Analysis

  • max time kernel
    136s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2023, 10:20

General

  • Target

    f64b78be9a6c0883aa55e461765ce420d9d69b56f89816432dab80cf480a1572.exe

  • Size

    691KB

  • MD5

    247aef1db06bf8c852c08a8e513de67e

  • SHA1

    1e3bba57c39123424e4f23e9e62724efc4a69408

  • SHA256

    f64b78be9a6c0883aa55e461765ce420d9d69b56f89816432dab80cf480a1572

  • SHA512

    4e30eb488e56776483cff3f6b9ba8333adcd5c83c1909da879c54f72a15bfd65d4da6ee247142f0a50196277154a578cfe81a12ecd6f6429395be95e6265ec4e

  • SSDEEP

    12288:zMrgy905u4DWdYnAt9YdWgZB1yp4cfh8jEPFwg62YF5NDsGy6FjnhqTAUFMjiwCv:DyB4DWdYnA6fNyCcJsur6RTyenI0UGi1

Malware Config

Extracted

Family

amadey

Version

3.68

C2

193.233.20.26/Do3m4Gor/index.php

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f64b78be9a6c0883aa55e461765ce420d9d69b56f89816432dab80cf480a1572.exe
    "C:\Users\Admin\AppData\Local\Temp\f64b78be9a6c0883aa55e461765ce420d9d69b56f89816432dab80cf480a1572.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5072
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zkIa9282Fv.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zkIa9282Fv.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1820
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zkZX5351gL.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zkZX5351gL.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:676
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\knYC95mo22.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\knYC95mo22.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1120
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 1080
            5⤵
            • Program crash
            PID:2984
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ljrm29oG09.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ljrm29oG09.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4788
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nm06zq97fc12.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nm06zq97fc12.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4640
        • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe
          "C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3084
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN ghaaer.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:4740
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "ghaaer.exe" /P "Admin:N"&&CACLS "ghaaer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2036
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:1200
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "ghaaer.exe" /P "Admin:N"
                6⤵
                  PID:3628
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "ghaaer.exe" /P "Admin:R" /E
                  6⤵
                    PID:792
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:1176
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:N"
                      6⤵
                        PID:4132
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\5975271bda" /P "Admin:R" /E
                        6⤵
                          PID:464
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:1468
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rdgN69sx04.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rdgN69sx04.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4736
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1120 -ip 1120
                1⤵
                  PID:1564
                • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe
                  C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe
                  1⤵
                  • Executes dropped EXE
                  PID:5012
                • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe
                  C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe
                  1⤵
                  • Executes dropped EXE
                  PID:3912

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe

                  Filesize

                  235KB

                  MD5

                  ac37b26719e17ef06e7eff1e80d80fad

                  SHA1

                  7027aea7add1fdbbe8da8d1f2929db974aea9d0b

                  SHA256

                  5260335d8eccfa3de42a0819ecd504b80c9cc8dad5bddbc7fd1e48763961133b

                  SHA512

                  f791a7c1af223bbcb7234e791b69796919abc0c2e220f746a52f151e2ae4e5a395aae0693324430efc069f2276ab82e43895ae8cc36103f1846a98a012bfcf0f

                • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe

                  Filesize

                  235KB

                  MD5

                  ac37b26719e17ef06e7eff1e80d80fad

                  SHA1

                  7027aea7add1fdbbe8da8d1f2929db974aea9d0b

                  SHA256

                  5260335d8eccfa3de42a0819ecd504b80c9cc8dad5bddbc7fd1e48763961133b

                  SHA512

                  f791a7c1af223bbcb7234e791b69796919abc0c2e220f746a52f151e2ae4e5a395aae0693324430efc069f2276ab82e43895ae8cc36103f1846a98a012bfcf0f

                • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe

                  Filesize

                  235KB

                  MD5

                  ac37b26719e17ef06e7eff1e80d80fad

                  SHA1

                  7027aea7add1fdbbe8da8d1f2929db974aea9d0b

                  SHA256

                  5260335d8eccfa3de42a0819ecd504b80c9cc8dad5bddbc7fd1e48763961133b

                  SHA512

                  f791a7c1af223bbcb7234e791b69796919abc0c2e220f746a52f151e2ae4e5a395aae0693324430efc069f2276ab82e43895ae8cc36103f1846a98a012bfcf0f

                • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe

                  Filesize

                  235KB

                  MD5

                  ac37b26719e17ef06e7eff1e80d80fad

                  SHA1

                  7027aea7add1fdbbe8da8d1f2929db974aea9d0b

                  SHA256

                  5260335d8eccfa3de42a0819ecd504b80c9cc8dad5bddbc7fd1e48763961133b

                  SHA512

                  f791a7c1af223bbcb7234e791b69796919abc0c2e220f746a52f151e2ae4e5a395aae0693324430efc069f2276ab82e43895ae8cc36103f1846a98a012bfcf0f

                • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe

                  Filesize

                  235KB

                  MD5

                  ac37b26719e17ef06e7eff1e80d80fad

                  SHA1

                  7027aea7add1fdbbe8da8d1f2929db974aea9d0b

                  SHA256

                  5260335d8eccfa3de42a0819ecd504b80c9cc8dad5bddbc7fd1e48763961133b

                  SHA512

                  f791a7c1af223bbcb7234e791b69796919abc0c2e220f746a52f151e2ae4e5a395aae0693324430efc069f2276ab82e43895ae8cc36103f1846a98a012bfcf0f

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rdgN69sx04.exe

                  Filesize

                  175KB

                  MD5

                  cd17c2c2143d928d12a325b33f9abb5d

                  SHA1

                  17e8f70c6306adeeb01a04f23bf2501e97c05843

                  SHA256

                  3d72bcc76527235e687d03bbd50eacdd2895d62fa908665af01c1e0dc70b14e1

                  SHA512

                  b247a002fdc98ba93822b0df17e452ba341b2b7cb086b3e7c5c51672007130017dca8db02075a4e6a4bb5da46a574b8deb46cb71d9610e7220e0992506194b53

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rdgN69sx04.exe

                  Filesize

                  175KB

                  MD5

                  cd17c2c2143d928d12a325b33f9abb5d

                  SHA1

                  17e8f70c6306adeeb01a04f23bf2501e97c05843

                  SHA256

                  3d72bcc76527235e687d03bbd50eacdd2895d62fa908665af01c1e0dc70b14e1

                  SHA512

                  b247a002fdc98ba93822b0df17e452ba341b2b7cb086b3e7c5c51672007130017dca8db02075a4e6a4bb5da46a574b8deb46cb71d9610e7220e0992506194b53

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zkIa9282Fv.exe

                  Filesize

                  546KB

                  MD5

                  d79836edf79d35e473c17c32a26ef372

                  SHA1

                  cbbad393174eacda18e6a0c70d89bb0a19b3e0dd

                  SHA256

                  608105e5f894e13ac4d733573642d456e72217a40d46ed23955ace97d3726d4c

                  SHA512

                  4e969f81a592dd8ca6973815703d2f775ecd5ea57c7276f7951a9cc0a554f94bd3304849a21e93c888f486afe4fe2497d5f798f6f4af7349d9cc157cef97c6fc

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zkIa9282Fv.exe

                  Filesize

                  546KB

                  MD5

                  d79836edf79d35e473c17c32a26ef372

                  SHA1

                  cbbad393174eacda18e6a0c70d89bb0a19b3e0dd

                  SHA256

                  608105e5f894e13ac4d733573642d456e72217a40d46ed23955ace97d3726d4c

                  SHA512

                  4e969f81a592dd8ca6973815703d2f775ecd5ea57c7276f7951a9cc0a554f94bd3304849a21e93c888f486afe4fe2497d5f798f6f4af7349d9cc157cef97c6fc

