Analysis

  • max time kernel
    186s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2023 18:49

General

  • Target

    a590ab3a53f531a7368721d082883819038014e05d045914b24e2d01ec524994.exe

  • Size

    1.3MB

  • MD5

    bcbb1fec2425e7aa95c5a744c08f1d09

  • SHA1

    9ca4bcf183d023cf2747d747e5dddcb2b7272038

  • SHA256

    a590ab3a53f531a7368721d082883819038014e05d045914b24e2d01ec524994

  • SHA512

    3f6bd212f824f3b2da78c6848a1de8e37e8b0cecaae42610577d675901a0dd248d95f51bc5b0fab0e2a68fd3450028cf4acb6da6180fa9130471cf5c5561f624

  • SSDEEP

    24576:7yWFmBiXuq4lFyqqc7EcvWt3jbZV4eLXZJxd3y1Zk/jI9O7If6yWVw:u7ZqyyqucOtTbPLXZtiG

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a590ab3a53f531a7368721d082883819038014e05d045914b24e2d01ec524994.exe
    "C:\Users\Admin\AppData\Local\Temp\a590ab3a53f531a7368721d082883819038014e05d045914b24e2d01ec524994.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4616
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za827439.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za827439.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:524
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za691492.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za691492.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za698946.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za698946.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1316
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\03788702.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\03788702.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1156
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1948
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u42744325.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u42744325.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:744
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 1108
              6⤵
              • Program crash
              PID:4020
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w42KK58.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w42KK58.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2844
          • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4584
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:4848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xodnU96.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xodnU96.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2848
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          PID:1972
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 1384
          4⤵
          • Program crash
          PID:1072
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 744 -ip 744
    1⤵
      PID:3820
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2848 -ip 2848
      1⤵
        PID:1476

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        Filesize

        230KB

        MD5

        944f25fd9669a921408c108d19345a4b

        SHA1

        d771a58e92c92533725b9b1a4c4e0521c85f4b6e

        SHA256

        1d07b25ffc31e1f9313c17972a16d46cec7d5745196f7409ff409e45cdd1954d

        SHA512

        b25b5574ff145fea9c57915098c758b5f0b0b4e348398a278e68bcf09b877e860708198e480b92925f517ac394e8f7da72b42f6ef3231f3400ce9016effe8de8

      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        Filesize

        230KB

        MD5

        944f25fd9669a921408c108d19345a4b

        SHA1

        d771a58e92c92533725b9b1a4c4e0521c85f4b6e

        SHA256

        1d07b25ffc31e1f9313c17972a16d46cec7d5745196f7409ff409e45cdd1954d

        SHA512

        b25b5574ff145fea9c57915098c758b5f0b0b4e348398a278e68bcf09b877e860708198e480b92925f517ac394e8f7da72b42f6ef3231f3400ce9016effe8de8

      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        Filesize

        230KB

        MD5

        944f25fd9669a921408c108d19345a4b

        SHA1

        d771a58e92c92533725b9b1a4c4e0521c85f4b6e

        SHA256

        1d07b25ffc31e1f9313c17972a16d46cec7d5745196f7409ff409e45cdd1954d

        SHA512

        b25b5574ff145fea9c57915098c758b5f0b0b4e348398a278e68bcf09b877e860708198e480b92925f517ac394e8f7da72b42f6ef3231f3400ce9016effe8de8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za827439.exe
        Filesize

        1.2MB

        MD5

        d5575cb271ffad6a0db1f05b54ce29e8

        SHA1

        6654fa6339a4e38f5885933470319b7c958f5d45

        SHA256

        6c142536c6fa9af5d30c2c873a1abb9f81538643686690daa03db55ab7d4fdff

        SHA512

        9c2621faaa62b17cd4ae354c7cbfc90f77ce642af141c9d5adc513612ae766593556c42bf4a3f073c84d08ccc919b0d5fa7b2ddc82c97b1a2792dcd970564c2f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za827439.exe
        Filesize

        1.2MB

        MD5

        d5575cb271ffad6a0db1f05b54ce29e8

        SHA1

        6654fa6339a4e38f5885933470319b7c958f5d45

        SHA256

        6c142536c6fa9af5d30c2c873a1abb9f81538643686690daa03db55ab7d4fdff

        SHA512

        9c2621faaa62b17cd4ae354c7cbfc90f77ce642af141c9d5adc513612ae766593556c42bf4a3f073c84d08ccc919b0d5fa7b2ddc82c97b1a2792dcd970564c2f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xodnU96.exe
        Filesize

        576KB

        MD5

        80d48c7ac17b57fa230271d40ea14a01

        SHA1

        e9f74241a8b2f42a98e5d08c8cc8910b787a27d3

        SHA256

        36d8eecaec634360b7811d6133de11bd95632c20515a48349681cff3eb32af4d

        SHA512

        12f9a1f2e5ca3ea60609432d42f7e2caae08aed577dceb138380462cafd8d42f430c36627c98339b563ae2d18b701ea4bd18c2c110f6b57d9c1b785369528a57

