Analysis

  • max time kernel
    141s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-12-2024 09:58

General

  • Target

    4578d207fc6610750df1d6005c8e1ba3c00bdf9b89d8ac6d49bb4e6904729062.exe

  • Size

    1.8MB

  • MD5

    9e50d297946c37d3a1d1da00762d4e48

  • SHA1

    f7c1f6d79350183902532f4f74c55110099418b7

  • SHA256

    4578d207fc6610750df1d6005c8e1ba3c00bdf9b89d8ac6d49bb4e6904729062

  • SHA512

    e6a29fabdf67f7080513a2ef677e324f8c94817c9504ab020a034a9fa6ae12c7935963be490842ace30b458ff8d51a9229887ff3a8bdca1b80472cc80925f114

  • SSDEEP

    49152:o9I0TNAwTWApTxMORD1vKsBFsAjthoLj:x0pAoZSmFsAjtW

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 9 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 24 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4578d207fc6610750df1d6005c8e1ba3c00bdf9b89d8ac6d49bb4e6904729062.exe
    "C:\Users\Admin\AppData\Local\Temp\4578d207fc6610750df1d6005c8e1ba3c00bdf9b89d8ac6d49bb4e6904729062.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Users\Admin\AppData\Local\Temp\1005970001\chrome11.exe
        "C:\Users\Admin\AppData\Local\Temp\1005970001\chrome11.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1536
        • C:\Windows\System32\certutil.exe
          "C:\Windows\System32\certutil.exe" -silent -importPFX -p "" -f "C:\Users\Admin\AppData\Local\Temp\tmpD4DE.tmp"
          4⤵
            PID:2348
        • C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe
          "C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1444
          • C:\Users\Admin\AppData\Local\Temp\onefile_1444_133784711469740000\l4.exe
            C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2060
        • C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe
          "C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe"
          3⤵
          • Drops startup file
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1700
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 632
            4⤵
            • Loads dropped DLL
            • Program crash
            PID:4120
        • C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe
          "C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe"
          3⤵
          • Drops startup file
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5064
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5064 -s 632
            4⤵
            • Loads dropped DLL
            • Program crash
            PID:860
        • C:\Users\Admin\AppData\Local\Temp\1006141001\networkmanager.exe
          "C:\Users\Admin\AppData\Local\Temp\1006141001\networkmanager.exe"
          3⤵
          • Executes dropped EXE
          PID:4968
        • C:\Users\Admin\AppData\Local\Temp\1006192001\e4174b8c0b.exe
          "C:\Users\Admin\AppData\Local\Temp\1006192001\e4174b8c0b.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1752
        • C:\Users\Admin\AppData\Local\Temp\1006193001\6dfe352cad.exe
          "C:\Users\Admin\AppData\Local\Temp\1006193001\6dfe352cad.exe"
          3⤵
          • Modifies Windows Defender Real-time Protection settings
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Windows security modification
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3052

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1005970001\chrome11.exe

      Filesize

      4.5MB

      MD5

      5b39766f490f17925defaee5de2f9861

      SHA1

      9c89f2951c255117eb3eebcd61dbecf019a4c186

      SHA256

      de615656d7f80b5e01bc6a604a780245ca0ccefd920a6e2f1439bf27c02b7b7a

      SHA512

      d216fa45c98e423f15c2b52f980fc1c439d365b9799e5063e6b09837b419d197ba68d52ea7facf469eae38e531f17bd19eaf25d170465dc41217ca6ab9eb30bf

    • C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe

      Filesize

      5.9MB

      MD5

      d68f79c459ee4ae03b76fa5ba151a41f

      SHA1

      bfa641085d59d58993ba98ac9ee376f898ee5f7b

      SHA256

      aa50c900e210abb6be7d2420d9d5ae34c66818e0491aabd141421d175211fed6

      SHA512

      bd4ef3e3708df81d53b2e9050447032e8dcdcc776cf0353077310f208a30dab8f31d6ec6769d47fb6c05c642bdd7a58fb4f93d9d28e2de0efc01312fbc5e391e

