Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-03-2023 12:41

General

  • Target

    7214a52a0106c9bfb1e7c69516eb51ee96f67990501dd9de1a5dee9770670e70.exe

  • Size

    690KB

  • MD5

    ae6e74bcbdce4922e552d6c6b193fa44

  • SHA1

    d060f11e20db10aded493576175b22a5e57d6b08

  • SHA256

    7214a52a0106c9bfb1e7c69516eb51ee96f67990501dd9de1a5dee9770670e70

  • SHA512

    4a5548363b89fcfb5e27a8ad19f580a3a59281303259509722faaf9187f1baea4de8e9828c5fc69a93835fbeb7a7963ddba926920ae2509c9120f795f6981861

  • SSDEEP

    12288:CMrSy90rAjQa0FG9yiJ8kIgrwwECSDGxLHqthexBtqA09ABmlQ79cWQtyRgvP92q:0ypr0F03J8YwZ3D8HN7tRXmG7yMgvP9/

Malware Config

Extracted

Family

amadey

Version

3.68

C2

193.233.20.26/Do3m4Gor/index.php

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7214a52a0106c9bfb1e7c69516eb51ee96f67990501dd9de1a5dee9770670e70.exe
    "C:\Users\Admin\AppData\Local\Temp\7214a52a0106c9bfb1e7c69516eb51ee96f67990501dd9de1a5dee9770670e70.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zkxs1556Mk.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zkxs1556Mk.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1764
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zkyv9783hr.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zkyv9783hr.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3884
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\knqz40Cn38.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\knqz40Cn38.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4672
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 1080
            5⤵
            • Program crash
            PID:4332
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ljBJ32Dl12.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ljBJ32Dl12.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4092
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nm43Xr47nK07.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nm43Xr47nK07.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:628
        • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe
          "C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:5068
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN ghaaer.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:3756
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "ghaaer.exe" /P "Admin:N"&&CACLS "ghaaer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:640
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:3392
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "ghaaer.exe" /P "Admin:N"
                6⤵
                  PID:4356
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "ghaaer.exe" /P "Admin:R" /E
                  6⤵
                    PID:2160
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:3296
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:N"
                      6⤵
                        PID:408
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\5975271bda" /P "Admin:R" /E
                        6⤵
                          PID:636
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:4984
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rdzh09ad49.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rdzh09ad49.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5044
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4672 -ip 4672
                1⤵
                  PID:1488
                • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe
                  C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe
                  1⤵
                  • Executes dropped EXE
                  PID:4176
                • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe
                  C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe
                  1⤵
                  • Executes dropped EXE
                  PID:1872

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe

                  Filesize

                  235KB

                  MD5

                  ac37b26719e17ef06e7eff1e80d80fad

                  SHA1

                  7027aea7add1fdbbe8da8d1f2929db974aea9d0b

                  SHA256

                  5260335d8eccfa3de42a0819ecd504b80c9cc8dad5bddbc7fd1e48763961133b

                  SHA512

                  f791a7c1af223bbcb7234e791b69796919abc0c2e220f746a52f151e2ae4e5a395aae0693324430efc069f2276ab82e43895ae8cc36103f1846a98a012bfcf0f

                • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe

                  Filesize

                  235KB

                  MD5

                  ac37b26719e17ef06e7eff1e80d80fad

                  SHA1

                  7027aea7add1fdbbe8da8d1f2929db974aea9d0b

                  SHA256

                  5260335d8eccfa3de42a0819ecd504b80c9cc8dad5bddbc7fd1e48763961133b

                  SHA512

                  f791a7c1af223bbcb7234e791b69796919abc0c2e220f746a52f151e2ae4e5a395aae0693324430efc069f2276ab82e43895ae8cc36103f1846a98a012bfcf0f

                • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe

                  Filesize

                  235KB

                  MD5

                  ac37b26719e17ef06e7eff1e80d80fad

                  SHA1

                  7027aea7add1fdbbe8da8d1f2929db974aea9d0b

                  SHA256

                  5260335d8eccfa3de42a0819ecd504b80c9cc8dad5bddbc7fd1e48763961133b

                  SHA512

                  f791a7c1af223bbcb7234e791b69796919abc0c2e220f746a52f151e2ae4e5a395aae0693324430efc069f2276ab82e43895ae8cc36103f1846a98a012bfcf0f

                • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe

                  Filesize

                  235KB

                  MD5

                  ac37b26719e17ef06e7eff1e80d80fad

                  SHA1

                  7027aea7add1fdbbe8da8d1f2929db974aea9d0b

                  SHA256

                  5260335d8eccfa3de42a0819ecd504b80c9cc8dad5bddbc7fd1e48763961133b

                  SHA512

                  f791a7c1af223bbcb7234e791b69796919abc0c2e220f746a52f151e2ae4e5a395aae0693324430efc069f2276ab82e43895ae8cc36103f1846a98a012bfcf0f

                • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe

                  Filesize

                  235KB

                  MD5

                  ac37b26719e17ef06e7eff1e80d80fad

                  SHA1

                  7027aea7add1fdbbe8da8d1f2929db974aea9d0b

                  SHA256

                  5260335d8eccfa3de42a0819ecd504b80c9cc8dad5bddbc7fd1e48763961133b

                  SHA512

                  f791a7c1af223bbcb7234e791b69796919abc0c2e220f746a52f151e2ae4e5a395aae0693324430efc069f2276ab82e43895ae8cc36103f1846a98a012bfcf0f

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rdzh09ad49.exe

                  Filesize

                  176KB

                  MD5

                  4d44a360f022b4cb11e9e8b91ad96b89

                  SHA1

                  43e2edc1a14788322206607d401e3d755e80e0da

                  SHA256

                  754a766358bfbd90de4b9a4469c5a2ecc8a63655f0705c29585359805727a2a4

                  SHA512

                  6605e3e84d1dcbd64721172ef22313dc8f5fede3138a0be7b37d9e9f558f529305ace1d0339c9e953c1339ecda8364d4bacc0096d5e56037e2c1af56d7df7267

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rdzh09ad49.exe

                  Filesize

                  176KB

                  MD5

                  4d44a360f022b4cb11e9e8b91ad96b89

                  SHA1

                  43e2edc1a14788322206607d401e3d755e80e0da

                  SHA256

                  754a766358bfbd90de4b9a4469c5a2ecc8a63655f0705c29585359805727a2a4

                  SHA512

                  6605e3e84d1dcbd64721172ef22313dc8f5fede3138a0be7b37d9e9f558f529305ace1d0339c9e953c1339ecda8364d4bacc0096d5e56037e2c1af56d7df7267

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zkxs1556Mk.exe

                  Filesize

                  545KB

                  MD5

                  9f1560721172f71fc4d2aa197fedb668

                  SHA1

                  f48929ce61f9b0f21f68823ae418f04abed457f1

                  SHA256

                  9d2006ada5022047867e962057915f53192c3a58cfa06ec0965facd002a27e9a

                  SHA512

                  01f1c12b3a71eb46459a922c3dd3f925ef9b665a012569a8c9db866654c67064be61055d952e5f8c90a0a243751bbe1aeccd572c68a546d7495d4504f6a0162d

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zkxs1556Mk.exe

                  Filesize

                  545KB

                  MD5

                  9f1560721172f71fc4d2aa197fedb668

                  SHA1

                  f48929ce61f9b0f21f68823ae418f04abed457f1

                  SHA256

                  9d2006ada5022047867e962057915f53192c3a58cfa06ec0965facd002a27e9a

                  SHA512

                  01f1c12b3a71eb46459a922c3dd3f925ef9b665a012569a8c9db866654c67064be61055d952e5f8c90a0a243751bbe1aeccd572c68a546d7495d4504f6a0162d

