Analysis

  • max time kernel
    141s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-07-2024 01:59

General

  • Target

    bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exe

  • Size

    1.9MB

  • MD5

    eaa443f37443cb7221d63e0891243384

  • SHA1

    d3242326b2ac1ae6e9817a49df33c3a79e209aee

  • SHA256

    bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13

  • SHA512

    8405c44c1eea8578224eb6495f689d66e4e2f6503c0bf08d3c111e4e307603a35089649296ebf89b76d339c9517a83133b741c655097a9fe319f25aae1f6afdb

  • SSDEEP

    49152:6YyPZ96v5ohNyPiYPl5A7E2+P75+Zg6RenX1IAhTiz8wPT:kBSPiYNK7mP91/TOQ

Malware Config

Extracted

Family

amadey

Version

8254624243

Botnet

e76b71

C2

http://77.91.77.81

Attributes
  • install_dir

    8254624243

  • install_file

    axplong.exe

  • strings_key

    90049e51fabf09df0d6748e0b271922e

  • url_paths

    /Kiru9gu/index.php

rc4.plain

Extracted

Family

redline

Botnet

newlogs

C2

85.28.47.7:17210

Extracted

Family

stealc

Botnet

ZOV

C2

http://40.86.87.10

Attributes
  • url_path

    /108e010e8f91c38c.php

Extracted

Family

redline

Botnet

newbuild

C2

185.215.113.67:40960

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 19 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 14 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exe
    "C:\Users\Admin\AppData\Local\Temp\bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2940
    • C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2292
      • C:\Users\Admin\AppData\Local\Temp\1000111001\streamer.exe
        "C:\Users\Admin\AppData\Local\Temp\1000111001\streamer.exe"
        3⤵
        • Executes dropped EXE
        PID:1376
      • C:\Users\Admin\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe
        "C:\Users\Admin\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2060
      • C:\Users\Admin\AppData\Local\Temp\1000125001\Freshbuild.exe
        "C:\Users\Admin\AppData\Local\Temp\1000125001\Freshbuild.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2444
        • C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
          "C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe"
          4⤵
          • Executes dropped EXE
          PID:2288
      • C:\Users\Admin\AppData\Local\Temp\1000128001\crypt6.exe
        "C:\Users\Admin\AppData\Local\Temp\1000128001\crypt6.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2816
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 96
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2676
      • C:\Users\Admin\AppData\Local\Temp\1000130001\newlogs.exe
        "C:\Users\Admin\AppData\Local\Temp\1000130001\newlogs.exe"
        3⤵
        • Executes dropped EXE
        PID:1036
      • C:\Users\Admin\AppData\Local\Temp\1000131001\stealc_zov.exe
        "C:\Users\Admin\AppData\Local\Temp\1000131001\stealc_zov.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:1908
      • C:\Users\Admin\AppData\Local\Temp\1000132001\newbuild.exe
        "C:\Users\Admin\AppData\Local\Temp\1000132001\newbuild.exe"
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1656
      • C:\Users\Admin\AppData\Local\Temp\1000149001\ZharkBOT.exe
        "C:\Users\Admin\AppData\Local\Temp\1000149001\ZharkBOT.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:804
        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath $env:UserProfile
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3064
        • C:\Windows\System32\svchost.exe
          "C:\Windows\System32\svchost.exe"
          4⤵
            PID:1324
          • C:\Windows\regedit.exe
            "C:\Windows\regedit.exe"
            4⤵
            • Runs regedit.exe
            PID:1936
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"
            4⤵
              PID:1916
            • C:\Program Files (x86)\Internet Explorer\iexplore.exe
              "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
              4⤵
                PID:1964

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Execution

        Command and Scripting Interpreter

        1
        T1059

        PowerShell

        1
        T1059.001

        Defense Evasion

        Virtualization/Sandbox Evasion

        2
        T1497

        Subvert Trust Controls

        1
        T1553

        Install Root Certificate

        1
        T1553.004

        Modify Registry

        1
        T1112

        Credential Access

        Unsecured Credentials

        3
        T1552

        Credentials In Files

        3
        T1552.001

        Discovery

        Query Registry

        5
        T1012

        Virtualization/Sandbox Evasion

        2
        T1497

        System Information Discovery

        3
        T1082

        Collection

        Data from Local System

        3
        T1005

        Command and Control

        Web Service

        1
        T1102

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          d1d04473b86e86e46d65cbd9b7293cb8