    • C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe

      Filesize

      1.4MB

      MD5

      338cbbffa6028ee1a0beb3e7e6c4abd9

      SHA1

      bd008e415d2d85a124d33d455a2e2b0a0312be39

      SHA256

      1af9406ad522df70d8b59054cbdbef1a267fe199ab0ec1369523cdce9884bea6

      SHA512

      a8bb96d8ab47a3f57d5f1fc48c61392e9b28b379517cd12a468044d42a7ecdf9c099244d94784ff2411b358ea2272f8069a2fee2ea952b693ee460de0f689215

    • C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe

      Filesize

      1.4MB

      MD5

      6e7ffd057086e44e4fcc01846cd2b152

      SHA1

      05712e7e7b8429b2dd201ea504dc32fefe5795da

      SHA256

      fbc587e990949e428e8ce7a2c74dbf85cd63ffa07370756ad854595fea0033d7

      SHA512

      8cab1824b32c54273658d28738109c8a1ef3170c1fbe02deeee40d40990acb6d45431bfb65a3facebee9a919bd972734012b1e8de035b9c1329f1bd0e709ecd2

    • C:\Users\Admin\AppData\Local\Temp\1006141001\networkmanager.exe

      Filesize

      2.1MB

      MD5

      f8d528a37993ed91d2496bab9fc734d3

      SHA1

      4b66b225298f776e21f566b758f3897d20b23cad

      SHA256

      bc8458a8d78cf91129c84b153aafe8319410aacb8e14aec506897c8e0793ba02

      SHA512

      75dc1bbb1388f68d121bab26fc7f6bf9dc1226417ad7ed4a7b9718999aa0f9c891fed0db3c9ea6d6ccb34288cc848dc44b20ea83a30afd4ea2e99cff51f30f5a

    • C:\Users\Admin\AppData\Local\Temp\1006192001\e4174b8c0b.exe

      Filesize

      1.7MB

      MD5

      6731bd7e893f440a5f73edfd40b73112

      SHA1

      8e396ca101830e0116881c8d8c81c6d5e7918afe

      SHA256

      599399619509681016345f5e4e50f6edd38a70496201d1a9fbfe5c53d7f4690b

      SHA512

      d0247ad0a1392a9b622d08e22feee7d79854c8f1492f0b4d5d5e669f7efce409e3a3961f8229ebb40aca97ed6e36066b40393b3e9cb78d7356d34d530c125110

    • C:\Users\Admin\AppData\Local\Temp\1006193001\6dfe352cad.exe

      Filesize

      2.7MB

      MD5

      9aa3e28acbd0b5a2e045a6d513c93b6b

      SHA1

      9381e49745b0e1c2fab053f8d4d2a59bc61988f1

      SHA256

      2f1568be0dd8f9a154b003441a09464578fc012d81f60faab98f8ba9c1913898

      SHA512

      994aacaaafb7a60400aa05ad2524eac325b50b46109a75a71e2907e0dc08b5147ad7f63d308c72b92dc70d232335134815b461b00c18c722a365e6e0f8491471

    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

      Filesize

      1.8MB

      MD5

      9e50d297946c37d3a1d1da00762d4e48

      SHA1

      f7c1f6d79350183902532f4f74c55110099418b7

      SHA256

      4578d207fc6610750df1d6005c8e1ba3c00bdf9b89d8ac6d49bb4e6904729062

      SHA512

      e6a29fabdf67f7080513a2ef677e324f8c94817c9504ab020a034a9fa6ae12c7935963be490842ace30b458ff8d51a9229887ff3a8bdca1b80472cc80925f114

    • C:\Users\Admin\AppData\Local\Temp\TmpD422.tmp

      Filesize

      2KB

      MD5

      5b922b9b430d52708ffd7c4f9ae7fb2a

      SHA1

      10fa700bb7771186bf5cad1b18ae0949a66f9a5b

      SHA256

      91ac342b09947d76e5ac10794e57f09a916fa546bc2229a7796e9a9b95c5bae2

      SHA512

      17186baa3ad61b737f80580ed7b319de8d9fd0237c11634761038f11f4cc375ae70e4c36fe4753dc1ca0b3531d146e74b0dceb3e1465c4cae41ec02bcaeeb9e5

