Analysis

  • max time kernel
    118s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2023, 13:02

General

  • Target

    e209160e114f3c070fad380ae80d14cf54df07bd87a76d25bef6acd6cd28e7da.exe

  • Size

    690KB

  • MD5

    685892f0391efcb106812fc9514f3cac

  • SHA1

    f9b230503f2a4d40c86c67a3358c3154558970ef

  • SHA256

    e209160e114f3c070fad380ae80d14cf54df07bd87a76d25bef6acd6cd28e7da

  • SHA512

    ec48a7a23e9b5d88123f678ed654f92f5e6cb24ce15068079d6e10d4fd78ac663e56c8a3da55f58e0493db59718acacc55118bf7b262fc7f4136a9709b9c20be

  • SSDEEP

    12288:EMrry90Jmnq2L3I7uGSqsZyspjhxxtfsPr9hBxzPseKTB56r:nyfqwI7UnvfAZVUPL6r

Malware Config

Extracted

Family

amadey

Version

3.68

C2

193.233.20.26/Do3m4Gor/index.php

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e209160e114f3c070fad380ae80d14cf54df07bd87a76d25bef6acd6cd28e7da.exe
    "C:\Users\Admin\AppData\Local\Temp\e209160e114f3c070fad380ae80d14cf54df07bd87a76d25bef6acd6cd28e7da.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zkfU2748ic.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zkfU2748ic.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zkBb4320Ol.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zkBb4320Ol.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:632
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\knFC58eO73.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\knFC58eO73.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2476
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 1104
            5⤵
            • Program crash
            PID:3084
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ljfw43xK26.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ljfw43xK26.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1836
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nm82Jl03eB21.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nm82Jl03eB21.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4900
        • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe
          "C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1784
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN ghaaer.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:4172
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "ghaaer.exe" /P "Admin:N"&&CACLS "ghaaer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3580
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:5056
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "ghaaer.exe" /P "Admin:N"
                6⤵
                  PID:4616
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "ghaaer.exe" /P "Admin:R" /E
                  6⤵
                    PID:340
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:3344
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:N"
                      6⤵
                        PID:1576
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\5975271bda" /P "Admin:R" /E
                        6⤵
                          PID:1840
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:4980
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rdbW82qK61.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rdbW82qK61.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4060
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2476 -ip 2476
                1⤵
                  PID:2788
                • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe
                  C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe
                  1⤵
                  • Executes dropped EXE
                  PID:4788
                • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe
                  C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe
                  1⤵
                  • Executes dropped EXE
                  PID:2544

                Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe

                        Filesize

                        235KB

                        MD5

                        ac37b26719e17ef06e7eff1e80d80fad

                        SHA1

                        7027aea7add1fdbbe8da8d1f2929db974aea9d0b

                        SHA256

                        5260335d8eccfa3de42a0819ecd504b80c9cc8dad5bddbc7fd1e48763961133b

                        SHA512

                        f791a7c1af223bbcb7234e791b69796919abc0c2e220f746a52f151e2ae4e5a395aae0693324430efc069f2276ab82e43895ae8cc36103f1846a98a012bfcf0f

                      • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe

                        Filesize

                        235KB

                        MD5

                        ac37b26719e17ef06e7eff1e80d80fad

                        SHA1

                        7027aea7add1fdbbe8da8d1f2929db974aea9d0b

                        SHA256

                        5260335d8eccfa3de42a0819ecd504b80c9cc8dad5bddbc7fd1e48763961133b

                        SHA512

                        f791a7c1af223bbcb7234e791b69796919abc0c2e220f746a52f151e2ae4e5a395aae0693324430efc069f2276ab82e43895ae8cc36103f1846a98a012bfcf0f

                      • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe

                        Filesize

                        235KB

                        MD5

                        ac37b26719e17ef06e7eff1e80d80fad

                        SHA1

                        7027aea7add1fdbbe8da8d1f2929db974aea9d0b

                        SHA256

                        5260335d8eccfa3de42a0819ecd504b80c9cc8dad5bddbc7fd1e48763961133b

                        SHA512

                        f791a7c1af223bbcb7234e791b69796919abc0c2e220f746a52f151e2ae4e5a395aae0693324430efc069f2276ab82e43895ae8cc36103f1846a98a012bfcf0f

                      • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe

                        Filesize

                        235KB

                        MD5

                        ac37b26719e17ef06e7eff1e80d80fad

                        SHA1

                        7027aea7add1fdbbe8da8d1f2929db974aea9d0b

                        SHA256

                        5260335d8eccfa3de42a0819ecd504b80c9cc8dad5bddbc7fd1e48763961133b

                        SHA512

                        f791a7c1af223bbcb7234e791b69796919abc0c2e220f746a52f151e2ae4e5a395aae0693324430efc069f2276ab82e43895ae8cc36103f1846a98a012bfcf0f

