Analysis

  • max time kernel
    144s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-12-2024 02:23

General

  • Target

    4578d207fc6610750df1d6005c8e1ba3c00bdf9b89d8ac6d49bb4e6904729062.exe

  • Size

    1.8MB

  • MD5

    9e50d297946c37d3a1d1da00762d4e48

  • SHA1

    f7c1f6d79350183902532f4f74c55110099418b7

  • SHA256

    4578d207fc6610750df1d6005c8e1ba3c00bdf9b89d8ac6d49bb4e6904729062

  • SHA512

    e6a29fabdf67f7080513a2ef677e324f8c94817c9504ab020a034a9fa6ae12c7935963be490842ace30b458ff8d51a9229887ff3a8bdca1b80472cc80925f114

  • SSDEEP

    49152:o9I0TNAwTWApTxMORD1vKsBFsAjthoLj:x0pAoZSmFsAjtW

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 27 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4578d207fc6610750df1d6005c8e1ba3c00bdf9b89d8ac6d49bb4e6904729062.exe
    "C:\Users\Admin\AppData\Local\Temp\4578d207fc6610750df1d6005c8e1ba3c00bdf9b89d8ac6d49bb4e6904729062.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2892
    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe
        "C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2924
        • C:\Users\Admin\AppData\Local\Temp\onefile_2924_133785302394226000\l4.exe
          C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1268
      • C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe
        "C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1756
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1756 -s 620
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:4036
      • C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe
        "C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4756
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 632
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:4104
      • C:\Users\Admin\AppData\Local\Temp\1006141001\networkmanager.exe
        "C:\Users\Admin\AppData\Local\Temp\1006141001\networkmanager.exe"
        3⤵
        • Executes dropped EXE
        PID:3272
      • C:\Users\Admin\AppData\Local\Temp\1006252001\roblox.exe
        "C:\Users\Admin\AppData\Local\Temp\1006252001\roblox.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1656
        • C:\Users\Admin\AppData\Local\Temp\onefile_1656_133785302700650000\stub.exe
          C:\Users\Admin\AppData\Local\Temp\1006252001\roblox.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:3920
      • C:\Users\Admin\AppData\Local\Temp\1006274001\fa418fcde7.exe
        "C:\Users\Admin\AppData\Local\Temp\1006274001\fa418fcde7.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4236
      • C:\Users\Admin\AppData\Local\Temp\1006275001\7914c0cbdf.exe
        "C:\Users\Admin\AppData\Local\Temp\1006275001\7914c0cbdf.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3VL8XEP\download[1].htm

    Filesize

    1B

    MD5

    cfcd208495d565ef66e7dff9f98764da

    SHA1

    b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

    SHA256

    5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

    SHA512

    31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

  • C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe

    Filesize

    5.9MB

    MD5

    d68f79c459ee4ae03b76fa5ba151a41f

    SHA1

    bfa641085d59d58993ba98ac9ee376f898ee5f7b

    SHA256

    aa50c900e210abb6be7d2420d9d5ae34c66818e0491aabd141421d175211fed6

    SHA512

    bd4ef3e3708df81d53b2e9050447032e8dcdcc776cf0353077310f208a30dab8f31d6ec6769d47fb6c05c642bdd7a58fb4f93d9d28e2de0efc01312fbc5e391e

  • C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe

    Filesize

    1.2MB

    MD5

    f880c05fa8059b3f68e29922d370ec0c

    SHA1

    19e3afc0856bad554ccb248085355ada23cc37ab

    SHA256

    f93f39819b5443b4e83783445eefd4e1c075d69a7f6c2379ccca08b17a4f70b6

    SHA512

    7c3a8b887a83735e33290d49b58d1b5c55177c2455a546b1ad8c31b0b0cb3d14d06e1bc2101a3f93361080390760a1871c098b7f3825ed973ab8f3268e0a45b7