    • C:\Users\Admin\AppData\Local\Temp\onefile_1444_133784711469740000\l4.exe

      Filesize

      5.9MB

      MD5

      63c4e3f9c7383d039ab4af449372c17f

      SHA1

      f52ff760a098a006c41269ff73abb633b811f18e

      SHA256

      151524f6c1d1aeac530cfd69de15c3336043dc8eb3f5aeaa31513e24bfd7acdd

      SHA512

      dcfb4804c5569ad13e752270d13320f8769601b7092544741e35bc62a22af363b7a5ea7c5a65132c9575540a3e689a6946110502bd0f046385b8739e81761fbf

    • C:\Users\Admin\AppData\Local\Temp\onefile_1444_133784711469740000\python312.dll

      Filesize

      6.6MB

      MD5

      166cc2f997cba5fc011820e6b46e8ea7

      SHA1

      d6179213afea084f02566ea190202c752286ca1f

      SHA256

      c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546

      SHA512

      49d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb

    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\89DAB37C5E48326DB97DD43B0167A42CE5DF8C15

      Filesize

      1KB

      MD5

      0db5be0ec79017ee37b99d323ac2f4a4

      SHA1

      9a4e81d4bfe9a26bde6c733d3f223fca96b43547

      SHA256

      b0e8d393d1415c26c2b22ab0fb9e4bbec1584bf85caf55471dd2d28f24542c1b

      SHA512

      3e611d5e3f50f124b3ba6c943ab0c1bcbae8f1b7946672ecad459176a22ca0a29708ff1a17769dd08202e43ba004d9500b48f7777e728cc218ef85c9ab056947

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lbroker.vbs

      Filesize

      82B

      MD5

      107a610c004bfc1ebb8b87365b2c4600

      SHA1

      04695e838daaaf45d91f0b51868c8995b80d3392

      SHA256

      3a5be027d623c694cc4874fbb6cd2f434bbaf65033607f6d2acfc1d05c3f6fdc

      SHA512

      4b26a04ec889e149bf4fb974178990804d371d72b239c1d55c5acc32636cfd7ad02f8d21ed9e289358873242493303de25f2a0bca7d1b5da9b0426854ff4a2d2

    • \??\c:\users\admin\appdata\roaming\lbroker.exe

      Filesize

      1.4MB

      MD5

      495c1259248262162db242763cd67db8

      SHA1

      af4e854569d445b067b346408672b72b053055f5

      SHA256

      317127a1b0af48d4686101df29a8c4063c3934cd9485890467d00505ad1712b1

      SHA512

      5bd5e7dfc243c18b732f5666c8c7b570ff4f3832de7e8bf1126c4016562c2caad783a31841768958576ecf897dd1634271b08be78d1beac33d4b2a1c6f953853

    • memory/1536-38-0x0000000000A70000-0x0000000000F00000-memory.dmp

      Filesize

      4.6MB

    • memory/1700-165-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-139-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-2572-0x0000000000D60000-0x0000000000DB4000-memory.dmp

      Filesize

      336KB

    • memory/1700-1311-0x0000000000B10000-0x0000000000B5C000-memory.dmp

      Filesize

      304KB

    • memory/1700-1310-0x0000000000CD0000-0x0000000000D5A000-memory.dmp

      Filesize

      552KB

    • memory/1700-141-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-143-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-134-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-163-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-135-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-132-0x0000000000FB0000-0x000000000111A000-memory.dmp

      Filesize

      1.4MB

    • memory/1700-133-0x0000000004DB0000-0x0000000004EC8000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-155-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-159-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-193-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-189-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-187-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-185-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-183-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-181-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-179-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-177-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-175-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-173-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-171-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-170-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-167-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-191-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-161-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-157-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-153-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-151-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-149-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-147-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-145-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1700-137-0x0000000004DB0000-0x0000000004EC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1752-2544-0x00000000012B0000-0x0000000001940000-memory.dmp