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nm43Xr47nK07.exe

                  Filesize

                  235KB

                  MD5

                  ac37b26719e17ef06e7eff1e80d80fad

                  SHA1

                  7027aea7add1fdbbe8da8d1f2929db974aea9d0b

                  SHA256

                  5260335d8eccfa3de42a0819ecd504b80c9cc8dad5bddbc7fd1e48763961133b

                  SHA512

                  f791a7c1af223bbcb7234e791b69796919abc0c2e220f746a52f151e2ae4e5a395aae0693324430efc069f2276ab82e43895ae8cc36103f1846a98a012bfcf0f

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nm43Xr47nK07.exe

                  Filesize

                  235KB

                  MD5

                  ac37b26719e17ef06e7eff1e80d80fad

                  SHA1

                  7027aea7add1fdbbe8da8d1f2929db974aea9d0b

                  SHA256

                  5260335d8eccfa3de42a0819ecd504b80c9cc8dad5bddbc7fd1e48763961133b

                  SHA512

                  f791a7c1af223bbcb7234e791b69796919abc0c2e220f746a52f151e2ae4e5a395aae0693324430efc069f2276ab82e43895ae8cc36103f1846a98a012bfcf0f

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zkyv9783hr.exe

                  Filesize

                  359KB

                  MD5

                  6fa7bd5b4a2e94bb0a97184d35601d46

                  SHA1

                  739f4f32e677cc83f67b53b086b45c0291972cc8

                  SHA256

                  b0c1ab0d9575c3fdba591a1d2466c47c8283a4b1bd89d36f0821f72eb049f6f4

                  SHA512

                  258c02ef970d7e1d614c19e112dd124be1bba893627c8d7be3d695c44cc44a5d98699df1418f8020fba110f67491d484adeadcde63f6a209e68ed0fc523a7ee1

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zkyv9783hr.exe

                  Filesize

                  359KB

                  MD5

                  6fa7bd5b4a2e94bb0a97184d35601d46

                  SHA1

                  739f4f32e677cc83f67b53b086b45c0291972cc8

                  SHA256

                  b0c1ab0d9575c3fdba591a1d2466c47c8283a4b1bd89d36f0821f72eb049f6f4

                  SHA512

                  258c02ef970d7e1d614c19e112dd124be1bba893627c8d7be3d695c44cc44a5d98699df1418f8020fba110f67491d484adeadcde63f6a209e68ed0fc523a7ee1

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\knqz40Cn38.exe

                  Filesize

                  358KB

                  MD5

                  31b2d85b3f1d3b94e1e083f279157253

                  SHA1

                  eafe5f3a0d6e7ed45df80e12b9a90b73f826d7cb

                  SHA256

                  d1f2c7f85da04d39d91016d31e8c001a164d3df0dd4f45cb33df1d8538d3bc4a

                  SHA512

                  7efffe95f7825dd82fe1c7b6a14845c1d743db77b42a99ec7d463935e2d227b917c684ba9cd5dd8ddeac609f9569b4a29438f51cc2d7aca7fec78adb5fdc24eb

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\knqz40Cn38.exe

                  Filesize

                  358KB

                  MD5

                  31b2d85b3f1d3b94e1e083f279157253

                  SHA1

                  eafe5f3a0d6e7ed45df80e12b9a90b73f826d7cb

                  SHA256

                  d1f2c7f85da04d39d91016d31e8c001a164d3df0dd4f45cb33df1d8538d3bc4a

                  SHA512

                  7efffe95f7825dd82fe1c7b6a14845c1d743db77b42a99ec7d463935e2d227b917c684ba9cd5dd8ddeac609f9569b4a29438f51cc2d7aca7fec78adb5fdc24eb