          SHA1

          4f1e9b942247619e65ba6962e4891a67d0b49538

          SHA256

          8d229d2f4e5f280d9e83321a44071b1d6d109061ebcaf9f4a521e577e569c6ce

          SHA512

          85169073d29d4504566be72c53e9414301cb13adcb9b4d7c1d0cdd77d1e92041ea90521e9547698145ef0a23a05a944ae8fbf9837bd6eb10c586c305a4bf79f9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          5bfd08b5070eeb084fab913a3ca2d96a

          SHA1

          8cf0dac66721c220eb0b6957ff8bb39641bc6a9d

          SHA256

          82cd1aee727e5e1e7379d1f3fbc58b19bbbbca56f3c651db9d9730bacfd69883

          SHA512

          9a7070c89c6381db7253debe325c415a4a800c747bb0d8de03becf15975fc0edf16afd68f6c0cd502faae3bc97d9265c7534c442e0bb041445085a17b0c9facf

        • C:\Users\Admin\AppData\Local\Temp\1000111001\streamer.exe
          Filesize

          7.7MB

          MD5

          2bc0db539a8fab08bf4104eb7f2de7e7

          SHA1

          ff4a5defedb18c93ef815434b40e19b9452ca410

          SHA256

          ec84ec11567566db3ba9096df164f0b7a8217d50ffab16fa3642f8f12d759b04

          SHA512

          ffaeb6c876d2aeda75b6576d2b307964a7b5330a0ab73352a4c95ef18ac3b1b1bfff350805553833a754582ed54215337c376bce0abd44c117b5d8a0e1468d71

        • C:\Users\Admin\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe
          Filesize

          1.2MB

          MD5

          242214131486132e33ceda794d66ca1f

          SHA1

          4ce34fd91f5c9e35b8694007b286635663ef9bf2

          SHA256

          bac402b5749b2da2211db6d2404c1c621ccd0c2e5d492eb6f973b3e2d38dd361

          SHA512

          031e0904d949cec515f2d6f2b5e4b9c0df03637787ff14f20c58e711c54eec77d1f22aa0cf0f6efd65362c1fc0066645d5d005c6a77fe5b169427cdd42555d29

        • C:\Users\Admin\AppData\Local\Temp\1000115001\build.exe
          Filesize

          26KB

          MD5

          567aea368eda0f06377ba089e83f9f05

          SHA1

          4f5a315c217d76df6369d89251bffa2e9210a6a0

          SHA256

          537a4bc027569bc26f18bfdef926111a176f702c9e6eef2555073a417d33f896

          SHA512

          673b380a3d81bcc5090e0ae13abe5c0466cb847e7626304762713633a70a4355d33fdc619f0cfcc78383eb90b9d8b6b3d2ed756eab87b5abb7d795ce67268947

        • C:\Users\Admin\AppData\Local\Temp\1000116001\FILE1.exe
          Filesize

          26KB

          MD5

          7b6304f1ac8f9ffe0fb9bf9dbc74cbd6

          SHA1

          7d4f5c73f936e476e490ba6182cd011b06769b1b

          SHA256

          d414465667daca42624c2ded25205ac0d0fabdc745d2fd5d279f239c193157a3

          SHA512

          f4e2ea2f93282e8d661dfc31a9ef894a6fcec248e8f6e07493dff231cdcecc5e39065f9fc0ef58c8233ffbea697112b379892f667bdaf9406064209194425ce4

        • C:\Users\Admin\AppData\Local\Temp\1000125001\Freshbuild.exe
          Filesize

          415KB

          MD5

          07101cac5b9477ba636cd8ca7b9932cb

          SHA1

          59ea7fd9ae6ded8c1b7240a4bf9399b4eb3849f1

          SHA256

          488385cd54d14790b03fa7c7dc997ebea3f7b2a8499e5927eb437a3791102a77

          SHA512

          02240ff51a74966bc31cfcc901105096eb871f588efaa9be1a829b4ee6f245bd9dca37be7e2946ba6315feea75c3dce5f490847250e62081445cd25b0f406887

        • C:\Users\Admin\AppData\Local\Temp\1000128001\crypt6.exe
          Filesize

          512KB

          MD5

          a957dc16d684fbd7e12fc87e8ee12fea

          SHA1

          20c73ccfdba13fd9b79c9e02432be39e48e4b37d

          SHA256

          071b6c448d2546dea8caed872fca0d002f59a6b9849f0de2a565fc74b487fa37

          SHA512

          fd6982587fba779d6febb84dfa65ec3e048e17733c2f01b61996bedb170bb4bb1cbb822c0dd2cf44a7e601373abaf499885b13b7957dd2a307bbd8f2120e9b3b