      Filesize

      6.6MB

    • memory/1752-2547-0x00000000012B0000-0x0000000001940000-memory.dmp

      Filesize

      6.6MB

    • memory/2600-5-0x0000000001170000-0x0000000001620000-memory.dmp

      Filesize

      4.7MB

    • memory/2600-12-0x0000000001170000-0x0000000001620000-memory.dmp

      Filesize

      4.7MB

    • memory/2600-1-0x0000000077E10000-0x0000000077E12000-memory.dmp

      Filesize

      8KB

    • memory/2600-3-0x0000000001170000-0x0000000001620000-memory.dmp

      Filesize

      4.7MB

    • memory/2600-2-0x0000000001171000-0x000000000119F000-memory.dmp

      Filesize

      184KB

    • memory/2600-0-0x0000000001170000-0x0000000001620000-memory.dmp

      Filesize

      4.7MB

    • memory/2600-18-0x0000000001170000-0x0000000001620000-memory.dmp

      Filesize

      4.7MB

    • memory/2880-2545-0x0000000006960000-0x0000000006FF0000-memory.dmp

      Filesize

      6.6MB

    • memory/2880-73-0x0000000001300000-0x00000000017B0000-memory.dmp

      Filesize

      4.7MB

    • memory/2880-117-0x0000000001300000-0x00000000017B0000-memory.dmp

      Filesize

      4.7MB

    • memory/2880-21-0x0000000001301000-0x000000000132F000-memory.dmp

      Filesize

      184KB

    • memory/2880-2543-0x0000000006960000-0x0000000006FF0000-memory.dmp

      Filesize

      6.6MB

    • memory/2880-22-0x0000000001300000-0x00000000017B0000-memory.dmp

      Filesize

      4.7MB

    • memory/2880-2522-0x0000000006960000-0x00000000070DB000-memory.dmp

      Filesize

      7.5MB

    • memory/2880-2524-0x0000000006960000-0x00000000070DB000-memory.dmp

      Filesize

      7.5MB

    • memory/2880-2580-0x0000000006960000-0x0000000006C18000-memory.dmp

      Filesize

      2.7MB

    • memory/2880-72-0x0000000001300000-0x00000000017B0000-memory.dmp

      Filesize

      4.7MB

    • memory/2880-24-0x0000000001300000-0x00000000017B0000-memory.dmp

      Filesize

      4.7MB

    • memory/2880-40-0x0000000001300000-0x00000000017B0000-memory.dmp

      Filesize

      4.7MB

    • memory/2880-20-0x0000000001300000-0x00000000017B0000-memory.dmp

      Filesize

      4.7MB

    • memory/2880-2570-0x0000000006960000-0x00000000070DB000-memory.dmp

      Filesize

      7.5MB

    • memory/2880-42-0x0000000001300000-0x00000000017B0000-memory.dmp

      Filesize

      4.7MB

    • memory/2880-2569-0x0000000006960000-0x00000000070DB000-memory.dmp

      Filesize

      7.5MB

    • memory/2880-2565-0x0000000006960000-0x0000000006C18000-memory.dmp

      Filesize

      2.7MB

    • memory/2880-2564-0x0000000006960000-0x0000000006C18000-memory.dmp

      Filesize

      2.7MB

    • memory/3052-2567-0x0000000000340000-0x00000000005F8000-memory.dmp

      Filesize

      2.7MB

    • memory/3052-2568-0x0000000000340000-0x00000000005F8000-memory.dmp

      Filesize

      2.7MB

    • memory/3052-2566-0x0000000000340000-0x00000000005F8000-memory.dmp

      Filesize

      2.7MB

    • memory/3052-2583-0x0000000000340000-0x00000000005F8000-memory.dmp

      Filesize

      2.7MB

    • memory/4968-2526-0x0000000000010000-0x000000000078B000-memory.dmp

      Filesize

      7.5MB

    • memory/4968-2523-0x0000000000010000-0x000000000078B000-memory.dmp

      Filesize

      7.5MB

    • memory/5064-1327-0x0000000000290000-0x00000000003FA000-memory.dmp

      Filesize

      1.4MB

    • memory/5064-1328-0x0000000004A90000-0x0000000004BA8000-memory.dmp

      Filesize

      1.1MB

    • memory/5064-2505-0x0000000004F80000-0x000000000500A000-memory.dmp

      Filesize

      552KB