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nm06zq97fc12.exe

                  Filesize

                  235KB

                  MD5

                  ac37b26719e17ef06e7eff1e80d80fad

                  SHA1

                  7027aea7add1fdbbe8da8d1f2929db974aea9d0b

                  SHA256

                  5260335d8eccfa3de42a0819ecd504b80c9cc8dad5bddbc7fd1e48763961133b

                  SHA512

                  f791a7c1af223bbcb7234e791b69796919abc0c2e220f746a52f151e2ae4e5a395aae0693324430efc069f2276ab82e43895ae8cc36103f1846a98a012bfcf0f

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nm06zq97fc12.exe

                  Filesize

                  235KB

                  MD5

                  ac37b26719e17ef06e7eff1e80d80fad

                  SHA1

                  7027aea7add1fdbbe8da8d1f2929db974aea9d0b

                  SHA256

                  5260335d8eccfa3de42a0819ecd504b80c9cc8dad5bddbc7fd1e48763961133b

                  SHA512

                  f791a7c1af223bbcb7234e791b69796919abc0c2e220f746a52f151e2ae4e5a395aae0693324430efc069f2276ab82e43895ae8cc36103f1846a98a012bfcf0f

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zkZX5351gL.exe

                  Filesize

                  359KB

                  MD5

                  fda5d75c6766233017268be7df714355

                  SHA1

                  c1ecf355fa9810185b260354e65ba0675e416f8f

                  SHA256

                  4c4643480fcb42ab92659393ec7d99932ac75a378b38ac11ae055dc601a15e8e

                  SHA512

                  2b1e945b14798079a2001fa2e2269a20560d0dcd215e8eb9e50a9b96d5591cffd6bebc3a490a6b1937c9a020225a1a55875a40c8f9939a9c5dfb1aa84be25f2e

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zkZX5351gL.exe

                  Filesize

                  359KB

                  MD5

                  fda5d75c6766233017268be7df714355

                  SHA1

                  c1ecf355fa9810185b260354e65ba0675e416f8f

                  SHA256

                  4c4643480fcb42ab92659393ec7d99932ac75a378b38ac11ae055dc601a15e8e

                  SHA512

                  2b1e945b14798079a2001fa2e2269a20560d0dcd215e8eb9e50a9b96d5591cffd6bebc3a490a6b1937c9a020225a1a55875a40c8f9939a9c5dfb1aa84be25f2e

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\knYC95mo22.exe

                  Filesize

                  359KB

                  MD5

                  54b01e7bd1276a17bdb5b66a6c44fdc9

                  SHA1

                  deaf9477c4185f59b7cb87f867c1dbb6308d4c7f

                  SHA256

                  3ede1dfe552f351b09161a852aa4e67115fdb1feecc3740619c7827629f0fd22

                  SHA512

                  521c36e546c4bdffc8c716ac8bf7e5c7958c0819e607066b038d5f9ffa636d3ff9ddc3fb224a3ec9ae87cdeca23a14aad2b7dbaff2924c61c0d9ef7c929d4ca5

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\knYC95mo22.exe

                  Filesize

                  359KB

                  MD5

                  54b01e7bd1276a17bdb5b66a6c44fdc9

                  SHA1

                  deaf9477c4185f59b7cb87f867c1dbb6308d4c7f

                  SHA256

                  3ede1dfe552f351b09161a852aa4e67115fdb1feecc3740619c7827629f0fd22

                  SHA512

                  521c36e546c4bdffc8c716ac8bf7e5c7958c0819e607066b038d5f9ffa636d3ff9ddc3fb224a3ec9ae87cdeca23a14aad2b7dbaff2924c61c0d9ef7c929d4ca5