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xodnU96.exe
        Filesize

        576KB

        MD5

        80d48c7ac17b57fa230271d40ea14a01

        SHA1

        e9f74241a8b2f42a98e5d08c8cc8910b787a27d3

        SHA256

        36d8eecaec634360b7811d6133de11bd95632c20515a48349681cff3eb32af4d

        SHA512

        12f9a1f2e5ca3ea60609432d42f7e2caae08aed577dceb138380462cafd8d42f430c36627c98339b563ae2d18b701ea4bd18c2c110f6b57d9c1b785369528a57

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za691492.exe
        Filesize

        738KB

        MD5

        34e047a72f945ca19a755fa17907233f

        SHA1

        1a7b286cb7fe2d2de7da1be78b365b97a933b22c

        SHA256

        6312ab6ad7f2063d8000d96bfd38107b2cd41e3c76622d92c7bf61e234886e61

        SHA512

        ca1bbd28a588ec6db31bec2d545a4be413d2f4e7136645fdd0ffd193ca2371bc69c7554bec192ad5203ffe630ef924a27342a1381ac57856e9475b0f009759c1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za691492.exe
        Filesize

        738KB

        MD5

        34e047a72f945ca19a755fa17907233f

        SHA1

        1a7b286cb7fe2d2de7da1be78b365b97a933b22c

        SHA256

        6312ab6ad7f2063d8000d96bfd38107b2cd41e3c76622d92c7bf61e234886e61

        SHA512

        ca1bbd28a588ec6db31bec2d545a4be413d2f4e7136645fdd0ffd193ca2371bc69c7554bec192ad5203ffe630ef924a27342a1381ac57856e9475b0f009759c1

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w42KK58.exe
        Filesize

        230KB

        MD5

        944f25fd9669a921408c108d19345a4b

        SHA1

        d771a58e92c92533725b9b1a4c4e0521c85f4b6e

        SHA256

        1d07b25ffc31e1f9313c17972a16d46cec7d5745196f7409ff409e45cdd1954d

        SHA512

        b25b5574ff145fea9c57915098c758b5f0b0b4e348398a278e68bcf09b877e860708198e480b92925f517ac394e8f7da72b42f6ef3231f3400ce9016effe8de8

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w42KK58.exe
        Filesize

        230KB

        MD5

        944f25fd9669a921408c108d19345a4b

        SHA1

        d771a58e92c92533725b9b1a4c4e0521c85f4b6e

        SHA256

        1d07b25ffc31e1f9313c17972a16d46cec7d5745196f7409ff409e45cdd1954d

        SHA512

        b25b5574ff145fea9c57915098c758b5f0b0b4e348398a278e68bcf09b877e860708198e480b92925f517ac394e8f7da72b42f6ef3231f3400ce9016effe8de8

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za698946.exe
        Filesize

        555KB

        MD5

        ae0f38c0de0303b114a9662b15c30967

        SHA1

        749e1d8b1ff6b5d4f4b295338a5fc00c2940b873

        SHA256

        37bc554c6990fb025007dca8f8591c9dec8eacaffcad3836588daec55a1e49ff

        SHA512

        5c52b988ba577e04576eaf94fd968c96589c25c19603abc2027a8dc2b0f250ada4b47445f94a0db1c8fa090831ba61e691f965dbc9bad68bbf70249653d67ffb

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za698946.exe
        Filesize

        555KB

        MD5

        ae0f38c0de0303b114a9662b15c30967

        SHA1

        749e1d8b1ff6b5d4f4b295338a5fc00c2940b873

        SHA256

        37bc554c6990fb025007dca8f8591c9dec8eacaffcad3836588daec55a1e49ff

        SHA512

        5c52b988ba577e04576eaf94fd968c96589c25c19603abc2027a8dc2b0f250ada4b47445f94a0db1c8fa090831ba61e691f965dbc9bad68bbf70249653d67ffb

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\03788702.exe
        Filesize

        302KB

        MD5

        afa7eef47eca6ec72c0e53346338be3f

        SHA1

        bf56388317e38d7ebf36ea6877980391773551e6

        SHA256

        4fa0a0c24a46353508d3e00e8d418c5d48969f175bed4423b2a18415205d55ef

        SHA512

        c63c869c01382c53aa56e758a370dac84b41b31637dfb3236faf08d67d3f0d2ebe227e9f9722a86ae394cb9c87cdc7d98d053b69ef636963935fb1fc048e3e4b

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\03788702.exe
        Filesize

        302KB

        MD5

        afa7eef47eca6ec72c0e53346338be3f

        SHA1

        bf56388317e38d7ebf36ea6877980391773551e6

        SHA256

        4fa0a0c24a46353508d3e00e8d418c5d48969f175bed4423b2a18415205d55ef

        SHA512

        c63c869c01382c53aa56e758a370dac84b41b31637dfb3236faf08d67d3f0d2ebe227e9f9722a86ae394cb9c87cdc7d98d053b69ef636963935fb1fc048e3e4b

