e97091d1b8fc8a3

          SHA256

          c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5

          SHA512

          34a94e2c31549687eb55cefc0693d2177d90ad193f93a93241c2364fef9056926ee595acdbdde2ff527d3041118725485bb2c1e0610332f7fc2b171eafdb1362

        • C:\Users\Admin\AppData\Local\Temp\5555.exe

          Filesize

          547KB

          MD5

          8ecad7a38a26ac1fc2c7804afd0599fa

          SHA1

          587475e77012d412fd96213f048b2fb2d5d405e9

          SHA256

          83f6f8c068cd5b4448b2525ee799f58aa5ad0ce40f901881eda105f6d6ed4661

          SHA512

          a5a2499fb2c5a7751f09c50032c2fcba1c2c87ad4c35910decf00d24d4d90e233fa383319d7ddd3537f3891a0db49240a9c2c81451192308280687015c8898d5

        • C:\Users\Admin\AppData\Roaming\AUMOkr0Tag.exe

          Filesize

          510KB

          MD5

          74e358f24a40f37c8ffd7fa40d98683a

          SHA1

          7a330075e6ea3d871eaeefcecdeb1d2feb2fc202

          SHA256

          0928c96b35cd4cc5887fb205731aa91eb68886b816bcc5ec151aeee81ce4f9a6

          SHA512

          1525e07712c35111b56664e1589b1db37965995cc8e6d9b6f931fa38b0aa8e8347fc08b870d03573d10f0d597a2cd9db2598845c82b6c085f0df04f2a3b46eaf

        • C:\Users\Admin\AppData\Roaming\svxykjkMcQ.exe

          Filesize

          503KB

          MD5

          2c2be38fb507206d36dddb3d03096518

          SHA1

          a16edb81610a080096376d998e5ddc3e4b54bbd6

          SHA256

          0c7173daaa5ad8dabe7a2cde6dbd0eee1ca790071443aa13b01a1e731053491e

          SHA512

          e436954d7d5b77feb32f200cc48cb01f94b449887443a1e75ebef2f6fa2139d989d65f5ea7a71f8562c3aae2fea4117efc87e8aae905e1ba466fbc8bb328b316