                      • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe

                        Filesize

                        235KB

                        MD5

                        ac37b26719e17ef06e7eff1e80d80fad

                        SHA1

                        7027aea7add1fdbbe8da8d1f2929db974aea9d0b

                        SHA256

                        5260335d8eccfa3de42a0819ecd504b80c9cc8dad5bddbc7fd1e48763961133b

                        SHA512

                        f791a7c1af223bbcb7234e791b69796919abc0c2e220f746a52f151e2ae4e5a395aae0693324430efc069f2276ab82e43895ae8cc36103f1846a98a012bfcf0f

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rdbW82qK61.exe

                        Filesize

                        176KB

                        MD5

                        a172227703b68394c11eb7c559195d1d

                        SHA1

                        bfefdbbfaf08f6d2bab87444a1b9db2214a7efc3

                        SHA256

                        721fb1054b7a6104f3c10ea7b9a295bf59ab6e280a490b7a1b1b48ed7a579f4d

                        SHA512

                        a4dc59e33511fec1204a05105c8375cac9ad4fa2c34eb3332d5836940cfef3d8eb6dbb91be01850c932f11ef15a2d624a4c88b112af1cc7e17cb7aa27b90b698

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rdbW82qK61.exe

                        Filesize

                        176KB

                        MD5

                        a172227703b68394c11eb7c559195d1d

                        SHA1

                        bfefdbbfaf08f6d2bab87444a1b9db2214a7efc3

                        SHA256

                        721fb1054b7a6104f3c10ea7b9a295bf59ab6e280a490b7a1b1b48ed7a579f4d

                        SHA512

                        a4dc59e33511fec1204a05105c8375cac9ad4fa2c34eb3332d5836940cfef3d8eb6dbb91be01850c932f11ef15a2d624a4c88b112af1cc7e17cb7aa27b90b698

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zkfU2748ic.exe

                        Filesize

                        545KB

                        MD5

                        00990ea6dda301cbf10443f8c015acef

                        SHA1

                        114663a13c9c359dcd0b18726b05192d143f5330

                        SHA256

                        75fbe472c04fb63f384eb81c840383eb83735fb82c6e14359b8d839209925b89

                        SHA512

                        12fb0cf9a53b25f55f61cbfc5084099468db3ee7310195367dcfc66bd8a11217a6d909f5e98c42b76ffaed00fae9da04c0de0663a84d2e6d6cc7ac145359c17e

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zkfU2748ic.exe

                        Filesize

                        545KB

                        MD5

                        00990ea6dda301cbf10443f8c015acef

                        SHA1

                        114663a13c9c359dcd0b18726b05192d143f5330

                        SHA256

                        75fbe472c04fb63f384eb81c840383eb83735fb82c6e14359b8d839209925b89

                        SHA512

                        12fb0cf9a53b25f55f61cbfc5084099468db3ee7310195367dcfc66bd8a11217a6d909f5e98c42b76ffaed00fae9da04c0de0663a84d2e6d6cc7ac145359c17e

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nm82Jl03eB21.exe

                        Filesize

                        235KB

                        MD5

                        ac37b26719e17ef06e7eff1e80d80fad

                        SHA1

                        7027aea7add1fdbbe8da8d1f2929db974aea9d0b

                        SHA256

                        5260335d8eccfa3de42a0819ecd504b80c9cc8dad5bddbc7fd1e48763961133b

                        SHA512

                        f791a7c1af223bbcb7234e791b69796919abc0c2e220f746a52f151e2ae4e5a395aae0693324430efc069f2276ab82e43895ae8cc36103f1846a98a012bfcf0f

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nm82Jl03eB21.exe

                        Filesize

                        235KB

                        MD5

                        ac37b26719e17ef06e7eff1e80d80fad

                        SHA1

                        7027aea7add1fdbbe8da8d1f2929db974aea9d0b

                        SHA256

                        5260335d8eccfa3de42a0819ecd504b80c9cc8dad5bddbc7fd1e48763961133b

                        SHA512

                        f791a7c1af223bbcb7234e791b69796919abc0c2e220f746a52f151e2ae4e5a395aae0693324430efc069f2276ab82e43895ae8cc36103f1846a98a012bfcf0f

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zkBb4320Ol.exe

                        Filesize

                        359KB

                        MD5

                        f4b98e408633db22e6dc6052c3d55ef4

                        SHA1

                        f21e5fc9c3a91071d1d1cbbfac300c3db631ed87

                        SHA256

                        7f63afca509643c5eaf00507f046b39467035b21b4d92a586505c41b0535f872

                        SHA512

                        f218ce65310dc88fbefe9e28416632e631cfcdf5dd0f9307dd925d60975210917e4c94006ef6c4e8b4fd50aea9fe7b4b92f12b3e8cca2f0d210c00406ef10569