        • C:\Users\Admin\AppData\Local\Temp\1000130001\newlogs.exe
          Filesize

          297KB

          MD5

          0970456d2e2bcb36f49d23f5f2eec4ce

          SHA1

          1e427bbeb209b636371d17801b14fabff87921be

          SHA256

          264db4d677606c95912a93a457675d5ebaa24dc886da8bbcb800fe831c540a54

          SHA512

          43c233e6c6fb20ee5830672f68eec2a1930aff6c3da185b7af56ede90970041157755b8893a86336711c8ba8cbe3f22818de8ddc1789ed65a7aacd596771909e

        • C:\Users\Admin\AppData\Local\Temp\1000131001\stealc_zov.exe
          Filesize

          158KB

          MD5

          253ccac8a47b80287f651987c0c779ea

          SHA1

          11db405849dbaa9b3759de921835df20fab35bc3

          SHA256

          262a400b339deea5089433709ce559d23253e23d23c07595b515755114147e2f

          SHA512

          af40e01bc3d36baf47eba1d5d6406220dfbcc52c6123dd8450e709fed3e72bed82aac6257fa7bdf7dd774f182919a5051e9712b2e7f1329defd0b159cb08385d

        • C:\Users\Admin\AppData\Local\Temp\1000132001\newbuild.exe
          Filesize

          297KB

          MD5

          9ab4de8b2f2b99f009d32aa790cd091b

          SHA1

          a86b16ee4676850bac14c50ee698a39454d0231e

          SHA256

          8a254344702dc6560312a8028e08f844b16804b1fbf4c438c3ca5058d7b65ea1

          SHA512

          a79341ec3407529daa0384de4cac25b665d3b0cb81e52ecada0ebfe37d7616b16da96b47b04f50ce0a6e46d5fced3298a459f78a087c6b6eac4ed444434c5fbe

        • C:\Users\Admin\AppData\Local\Temp\1000149001\ZharkBOT.exe
          Filesize

          2.9MB

          MD5

          80958a4b85453f4df82ec131554a5412

          SHA1

          44cefe96467895934ec9d1c2461036704c971458

          SHA256

          70afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783

          SHA512

          cab01e1d63b4ff9a8d35c48fddd18b0959068510b1ca0e66997ed2d59a34b8903f23d3b3736180b52130a325eda3665f9babe2dcad91308f16526e8812fee1c8

        • C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
          Filesize

          1.9MB

          MD5

          eaa443f37443cb7221d63e0891243384

          SHA1

          d3242326b2ac1ae6e9817a49df33c3a79e209aee

          SHA256

          bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13

          SHA512

          8405c44c1eea8578224eb6495f689d66e4e2f6503c0bf08d3c111e4e307603a35089649296ebf89b76d339c9517a83133b741c655097a9fe319f25aae1f6afdb

        • C:\Users\Admin\AppData\Local\Temp\Tar2AB0.tmp
          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • \ProgramData\mozglue.dll
          Filesize

          593KB

          MD5

          c8fd9be83bc728cc04beffafc2907fe9

          SHA1

          95ab9f701e0024cedfbd312bcfe4e726744c4f2e

          SHA256

          ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

          SHA512

          fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

        • \ProgramData\nss3.dll
          Filesize

          2.0MB

          MD5

          1cc453cdf74f31e4d913ff9c10acdde2

          SHA1

          6e85eae544d6e965f15fa5c39700fa7202f3aafe

          SHA256

          ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

          SHA512

          dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

        • \Users\Admin\AppData\Roaming\d3d9.dll
          Filesize

          279KB

          MD5

          8fa26f1e37d3ff7f736fc93d520bc8ab

          SHA1

          ad532e1cb4a1b3cd82c7a85647f8f6dd99833bb1

          SHA256

          6c47da8fbd12f22d7272fbf223e054bf5093c0922d0e8fb7d6289a5913c2e45d

          SHA512

          8a0b53cbc3a20e2f0fd41c486b1af1fbbcf7f2fed9f7368b672a07f25faaa2568bbdbcf0841233ac8c473a4d1dee099e90bf6098a6fa15e44b8526efdafc1287

        • memory/1036-321-0x00000000012B0000-0x0000000001300000-memory.dmp
          Filesize

          320KB

        • memory/1376-224-0x000000013FA40000-0x000000014028B000-memory.dmp
          Filesize