  • C:\Users\Admin\AppData\Local\Temp\1006141001\networkmanager.exe

    Filesize

    2.1MB

    MD5

    f8d528a37993ed91d2496bab9fc734d3

    SHA1

    4b66b225298f776e21f566b758f3897d20b23cad

    SHA256

    bc8458a8d78cf91129c84b153aafe8319410aacb8e14aec506897c8e0793ba02

    SHA512

    75dc1bbb1388f68d121bab26fc7f6bf9dc1226417ad7ed4a7b9718999aa0f9c891fed0db3c9ea6d6ccb34288cc848dc44b20ea83a30afd4ea2e99cff51f30f5a

  • C:\Users\Admin\AppData\Local\Temp\1006252001\roblox.exe

    Filesize

    10.7MB

    MD5

    6898eace70e2da82f257bc78cb081b2f

    SHA1

    5ac5ed21436d8b4c59c0b62836d531844c571d6d

    SHA256

    bcdd8b7c9ec736765d4596332c0fec1334b035d4456df1ec25b569f9b6431a23

    SHA512

    ca719707417a095fe092837e870aefc7e8874ef351e27b5b41e40f46a9e2f6cb2ba915858bc3c99a14c2f1288c71c7ddd9c2adee6588d6b43cd3ba276e1585d2

  • C:\Users\Admin\AppData\Local\Temp\1006274001\fa418fcde7.exe

    Filesize

    1.7MB

    MD5

    c70c219d988415347561167abd815428

    SHA1

    7672b4f7f1bec1fb679b75d8b056de1e22cf8c86

    SHA256

    78b460fe07346dc517a238c241ec02d8ae1181f9120fd8d0a88ba6571620fec6

    SHA512

    6cb316fa378dd96d4e67aa5f3ff60a975ddfc4a655dce32cd927dd059a13d419cb028a75982e3e3d72cdfd97f5fe4f4cc795660955a893ff4700bb8513e494e6

  • C:\Users\Admin\AppData\Local\Temp\1006275001\7914c0cbdf.exe

    Filesize

    1.9MB

    MD5

    5c682cd7d028b24b4cd0f276f3b50f54

    SHA1

    e6e8d03bfd05caff9df36150b7daf6c8a8b799d2

    SHA256

    53957b3c63da49c6bfd73328983d398e81c80c74c5d789d2066ff306769f3277

    SHA512

    616beed27ce126e88f882911c388d31e2c2ef5bd2c1ed05df06c1f3b0939d42787a9b08cf16a9a331301eed0875b55e4d47d99c5d975ead6e00e2b5e846cdfa5

  • C:\Users\Admin\AppData\Local\Temp\onefile_1656_133785302700650000\python310.dll

    Filesize

    4.3MB

    MD5

    c80b5cb43e5fe7948c3562c1fff1254e

    SHA1

    f73cb1fb9445c96ecd56b984a1822e502e71ab9d

    SHA256

    058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20

    SHA512

    faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81

  • C:\Users\Admin\AppData\Local\Temp\onefile_1656_133785302700650000\stub.exe

    Filesize

    16.1MB

    MD5

    d09a400f60c7a298e884f90539e9c72f

    SHA1

    41582ba130bef907e24f87534e7a0fdd37025101

    SHA256

    700962aa295e2fa207ff522e2f5ca051a2929eb6f252d42c9cb0a56a4f084bfe

    SHA512

    d8ba2859bb2ea109c1ca33cb924e40bf61db79aefb59324101d9f47a08835d86834790d3bc6bad4151a561ef82265b32d5111bc80f95dce769c5eb4da5116cc9

  • C:\Users\Admin\AppData\Local\Temp\onefile_2924_133785302394226000\l4.exe

    Filesize

    5.9MB

    MD5

    63c4e3f9c7383d039ab4af449372c17f

    SHA1

    f52ff760a098a006c41269ff73abb633b811f18e

    SHA256

    151524f6c1d1aeac530cfd69de15c3336043dc8eb3f5aeaa31513e24bfd7acdd

    SHA512

    dcfb4804c5569ad13e752270d13320f8769601b7092544741e35bc62a22af363b7a5ea7c5a65132c9575540a3e689a6946110502bd0f046385b8739e81761fbf