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zkBb4320Ol.exe

                        Filesize

                        359KB

                        MD5

                        f4b98e408633db22e6dc6052c3d55ef4

                        SHA1

                        f21e5fc9c3a91071d1d1cbbfac300c3db631ed87

                        SHA256

                        7f63afca509643c5eaf00507f046b39467035b21b4d92a586505c41b0535f872

                        SHA512

                        f218ce65310dc88fbefe9e28416632e631cfcdf5dd0f9307dd925d60975210917e4c94006ef6c4e8b4fd50aea9fe7b4b92f12b3e8cca2f0d210c00406ef10569

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\knFC58eO73.exe

                        Filesize

                        358KB

                        MD5

                        31b2d85b3f1d3b94e1e083f279157253

                        SHA1

                        eafe5f3a0d6e7ed45df80e12b9a90b73f826d7cb

                        SHA256

                        d1f2c7f85da04d39d91016d31e8c001a164d3df0dd4f45cb33df1d8538d3bc4a

                        SHA512

                        7efffe95f7825dd82fe1c7b6a14845c1d743db77b42a99ec7d463935e2d227b917c684ba9cd5dd8ddeac609f9569b4a29438f51cc2d7aca7fec78adb5fdc24eb

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\knFC58eO73.exe

                        Filesize

                        358KB

                        MD5

                        31b2d85b3f1d3b94e1e083f279157253

                        SHA1

                        eafe5f3a0d6e7ed45df80e12b9a90b73f826d7cb

                        SHA256

                        d1f2c7f85da04d39d91016d31e8c001a164d3df0dd4f45cb33df1d8538d3bc4a

                        SHA512

                        7efffe95f7825dd82fe1c7b6a14845c1d743db77b42a99ec7d463935e2d227b917c684ba9cd5dd8ddeac609f9569b4a29438f51cc2d7aca7fec78adb5fdc24eb

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ljfw43xK26.exe

                        Filesize

                        11KB

                        MD5

                        f35c88ec126f588ac318c68b081cb8c5

                        SHA1

                        e821b05704c63f06a6a758be40a2fff2a3cb7b18

                        SHA256

                        8e06906f3b6a5f0975cd3d9aa4536854f3acc644b8904ff7b5dbe843cc598cdd

                        SHA512

                        0a28bc6a20347af2f3d6e3007d3627913c5af613213a9867f6c4a64d8a253a59191f4be95f0fb1f4f7f612ffdebb503cb041b6675aaba08fec12305e9bf9a1ff

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ljfw43xK26.exe

                        Filesize

                        11KB

                        MD5

                        f35c88ec126f588ac318c68b081cb8c5

                        SHA1

                        e821b05704c63f06a6a758be40a2fff2a3cb7b18

                        SHA256

                        8e06906f3b6a5f0975cd3d9aa4536854f3acc644b8904ff7b5dbe843cc598cdd

                        SHA512

                        0a28bc6a20347af2f3d6e3007d3627913c5af613213a9867f6c4a64d8a253a59191f4be95f0fb1f4f7f612ffdebb503cb041b6675aaba08fec12305e9bf9a1ff

                      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                        Filesize

                        89KB

                        MD5

                        c1ddaca25d84d05e809ffce1d2b468b7

                        SHA1

                        38f257a264e657a20aa2fb3b48adb53c4bce5c8f

                        SHA256

                        cf2730fda38e3945795b00cfaa3074b9ec356b0ff7b2a493a318fccd34b677dd

                        SHA512

                        87fc6fc4aa53d4ba31da2802677599709cbd04556082cf3531e2c90659c23d5fa2210b658635f11f48b22d87e01c26bed5bf42f8139962441a3778754229f14e

                      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                        Filesize

                        89KB

                        MD5

                        c1ddaca25d84d05e809ffce1d2b468b7

                        SHA1

                        38f257a264e657a20aa2fb3b48adb53c4bce5c8f

                        SHA256

                        cf2730fda38e3945795b00cfaa3074b9ec356b0ff7b2a493a318fccd34b677dd

                        SHA512

                        87fc6fc4aa53d4ba31da2802677599709cbd04556082cf3531e2c90659c23d5fa2210b658635f11f48b22d87e01c26bed5bf42f8139962441a3778754229f14e

                      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                        Filesize

                        89KB

                        MD5

                        c1ddaca25d84d05e809ffce1d2b468b7

                        SHA1

                        38f257a264e657a20aa2fb3b48adb53c4bce5c8f

                        SHA256

                        cf2730fda38e3945795b00cfaa3074b9ec356b0ff7b2a493a318fccd34b677dd

                        SHA512

                        87fc6fc4aa53d4ba31da2802677599709cbd04556082cf3531e2c90659c23d5fa2210b658635f11f48b22d87e01c26bed5bf42f8139962441a3778754229f14e