        • memory/324-301-0x00007FF660AA0000-0x00007FF660B2E000-memory.dmp

          Filesize

          568KB

        • memory/388-153-0x0000000000410000-0x00000000008B8000-memory.dmp

          Filesize

          4.7MB

        • memory/388-16-0x0000000000410000-0x00000000008B8000-memory.dmp

          Filesize

          4.7MB

        • memory/388-324-0x0000000000410000-0x00000000008B8000-memory.dmp

          Filesize

          4.7MB

        • memory/388-322-0x0000000000410000-0x00000000008B8000-memory.dmp

          Filesize

          4.7MB

        • memory/388-320-0x0000000000410000-0x00000000008B8000-memory.dmp

          Filesize

          4.7MB

        • memory/388-318-0x0000000000410000-0x00000000008B8000-memory.dmp

          Filesize

          4.7MB

        • memory/388-316-0x0000000000410000-0x00000000008B8000-memory.dmp

          Filesize

          4.7MB

        • memory/388-310-0x0000000000410000-0x00000000008B8000-memory.dmp

          Filesize

          4.7MB

        • memory/388-308-0x0000000000410000-0x00000000008B8000-memory.dmp

          Filesize

          4.7MB

        • memory/388-62-0x0000000000410000-0x00000000008B8000-memory.dmp

          Filesize

          4.7MB

        • memory/388-306-0x0000000000410000-0x00000000008B8000-memory.dmp

          Filesize

          4.7MB

        • memory/388-304-0x0000000000410000-0x00000000008B8000-memory.dmp

          Filesize

          4.7MB

        • memory/388-302-0x0000000000410000-0x00000000008B8000-memory.dmp

          Filesize

          4.7MB

        • memory/388-300-0x0000000000410000-0x00000000008B8000-memory.dmp

          Filesize

          4.7MB

        • memory/388-288-0x0000000000410000-0x00000000008B8000-memory.dmp

          Filesize

          4.7MB

        • memory/388-22-0x0000000000410000-0x00000000008B8000-memory.dmp

          Filesize

          4.7MB

        • memory/388-21-0x0000000000410000-0x00000000008B8000-memory.dmp

          Filesize

          4.7MB

        • memory/388-220-0x0000000000410000-0x00000000008B8000-memory.dmp

          Filesize

          4.7MB

        • memory/388-20-0x0000000000410000-0x00000000008B8000-memory.dmp

          Filesize

          4.7MB

        • memory/388-221-0x0000000000410000-0x00000000008B8000-memory.dmp

          Filesize

          4.7MB

        • memory/388-19-0x0000000000411000-0x000000000043F000-memory.dmp

          Filesize

          184KB

        • memory/796-314-0x0000000000410000-0x00000000008B8000-memory.dmp

          Filesize

          4.7MB

        • memory/796-313-0x0000000000410000-0x00000000008B8000-memory.dmp

          Filesize

          4.7MB

        • memory/1380-131-0x0000000000400000-0x0000000000536000-memory.dmp

          Filesize

          1.2MB

        • memory/1380-93-0x0000000000400000-0x0000000000536000-memory.dmp

          Filesize

          1.2MB

        • memory/1380-92-0x0000000000400000-0x0000000000536000-memory.dmp

          Filesize

          1.2MB

        • memory/1380-90-0x0000000000400000-0x0000000000536000-memory.dmp

          Filesize

          1.2MB

        • memory/1380-89-0x0000000000400000-0x0000000000536000-memory.dmp

          Filesize

          1.2MB

        • memory/1952-38-0x0000000000400000-0x0000000000452000-memory.dmp

          Filesize

          328KB

        • memory/1952-164-0x0000000006200000-0x0000000006266000-memory.dmp

          Filesize

          408KB

        • memory/1952-41-0x00000000051E0000-0x00000000051EA000-memory.dmp

          Filesize

          40KB

        • memory/1952-225-0x0000000008BB0000-0x0000000008C00000-memory.dmp

          Filesize

          320KB

        • memory/1952-40-0x0000000005130000-0x00000000051C2000-memory.dmp

          Filesize

          584KB

        • memory/1952-42-0x0000000006740000-0x0000000006D58000-memory.dmp

          Filesize

          6.1MB

        • memory/1952-43-0x00000000080D0000-0x00000000081DA000-memory.dmp

          Filesize

          1.0MB

        • memory/1952-44-0x0000000007FE0000-0x0000000007FF2000-memory.dmp

          Filesize

          72KB

        • memory/1952-45-0x0000000008040000-0x000000000807C000-memory.dmp

          Filesize

          240KB

        • memory/1952-46-0x00000000081E0000-0x000000000822C000-memory.dmp

          Filesize

          304KB

        • memory/1952-39-0x00000000057B0000-0x0000000005D54000-memory.dmp

          Filesize

          5.6MB

        • memory/2088-251-0x0000000009AB0000-0x0000000009FDC000-memory.dmp

          Filesize

          5.2MB

        • memory/2088-250-0x00000000093B0000-0x0000000009572000-memory.dmp

          Filesize

          1.8MB

        • memory/2088-136-0x00000000002C0000-0x0000000000346000-memory.dmp

          Filesize

          536KB

        • memory/2588-137-0x0000000000190000-0x0000000000214000-memory.dmp

          Filesize

          528KB

        • memory/2588-234-0x0000000008AF0000-0x0000000008B66000-memory.dmp

          Filesize

          472KB

        • memory/2588-235-0x0000000007FB0000-0x0000000007FCE000-memory.dmp

          Filesize

          120KB

        • memory/4036-133-0x0000000000290000-0x00000000002E2000-memory.dmp

          Filesize

          328KB

        • memory/4052-154-0x0000000000850000-0x0000000000A93000-memory.dmp

          Filesize

          2.3MB

        • memory/4052-168-0x0000000061E00000-0x0000000061EF3000-memory.dmp

          Filesize

          972KB

        • memory/4052-284-0x0000000000850000-0x0000000000A93000-memory.dmp

          Filesize

          2.3MB

        • memory/4204-2-0x0000000000B41000-0x0000000000B6F000-memory.dmp

          Filesize

          184KB

        • memory/4204-3-0x0000000000B40000-0x0000000000FE8000-memory.dmp

          Filesize

          4.7MB

        • memory/4204-4-0x0000000000B40000-0x0000000000FE8000-memory.dmp

          Filesize

          4.7MB

        • memory/4204-0-0x0000000000B40000-0x0000000000FE8000-memory.dmp

          Filesize

          4.7MB

        • memory/4204-18-0x0000000000B40000-0x0000000000FE8000-memory.dmp

          Filesize

          4.7MB

        • memory/4204-1-0x0000000077C14000-0x0000000077C16000-memory.dmp

          Filesize

          8KB

        • memory/4332-249-0x0000000000890000-0x00000000008E2000-memory.dmp

          Filesize

          328KB

        • memory/4508-297-0x0000000000410000-0x00000000008B8000-memory.dmp

          Filesize

          4.7MB

        • memory/4508-289-0x0000000000410000-0x00000000008B8000-memory.dmp

          Filesize

          4.7MB

        • memory/5060-255-0x000001B6340A0000-0x000001B6340A6000-memory.dmp

          Filesize

          24KB

        • memory/5060-276-0x000001B6340B0000-0x000001B63410A000-memory.dmp

          Filesize

          360KB

        • memory/5060-219-0x000001B632430000-0x000001B63243A000-memory.dmp

          Filesize

          40KB