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ljBJ32Dl12.exe

                  Filesize

                  11KB

                  MD5

                  174c5768a5c0f1ff60de11b420db8ff2

                  SHA1

                  1f5156fc876e4d1220d3254e364d61da835db36e

                  SHA256

                  c05dc0b56e8d6507b1cd843496e41257ca6bb14fbec7b264917146ab78b29fe0

                  SHA512

                  697095e87e5aec6d42b867f3a599f949090f487b6d6f5f58d4cef7f432dfd9b7d782d28b50739e1b7d467370d1dfd9962871b3466218669c9f16ae5ca41217ed

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ljBJ32Dl12.exe

                  Filesize

                  11KB

                  MD5

                  174c5768a5c0f1ff60de11b420db8ff2

                  SHA1

                  1f5156fc876e4d1220d3254e364d61da835db36e

                  SHA256

                  c05dc0b56e8d6507b1cd843496e41257ca6bb14fbec7b264917146ab78b29fe0

                  SHA512

                  697095e87e5aec6d42b867f3a599f949090f487b6d6f5f58d4cef7f432dfd9b7d782d28b50739e1b7d467370d1dfd9962871b3466218669c9f16ae5ca41217ed

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  c1ddaca25d84d05e809ffce1d2b468b7

                  SHA1

                  38f257a264e657a20aa2fb3b48adb53c4bce5c8f

                  SHA256

                  cf2730fda38e3945795b00cfaa3074b9ec356b0ff7b2a493a318fccd34b677dd

                  SHA512

                  87fc6fc4aa53d4ba31da2802677599709cbd04556082cf3531e2c90659c23d5fa2210b658635f11f48b22d87e01c26bed5bf42f8139962441a3778754229f14e

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  c1ddaca25d84d05e809ffce1d2b468b7

                  SHA1

                  38f257a264e657a20aa2fb3b48adb53c4bce5c8f

                  SHA256

                  cf2730fda38e3945795b00cfaa3074b9ec356b0ff7b2a493a318fccd34b677dd

                  SHA512

                  87fc6fc4aa53d4ba31da2802677599709cbd04556082cf3531e2c90659c23d5fa2210b658635f11f48b22d87e01c26bed5bf42f8139962441a3778754229f14e

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  c1ddaca25d84d05e809ffce1d2b468b7

                  SHA1

                  38f257a264e657a20aa2fb3b48adb53c4bce5c8f

                  SHA256

                  cf2730fda38e3945795b00cfaa3074b9ec356b0ff7b2a493a318fccd34b677dd

                  SHA512

                  87fc6fc4aa53d4ba31da2802677599709cbd04556082cf3531e2c90659c23d5fa2210b658635f11f48b22d87e01c26bed5bf42f8139962441a3778754229f14e

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                  Filesize

                  162B

                  MD5

                  1b7c22a214949975556626d7217e9a39

                  SHA1

                  d01c97e2944166ed23e47e4a62ff471ab8fa031f

                  SHA256

                  340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                  SHA512

                  ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                • memory/4092-197-0x0000000000BC0000-0x0000000000BCA000-memory.dmp