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u42744325.exe
        Filesize

        393KB

        MD5

        af0834e3bdfa06fac710e67061e1e908

        SHA1

        2d959ce0971baf4f1b593d1af5e3535e36373e73

        SHA256

        84ca3b03bed744d1faede008adbbbd15991d161741aceaefe3dc39ca1fd499ff

        SHA512

        9683f9760c8816b62ea578c636f840c0279318a8cf40d2075ab21fbd13e9c6fcc1e7fc85188f9d2b3b2c241bc7dd5857bbdfa4743f8b627ac4c7dbedba68c018

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u42744325.exe
        Filesize

        393KB

        MD5

        af0834e3bdfa06fac710e67061e1e908

        SHA1

        2d959ce0971baf4f1b593d1af5e3535e36373e73

        SHA256

        84ca3b03bed744d1faede008adbbbd15991d161741aceaefe3dc39ca1fd499ff

        SHA512

        9683f9760c8816b62ea578c636f840c0279318a8cf40d2075ab21fbd13e9c6fcc1e7fc85188f9d2b3b2c241bc7dd5857bbdfa4743f8b627ac4c7dbedba68c018

      • C:\Windows\Temp\1.exe
        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Windows\Temp\1.exe
        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Windows\Temp\1.exe
        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Windows\Temp\1.exe
        Filesize

        168KB

        MD5

        f16fb63d4e551d3808e8f01f2671b57e

        SHA1

        781153ad6235a1152da112de1fb39a6f2d063575

        SHA256

        8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

        SHA512

        fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

      • C:\Windows\Temp\1.exe
        Filesize

        168KB

        MD5

        f16fb63d4e551d3808e8f01f2671b57e

        SHA1

        781153ad6235a1152da112de1fb39a6f2d063575

        SHA256

        8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

        SHA512

        fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

      • C:\Windows\Temp\1.exe
        Filesize

        168KB

        MD5

        f16fb63d4e551d3808e8f01f2671b57e

        SHA1

        781153ad6235a1152da112de1fb39a6f2d063575

        SHA256

        8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

        SHA512

        fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

      • memory/744-2347-0x0000000004E70000-0x0000000004E80000-memory.dmp
        Filesize

        64KB

      • memory/744-2342-0x0000000000810000-0x000000000083D000-memory.dmp
        Filesize

        180KB

      • memory/744-2343-0x0000000004E70000-0x0000000004E80000-memory.dmp
        Filesize

        64KB

      • memory/744-2344-0x0000000004E70000-0x0000000004E80000-memory.dmp
        Filesize

        64KB

      • memory/744-2348-0x0000000004E70000-0x0000000004E80000-memory.dmp
        Filesize

        64KB

      • memory/744-2349-0x0000000004E70000-0x0000000004E80000-memory.dmp
        Filesize

        64KB

      • memory/1156-178-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-165-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-202-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-204-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-206-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-208-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-210-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-212-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-214-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-216-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-218-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-220-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-222-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-224-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-226-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-228-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-2293-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
        Filesize

        64KB

      • memory/1156-2294-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
        Filesize

        64KB

      • memory/1156-2295-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
        Filesize

        64KB

      • memory/1156-198-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-2304-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
        Filesize

        64KB

      • memory/1156-196-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-194-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-192-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-190-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-161-0x0000000004AC0000-0x0000000005064000-memory.dmp
        Filesize

        5.6MB

      • memory/1156-188-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-186-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-184-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-182-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-180-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-176-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-174-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-172-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-170-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-168-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-166-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
        Filesize

        64KB

      • memory/1156-200-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1156-164-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
        Filesize

        64KB

      • memory/1156-162-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
        Filesize

        64KB

      • memory/1156-163-0x00000000049B0000-0x0000000004A01000-memory.dmp
        Filesize

        324KB

      • memory/1948-2312-0x0000000000F90000-0x0000000000F9A000-memory.dmp
        Filesize

        40KB

      • memory/1972-4540-0x0000000000C70000-0x0000000000C9E000-memory.dmp
        Filesize

        184KB

      • memory/2848-2386-0x00000000028B0000-0x00000000028C0000-memory.dmp
        Filesize

        64KB

      • memory/2848-4521-0x00000000028B0000-0x00000000028C0000-memory.dmp
        Filesize

        64KB

      • memory/2848-4523-0x00000000028B0000-0x00000000028C0000-memory.dmp
        Filesize

        64KB

      • memory/2848-4524-0x00000000028B0000-0x00000000028C0000-memory.dmp
        Filesize

        64KB

      • memory/2848-4528-0x00000000028B0000-0x00000000028C0000-memory.dmp
        Filesize

        64KB

      • memory/2848-2388-0x00000000028B0000-0x00000000028C0000-memory.dmp
        Filesize

        64KB

      • memory/2848-2384-0x0000000000A70000-0x0000000000ACB000-memory.dmp
        Filesize

        364KB