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ljrm29oG09.exe

                  Filesize

                  11KB

                  MD5

                  e27fc2174dbba731cbd66b4e268b9af5

                  SHA1

                  fa0a5c0e9ba4b9845fc81c7b4d077996ec17bbd8

                  SHA256

                  a0dc443ce5fd5bbd5bddbca58344da09f98469ecb1406e17bdbfb4a913b97625

                  SHA512

                  b912be118e7b72dd9d680b24409340b676ebfa30497f97f88eec50c3ac7ef24da12fce20e42f0cee1be4d7b8f9ea7ce713af3664b4094e326adb5744696d89d3

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ljrm29oG09.exe

                  Filesize

                  11KB

                  MD5

                  e27fc2174dbba731cbd66b4e268b9af5

                  SHA1

                  fa0a5c0e9ba4b9845fc81c7b4d077996ec17bbd8

                  SHA256

                  a0dc443ce5fd5bbd5bddbca58344da09f98469ecb1406e17bdbfb4a913b97625

                  SHA512

                  b912be118e7b72dd9d680b24409340b676ebfa30497f97f88eec50c3ac7ef24da12fce20e42f0cee1be4d7b8f9ea7ce713af3664b4094e326adb5744696d89d3

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  c1ddaca25d84d05e809ffce1d2b468b7

                  SHA1

                  38f257a264e657a20aa2fb3b48adb53c4bce5c8f

                  SHA256

                  cf2730fda38e3945795b00cfaa3074b9ec356b0ff7b2a493a318fccd34b677dd

                  SHA512

                  87fc6fc4aa53d4ba31da2802677599709cbd04556082cf3531e2c90659c23d5fa2210b658635f11f48b22d87e01c26bed5bf42f8139962441a3778754229f14e

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  c1ddaca25d84d05e809ffce1d2b468b7

                  SHA1

                  38f257a264e657a20aa2fb3b48adb53c4bce5c8f

                  SHA256

                  cf2730fda38e3945795b00cfaa3074b9ec356b0ff7b2a493a318fccd34b677dd

                  SHA512

                  87fc6fc4aa53d4ba31da2802677599709cbd04556082cf3531e2c90659c23d5fa2210b658635f11f48b22d87e01c26bed5bf42f8139962441a3778754229f14e

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  c1ddaca25d84d05e809ffce1d2b468b7

                  SHA1

                  38f257a264e657a20aa2fb3b48adb53c4bce5c8f

                  SHA256

                  cf2730fda38e3945795b00cfaa3074b9ec356b0ff7b2a493a318fccd34b677dd

                  SHA512

                  87fc6fc4aa53d4ba31da2802677599709cbd04556082cf3531e2c90659c23d5fa2210b658635f11f48b22d87e01c26bed5bf42f8139962441a3778754229f14e

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                  Filesize

                  162B

                  MD5

                  1b7c22a214949975556626d7217e9a39

                  SHA1

                  d01c97e2944166ed23e47e4a62ff471ab8fa031f

                  SHA256

                  340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                  SHA512

                  ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                • memory/1120-192-0x0000000007570000-0x0000000007580000-memory.dmp