                      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                        Filesize

                        162B

                        MD5

                        1b7c22a214949975556626d7217e9a39

                        SHA1

                        d01c97e2944166ed23e47e4a62ff471ab8fa031f

                        SHA256

                        340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                        SHA512

                        ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                      • memory/1836-195-0x0000000000FC0000-0x0000000000FCA000-memory.dmp

                        Filesize

                        40KB

                      • memory/2476-189-0x0000000007280000-0x0000000007290000-memory.dmp

                        Filesize

                        64KB

                      • memory/2476-172-0x0000000007130000-0x0000000007142000-memory.dmp

                        Filesize

                        72KB

                      • memory/2476-186-0x0000000007130000-0x0000000007142000-memory.dmp

                        Filesize

                        72KB

                      • memory/2476-187-0x0000000000400000-0x0000000002BC7000-memory.dmp

                        Filesize

                        39.8MB

                      • memory/2476-188-0x0000000007280000-0x0000000007290000-memory.dmp

                        Filesize

                        64KB

                      • memory/2476-182-0x0000000007130000-0x0000000007142000-memory.dmp

                        Filesize

                        72KB

                      • memory/2476-191-0x0000000000400000-0x0000000002BC7000-memory.dmp

                        Filesize

                        39.8MB

                      • memory/2476-180-0x0000000007130000-0x0000000007142000-memory.dmp

                        Filesize

                        72KB

                      • memory/2476-178-0x0000000007130000-0x0000000007142000-memory.dmp

                        Filesize

                        72KB

                      • memory/2476-176-0x0000000007130000-0x0000000007142000-memory.dmp

                        Filesize

                        72KB

                      • memory/2476-174-0x0000000007130000-0x0000000007142000-memory.dmp

                        Filesize

                        72KB

                      • memory/2476-160-0x0000000007130000-0x0000000007142000-memory.dmp

                        Filesize

                        72KB

                      • memory/2476-170-0x0000000007130000-0x0000000007142000-memory.dmp

                        Filesize

                        72KB

                      • memory/2476-168-0x0000000007130000-0x0000000007142000-memory.dmp

                        Filesize

                        72KB

                      • memory/2476-166-0x0000000007130000-0x0000000007142000-memory.dmp

                        Filesize

                        72KB

                      • memory/2476-164-0x0000000007130000-0x0000000007142000-memory.dmp

                        Filesize

                        72KB

                      • memory/2476-162-0x0000000007130000-0x0000000007142000-memory.dmp

                        Filesize

                        72KB

                      • memory/2476-184-0x0000000007130000-0x0000000007142000-memory.dmp

                        Filesize

                        72KB

                      • memory/2476-155-0x0000000002BD0000-0x0000000002BFD000-memory.dmp

                        Filesize

                        180KB

                      • memory/2476-156-0x0000000007290000-0x0000000007834000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/2476-157-0x0000000007280000-0x0000000007290000-memory.dmp

                        Filesize

                        64KB

                      • memory/2476-158-0x0000000007280000-0x0000000007290000-memory.dmp

                        Filesize

                        64KB

                      • memory/2476-159-0x0000000007130000-0x0000000007142000-memory.dmp

                        Filesize

                        72KB

                      • memory/4060-212-0x0000000000FD0000-0x0000000001002000-memory.dmp

                        Filesize

                        200KB

                      • memory/4060-218-0x0000000005B70000-0x0000000005B80000-memory.dmp

                        Filesize

                        64KB

                      • memory/4060-220-0x0000000005D40000-0x0000000005DA6000-memory.dmp

                        Filesize

                        408KB

                      • memory/4060-221-0x0000000006930000-0x00000000069C2000-memory.dmp

                        Filesize

                        584KB

                      • memory/4060-222-0x0000000006B90000-0x0000000006C06000-memory.dmp

                        Filesize

                        472KB

                      • memory/4060-223-0x0000000006B30000-0x0000000006B80000-memory.dmp

                        Filesize

                        320KB

                      • memory/4060-224-0x0000000007580000-0x0000000007742000-memory.dmp

                        Filesize

                        1.8MB

                      • memory/4060-225-0x0000000007C80000-0x00000000081AC000-memory.dmp

                        Filesize

                        5.2MB

                      • memory/4060-217-0x0000000005B70000-0x0000000005B80000-memory.dmp

                        Filesize

                        64KB

                      • memory/4060-216-0x00000000058D0000-0x000000000590C000-memory.dmp

                        Filesize

                        240KB

                      • memory/4060-215-0x0000000005870000-0x0000000005882000-memory.dmp

                        Filesize

                        72KB

                      • memory/4060-214-0x0000000005940000-0x0000000005A4A000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/4060-213-0x0000000005DF0000-0x0000000006408000-memory.dmp

                        Filesize

                        6.1MB