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lbroker.vbs

    Filesize

    82B

    MD5

    107a610c004bfc1ebb8b87365b2c4600

    SHA1

    04695e838daaaf45d91f0b51868c8995b80d3392

    SHA256

    3a5be027d623c694cc4874fbb6cd2f434bbaf65033607f6d2acfc1d05c3f6fdc

    SHA512

    4b26a04ec889e149bf4fb974178990804d371d72b239c1d55c5acc32636cfd7ad02f8d21ed9e289358873242493303de25f2a0bca7d1b5da9b0426854ff4a2d2

  • \Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe

    Filesize

    1.4MB

    MD5

    6e7ffd057086e44e4fcc01846cd2b152

    SHA1

    05712e7e7b8429b2dd201ea504dc32fefe5795da

    SHA256

    fbc587e990949e428e8ce7a2c74dbf85cd63ffa07370756ad854595fea0033d7

    SHA512

    8cab1824b32c54273658d28738109c8a1ef3170c1fbe02deeee40d40990acb6d45431bfb65a3facebee9a919bd972734012b1e8de035b9c1329f1bd0e709ecd2

  • \Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

    Filesize

    1.8MB

    MD5

    9e50d297946c37d3a1d1da00762d4e48

    SHA1

    f7c1f6d79350183902532f4f74c55110099418b7

    SHA256

    4578d207fc6610750df1d6005c8e1ba3c00bdf9b89d8ac6d49bb4e6904729062

    SHA512

    e6a29fabdf67f7080513a2ef677e324f8c94817c9504ab020a034a9fa6ae12c7935963be490842ace30b458ff8d51a9229887ff3a8bdca1b80472cc80925f114

  • \Users\Admin\AppData\Local\Temp\onefile_2924_133785302394226000\python312.dll

    Filesize

    6.6MB

    MD5

    166cc2f997cba5fc011820e6b46e8ea7

    SHA1

    d6179213afea084f02566ea190202c752286ca1f

    SHA256

    c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546

    SHA512

    49d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb

  • \Users\Admin\AppData\Local\Temp\svefeNefVf7weF7\Y-Cleaner.exe

    Filesize

    1.4MB

    MD5

    a8cf5621811f7fac55cfe8cb3fa6b9f6

    SHA1

    121356839e8138a03141f5f5856936a85bd2a474

    SHA256

    614a0362ab87cee48d0935b5bb957d539be1d94c6fdeb3fe42fac4fbe182c10c

    SHA512

    4479d951435f222ca7306774002f030972c9f1715d6aaf512fca9420dd79cb6d08240f80129f213851773290254be34f0ff63c7b1f4d554a7db5f84b69e84bdd

  • memory/1324-2591-0x0000000000400000-0x0000000000C85000-memory.dmp

    Filesize

    8.5MB

  • memory/1324-2637-0x0000000000400000-0x0000000000C85000-memory.dmp

    Filesize

    8.5MB

  • memory/1324-2670-0x0000000000400000-0x0000000000C85000-memory.dmp

    Filesize

    8.5MB

  • memory/1756-138-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-152-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-2484-0x00000000006A0000-0x00000000006F4000-memory.dmp

    Filesize

    336KB

  • memory/1756-104-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-75-0x0000000001290000-0x00000000013D4000-memory.dmp

    Filesize

    1.3MB

  • memory/1756-106-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-89-0x0000000000F90000-0x00000000010AA000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-90-0x0000000004D90000-0x0000000004EA8000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-91-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-92-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-94-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-96-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-98-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-100-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-114-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-136-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-102-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-110-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-120-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-122-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-150-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-148-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-146-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-144-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-142-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-140-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-108-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-134-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-132-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-130-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-128-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-1276-0x0000000000BE0000-0x0000000000C2C000-memory.dmp

    Filesize

    304KB

  • memory/1756-1275-0x00000000010B0000-0x000000000113A000-memory.dmp

    Filesize

    552KB

  • memory/1756-112-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-116-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-118-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-126-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/1756-124-0x0000000004D90000-0x0000000004EA3000-memory.dmp