                  Filesize

                  64KB

                • memory/1120-163-0x0000000004A10000-0x0000000004A22000-memory.dmp

                  Filesize

                  72KB

                • memory/1120-185-0x0000000004A10000-0x0000000004A22000-memory.dmp

                  Filesize

                  72KB

                • memory/1120-186-0x0000000007570000-0x0000000007580000-memory.dmp

                  Filesize

                  64KB

                • memory/1120-187-0x0000000007570000-0x0000000007580000-memory.dmp

                  Filesize

                  64KB

                • memory/1120-188-0x0000000000400000-0x0000000002BC7000-memory.dmp

                  Filesize

                  39.8MB

                • memory/1120-189-0x0000000007570000-0x0000000007580000-memory.dmp

                  Filesize

                  64KB

                • memory/1120-191-0x0000000007570000-0x0000000007580000-memory.dmp

                  Filesize

                  64KB

                • memory/1120-181-0x0000000004A10000-0x0000000004A22000-memory.dmp

                  Filesize

                  72KB

                • memory/1120-193-0x0000000000400000-0x0000000002BC7000-memory.dmp

                  Filesize

                  39.8MB

                • memory/1120-179-0x0000000004A10000-0x0000000004A22000-memory.dmp

                  Filesize

                  72KB

                • memory/1120-177-0x0000000004A10000-0x0000000004A22000-memory.dmp

                  Filesize

                  72KB

                • memory/1120-155-0x0000000002CC0000-0x0000000002CED000-memory.dmp

                  Filesize

                  180KB

                • memory/1120-175-0x0000000004A10000-0x0000000004A22000-memory.dmp

                  Filesize

                  72KB

                • memory/1120-173-0x0000000004A10000-0x0000000004A22000-memory.dmp

                  Filesize

                  72KB

                • memory/1120-171-0x0000000004A10000-0x0000000004A22000-memory.dmp

                  Filesize

                  72KB

                • memory/1120-169-0x0000000004A10000-0x0000000004A22000-memory.dmp

                  Filesize

                  72KB

                • memory/1120-167-0x0000000004A10000-0x0000000004A22000-memory.dmp

                  Filesize

                  72KB

                • memory/1120-165-0x0000000004A10000-0x0000000004A22000-memory.dmp

                  Filesize

                  72KB

                • memory/1120-183-0x0000000004A10000-0x0000000004A22000-memory.dmp

                  Filesize

                  72KB

                • memory/1120-156-0x0000000007570000-0x0000000007580000-memory.dmp

                  Filesize

                  64KB

                • memory/1120-157-0x0000000007580000-0x0000000007B24000-memory.dmp

                  Filesize

                  5.6MB

                • memory/1120-159-0x0000000004A10000-0x0000000004A22000-memory.dmp

                  Filesize

                  72KB

                • memory/1120-158-0x0000000004A10000-0x0000000004A22000-memory.dmp

                  Filesize

                  72KB

                • memory/1120-161-0x0000000004A10000-0x0000000004A22000-memory.dmp

                  Filesize

                  72KB

                • memory/4736-225-0x00000000071F0000-0x000000000771C000-memory.dmp

                  Filesize

                  5.2MB

                • memory/4736-214-0x0000000000860000-0x0000000000892000-memory.dmp

                  Filesize

                  200KB

                • memory/4736-221-0x0000000005490000-0x00000000054F6000-memory.dmp

                  Filesize

                  408KB

                • memory/4736-222-0x0000000006850000-0x00000000068C6000-memory.dmp

                  Filesize

                  472KB

                • memory/4736-223-0x00000000068D0000-0x0000000006920000-memory.dmp

                  Filesize

                  320KB

                • memory/4736-224-0x0000000006AF0000-0x0000000006CB2000-memory.dmp

                  Filesize

                  1.8MB

                • memory/4736-218-0x0000000005160000-0x000000000519C000-memory.dmp

                  Filesize

                  240KB

                • memory/4736-219-0x0000000005480000-0x0000000005490000-memory.dmp

                  Filesize

                  64KB

                • memory/4736-220-0x0000000005530000-0x00000000055C2000-memory.dmp

                  Filesize

                  584KB

                • memory/4736-217-0x0000000005100000-0x0000000005112000-memory.dmp

                  Filesize

                  72KB

                • memory/4736-216-0x00000000051D0000-0x00000000052DA000-memory.dmp

                  Filesize

                  1.0MB

                • memory/4736-215-0x0000000005650000-0x0000000005C68000-memory.dmp

                  Filesize

                  6.1MB

                • memory/4736-226-0x0000000005480000-0x0000000005490000-memory.dmp

                  Filesize

                  64KB

                • memory/4788-197-0x0000000000B50000-0x0000000000B5A000-memory.dmp

                  Filesize

                  40KB