          8.3MB

        • memory/1656-356-0x0000000001120000-0x0000000001170000-memory.dmp
          Filesize

          320KB

        • memory/1908-466-0x0000000001200000-0x000000000143C000-memory.dmp
          Filesize

          2.2MB

        • memory/1908-384-0x0000000061E00000-0x0000000061EF3000-memory.dmp
          Filesize

          972KB

        • memory/1908-341-0x0000000001200000-0x000000000143C000-memory.dmp
          Filesize

          2.2MB

        • memory/1964-415-0x0000000000400000-0x00000000004D6000-memory.dmp
          Filesize

          856KB

        • memory/2060-241-0x0000000000CD0000-0x0000000000E02000-memory.dmp
          Filesize

          1.2MB

        • memory/2292-468-0x0000000000250000-0x0000000000721000-memory.dmp
          Filesize

          4.8MB

        • memory/2292-474-0x0000000000250000-0x0000000000721000-memory.dmp
          Filesize

          4.8MB

        • memory/2292-17-0x0000000000250000-0x0000000000721000-memory.dmp
          Filesize

          4.8MB

        • memory/2292-339-0x0000000008190000-0x00000000083CC000-memory.dmp
          Filesize

          2.2MB

        • memory/2292-338-0x0000000000250000-0x0000000000721000-memory.dmp
          Filesize

          4.8MB

        • memory/2292-304-0x0000000000250000-0x0000000000721000-memory.dmp
          Filesize

          4.8MB

        • memory/2292-340-0x0000000008190000-0x00000000083CC000-memory.dmp
          Filesize

          2.2MB

        • memory/2292-477-0x0000000000250000-0x0000000000721000-memory.dmp
          Filesize

          4.8MB

        • memory/2292-476-0x0000000000250000-0x0000000000721000-memory.dmp
          Filesize

          4.8MB

        • memory/2292-475-0x0000000000250000-0x0000000000721000-memory.dmp
          Filesize

          4.8MB

        • memory/2292-18-0x0000000000251000-0x000000000027F000-memory.dmp
          Filesize

          184KB

        • memory/2292-469-0x0000000000250000-0x0000000000721000-memory.dmp
          Filesize

          4.8MB

        • memory/2292-473-0x0000000000250000-0x0000000000721000-memory.dmp
          Filesize

          4.8MB

        • memory/2292-413-0x0000000000250000-0x0000000000721000-memory.dmp
          Filesize

          4.8MB

        • memory/2292-19-0x0000000000250000-0x0000000000721000-memory.dmp
          Filesize

          4.8MB

        • memory/2292-472-0x0000000000250000-0x0000000000721000-memory.dmp
          Filesize

          4.8MB

        • memory/2292-443-0x0000000000250000-0x0000000000721000-memory.dmp
          Filesize

          4.8MB

        • memory/2292-471-0x0000000000250000-0x0000000000721000-memory.dmp
          Filesize

          4.8MB

        • memory/2292-470-0x0000000000250000-0x0000000000721000-memory.dmp
          Filesize

          4.8MB

        • memory/2292-21-0x0000000000250000-0x0000000000721000-memory.dmp
          Filesize

          4.8MB

        • memory/2292-467-0x0000000000250000-0x0000000000721000-memory.dmp
          Filesize

          4.8MB

        • memory/2292-226-0x0000000000250000-0x0000000000721000-memory.dmp
          Filesize

          4.8MB

        • memory/2940-15-0x00000000010C0000-0x0000000001591000-memory.dmp
          Filesize

          4.8MB

        • memory/2940-1-0x0000000077BC0000-0x0000000077BC2000-memory.dmp
          Filesize

          8KB

        • memory/2940-0-0x00000000010C0000-0x0000000001591000-memory.dmp
          Filesize

          4.8MB

        • memory/2940-2-0x00000000010C1000-0x00000000010EF000-memory.dmp
          Filesize

          184KB

        • memory/2940-3-0x00000000010C0000-0x0000000001591000-memory.dmp
          Filesize

          4.8MB

        • memory/2940-16-0x0000000007050000-0x0000000007521000-memory.dmp
          Filesize

          4.8MB

        • memory/2940-5-0x00000000010C0000-0x0000000001591000-memory.dmp
          Filesize

          4.8MB

        • memory/3064-405-0x0000000001C90000-0x0000000001C98000-memory.dmp
          Filesize

          32KB

        • memory/3064-404-0x000000001B680000-0x000000001B962000-memory.dmp
          Filesize

          2.9MB