    Filesize

    1.1MB

  • memory/2680-24-0x00000000003A0000-0x0000000000850000-memory.dmp

    Filesize

    4.7MB

  • memory/2680-2590-0x0000000006A10000-0x0000000007295000-memory.dmp

    Filesize

    8.5MB

  • memory/2680-2636-0x0000000006A10000-0x0000000007295000-memory.dmp

    Filesize

    8.5MB

  • memory/2680-27-0x00000000003A0000-0x0000000000850000-memory.dmp

    Filesize

    4.7MB

  • memory/2680-2595-0x0000000006A10000-0x0000000007096000-memory.dmp

    Filesize

    6.5MB

  • memory/2680-76-0x00000000003A0000-0x0000000000850000-memory.dmp

    Filesize

    4.7MB

  • memory/2680-28-0x00000000003A0000-0x0000000000850000-memory.dmp

    Filesize

    4.7MB

  • memory/2680-26-0x00000000003A0000-0x0000000000850000-memory.dmp

    Filesize

    4.7MB

  • memory/2680-2471-0x0000000006A10000-0x000000000718B000-memory.dmp

    Filesize

    7.5MB

  • memory/2680-2476-0x0000000006A10000-0x000000000718B000-memory.dmp

    Filesize

    7.5MB

  • memory/2680-2592-0x0000000006A10000-0x0000000007295000-memory.dmp

    Filesize

    8.5MB

  • memory/2680-2561-0x0000000006A10000-0x0000000007096000-memory.dmp

    Filesize

    6.5MB

  • memory/2680-2482-0x0000000006A10000-0x000000000718B000-memory.dmp

    Filesize

    7.5MB

  • memory/2680-60-0x00000000003A0000-0x0000000000850000-memory.dmp

    Filesize

    4.7MB

  • memory/2680-59-0x00000000003A0000-0x0000000000850000-memory.dmp

    Filesize

    4.7MB

  • memory/2680-23-0x00000000003A1000-0x00000000003CF000-memory.dmp

    Filesize

    184KB

  • memory/2680-22-0x00000000003A0000-0x0000000000850000-memory.dmp

    Filesize

    4.7MB

  • memory/2680-2567-0x0000000006A10000-0x0000000007096000-memory.dmp

    Filesize

    6.5MB

  • memory/2892-0-0x0000000000C90000-0x0000000001140000-memory.dmp

    Filesize

    4.7MB

  • memory/2892-1-0x0000000077880000-0x0000000077882000-memory.dmp

    Filesize

    8KB

  • memory/2892-21-0x0000000007230000-0x00000000076E0000-memory.dmp

    Filesize

    4.7MB

  • memory/2892-20-0x0000000000C90000-0x0000000001140000-memory.dmp

    Filesize

    4.7MB

  • memory/2892-2-0x0000000000C91000-0x0000000000CBF000-memory.dmp

    Filesize

    184KB

  • memory/2892-17-0x0000000007230000-0x00000000076E0000-memory.dmp

    Filesize

    4.7MB

  • memory/2892-5-0x0000000000C90000-0x0000000001140000-memory.dmp

    Filesize

    4.7MB

  • memory/2892-3-0x0000000000C90000-0x0000000001140000-memory.dmp

    Filesize

    4.7MB

  • memory/2892-4-0x0000000000C90000-0x0000000001140000-memory.dmp

    Filesize

    4.7MB

  • memory/3272-2480-0x00000000010D0000-0x000000000184B000-memory.dmp

    Filesize

    7.5MB

  • memory/4236-2594-0x00000000013A0000-0x0000000001A26000-memory.dmp

    Filesize

    6.5MB

  • memory/4236-2568-0x00000000013A0000-0x0000000001A26000-memory.dmp

    Filesize

    6.5MB

  • memory/4756-1283-0x0000000000230000-0x000000000039A000-memory.dmp

    Filesize

    1.4MB

  • memory/4756-2478-0x00000000021F0000-0x000000000227A000-memory.dmp

    Filesize

    552KB

  • memory/4756-1284-0x0000000004C60000-0x0000000004D78000-memory.dmp

    Filesize

    1.1MB

  • memory/4756-2560-0x0000000004730000-0x0000000004784000-memory.dmp

    Filesize

    336KB