                  Filesize

                  40KB

                • memory/4672-192-0x0000000004840000-0x0000000004850000-memory.dmp

                  Filesize

                  64KB

                • memory/4672-174-0x0000000004C10000-0x0000000004C22000-memory.dmp

                  Filesize

                  72KB

                • memory/4672-186-0x0000000004840000-0x0000000004850000-memory.dmp

                  Filesize

                  64KB

                • memory/4672-187-0x0000000004840000-0x0000000004850000-memory.dmp

                  Filesize

                  64KB

                • memory/4672-188-0x0000000000400000-0x0000000002BC7000-memory.dmp

                  Filesize

                  39.8MB

                • memory/4672-190-0x0000000004840000-0x0000000004850000-memory.dmp

                  Filesize

                  64KB

                • memory/4672-191-0x0000000004840000-0x0000000004850000-memory.dmp

                  Filesize

                  64KB

                • memory/4672-184-0x0000000004C10000-0x0000000004C22000-memory.dmp

                  Filesize

                  72KB

                • memory/4672-193-0x0000000000400000-0x0000000002BC7000-memory.dmp

                  Filesize

                  39.8MB

                • memory/4672-182-0x0000000004C10000-0x0000000004C22000-memory.dmp

                  Filesize

                  72KB

                • memory/4672-180-0x0000000004C10000-0x0000000004C22000-memory.dmp

                  Filesize

                  72KB

                • memory/4672-178-0x0000000004C10000-0x0000000004C22000-memory.dmp

                  Filesize

                  72KB

                • memory/4672-176-0x0000000004C10000-0x0000000004C22000-memory.dmp

                  Filesize

                  72KB

                • memory/4672-162-0x0000000004C10000-0x0000000004C22000-memory.dmp

                  Filesize

                  72KB

                • memory/4672-172-0x0000000004C10000-0x0000000004C22000-memory.dmp

                  Filesize

                  72KB

                • memory/4672-170-0x0000000004C10000-0x0000000004C22000-memory.dmp

                  Filesize

                  72KB

                • memory/4672-168-0x0000000004C10000-0x0000000004C22000-memory.dmp

                  Filesize

                  72KB

                • memory/4672-166-0x0000000004C10000-0x0000000004C22000-memory.dmp

                  Filesize

                  72KB

                • memory/4672-164-0x0000000004C10000-0x0000000004C22000-memory.dmp

                  Filesize

                  72KB

                • memory/4672-185-0x0000000004840000-0x0000000004850000-memory.dmp

                  Filesize

                  64KB

                • memory/4672-155-0x0000000002BD0000-0x0000000002BFD000-memory.dmp

                  Filesize

                  180KB

                • memory/4672-156-0x0000000007300000-0x00000000078A4000-memory.dmp

                  Filesize

                  5.6MB

                • memory/4672-157-0x0000000004C10000-0x0000000004C22000-memory.dmp

                  Filesize

                  72KB

                • memory/4672-158-0x0000000004C10000-0x0000000004C22000-memory.dmp

                  Filesize

                  72KB

                • memory/4672-160-0x0000000004C10000-0x0000000004C22000-memory.dmp

                  Filesize

                  72KB

                • memory/5044-214-0x0000000000050000-0x0000000000082000-memory.dmp

                  Filesize

                  200KB

                • memory/5044-221-0x0000000005810000-0x00000000058A2000-memory.dmp

                  Filesize

                  584KB

                • memory/5044-222-0x0000000005BF0000-0x0000000005C66000-memory.dmp

                  Filesize

                  472KB

                • memory/5044-223-0x0000000005C70000-0x0000000005CC0000-memory.dmp

                  Filesize

                  320KB

                • memory/5044-224-0x00000000049A0000-0x00000000049B0000-memory.dmp

                  Filesize

                  64KB

                • memory/5044-225-0x00000000065E0000-0x00000000067A2000-memory.dmp

                  Filesize

                  1.8MB

                • memory/5044-226-0x0000000006CE0000-0x000000000720C000-memory.dmp

                  Filesize

                  5.2MB

                • memory/5044-220-0x0000000004C60000-0x0000000004CC6000-memory.dmp

                  Filesize

                  408KB

                • memory/5044-219-0x00000000049A0000-0x00000000049B0000-memory.dmp

                  Filesize

                  64KB

                • memory/5044-218-0x0000000004950000-0x000000000498C000-memory.dmp

                  Filesize

                  240KB

                • memory/5044-217-0x00000000048F0000-0x0000000004902000-memory.dmp

                  Filesize

                  72KB

                • memory/5044-216-0x00000000049C0000-0x0000000004ACA000-memory.dmp

                  Filesize

                  1.0MB

                • memory/5044-215-0x0000000004E40000-0x0000000005458000-memory.dmp

                  Filesize

                  6.1MB