Analysis

  • max time kernel
    208s
  • max time network
    227s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 22:15

General

  • Target

    646f4cc13154b2ad315ed037a66af16853bda25fb88e9244545df61a1f6ac675.exe

  • Size

    1.3MB

  • MD5

    75ff5a6005005b390795e1349914c296

  • SHA1

    2cb63ef501197caadda283d04b6cd56b17b8bb91

  • SHA256

    646f4cc13154b2ad315ed037a66af16853bda25fb88e9244545df61a1f6ac675

  • SHA512

    8892574063210fdb77deac418739c2fb668c404ffc1d3a9050c5e347fee9b4ee9874b9570ad4ec86fe2c909f4b0f01aeaede5a93f797a52bfd7055ba235cc5aa

  • SSDEEP

    24576:FygKkraGUb2mzmc+1ELzPtBC4bWumxYvoMcPU9IxjdADbv+PO5dJNeagdLdo:glkeGeKc/Lbt4tWvo5caxj6nl7L

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\646f4cc13154b2ad315ed037a66af16853bda25fb88e9244545df61a1f6ac675.exe
    "C:\Users\Admin\AppData\Local\Temp\646f4cc13154b2ad315ed037a66af16853bda25fb88e9244545df61a1f6ac675.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za864162.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za864162.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:972
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za050289.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za050289.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3932
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za415532.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za415532.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4296
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\24862050.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\24862050.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1516
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3600
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u79689744.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u79689744.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3424
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 1088
              6⤵
              • Program crash
              PID:3116
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w29bG22.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w29bG22.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3564
          • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2532
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:4644
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xfMpc26.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xfMpc26.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1976
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          PID:4036
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 1376
          4⤵
          • Program crash
          PID:1808
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3424 -ip 3424
    1⤵
      PID:2344
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1976 -ip 1976
      1⤵
        PID:4496

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

              Filesize

              230KB

              MD5

              c908340f5046fbf2ae76988cefbc43d5

              SHA1

              9d14e3ba90e0dc38148800ff5994890d75edfabb

              SHA256

              69ffd98065c40497be1c61aca78eff2469b9f0b4102bba77aaaf56e67b82c514

              SHA512

              2f9e3a0477a646edc45d1c383832ffed52391335f876b677ed23554566cfd776d0a0b954d2e5aaf393b7e44a41562f65b06c300958f553e637f84ada1d9481d6

            • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

              Filesize

              230KB

              MD5

              c908340f5046fbf2ae76988cefbc43d5

              SHA1

              9d14e3ba90e0dc38148800ff5994890d75edfabb

              SHA256

              69ffd98065c40497be1c61aca78eff2469b9f0b4102bba77aaaf56e67b82c514

              SHA512

              2f9e3a0477a646edc45d1c383832ffed52391335f876b677ed23554566cfd776d0a0b954d2e5aaf393b7e44a41562f65b06c300958f553e637f84ada1d9481d6

            • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

              Filesize

              230KB

              MD5

              c908340f5046fbf2ae76988cefbc43d5

              SHA1

              9d14e3ba90e0dc38148800ff5994890d75edfabb

              SHA256

              69ffd98065c40497be1c61aca78eff2469b9f0b4102bba77aaaf56e67b82c514

              SHA512

              2f9e3a0477a646edc45d1c383832ffed52391335f876b677ed23554566cfd776d0a0b954d2e5aaf393b7e44a41562f65b06c300958f553e637f84ada1d9481d6

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za864162.exe

              Filesize

              1.2MB

              MD5

              dc1b98adcb1d21535fb51baeff63e781

              SHA1

              8151251118578369804374470300459e84529c66

              SHA256

              f90d1b34f2ea18837cbefffed9063e9a50d5a027f3a9c387ce0d0c46eb1ef88b

              SHA512

              945f28998ab1effb747090865d799ce3e9f0c9d77061042f7f430fd7fa37b81af2c59e9f953319566512efac9c3e1bc9170e4a3a05a6dfe34dfb4e8f1be9396e

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za864162.exe

              Filesize

              1.2MB

              MD5

              dc1b98adcb1d21535fb51baeff63e781

              SHA1

              8151251118578369804374470300459e84529c66

              SHA256

              f90d1b34f2ea18837cbefffed9063e9a50d5a027f3a9c387ce0d0c46eb1ef88b

              SHA512

              945f28998ab1effb747090865d799ce3e9f0c9d77061042f7f430fd7fa37b81af2c59e9f953319566512efac9c3e1bc9170e4a3a05a6dfe34dfb4e8f1be9396e

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xfMpc26.exe

              Filesize

              574KB

              MD5

              f5f3d919061934a3236823aca55e1cfd

              SHA1

              58db962bafa91f8b5dd18eb911f6f47c64c51620

              SHA256

              f63aaaea4992246377200031625d50d1f6316ea55870b1f6279205f407eb60ae

              SHA512

              23a33814777faf4c04da56631725bb81645b8f6d447fd7ea44f5faac73d378ed71f752e69cc6bb73aad72d9329be7785c67299f60f5b45db1da878b270d6b726

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xfMpc26.exe

              Filesize

              574KB

              MD5

              f5f3d919061934a3236823aca55e1cfd

              SHA1

              58db962bafa91f8b5dd18eb911f6f47c64c51620

              SHA256

              f63aaaea4992246377200031625d50d1f6316ea55870b1f6279205f407eb60ae

              SHA512

              23a33814777faf4c04da56631725bb81645b8f6d447fd7ea44f5faac73d378ed71f752e69cc6bb73aad72d9329be7785c67299f60f5b45db1da878b270d6b726

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za050289.exe

              Filesize

              737KB

              MD5

              15263338e56e6ed2ba9de3fb8725c950

              SHA1

              438fca56a5a3b2121a267c3597a05b9fd9c5916e

              SHA256

              453f5befa6239dbccbaded6e106c236441a0d26ac3e857b6ad7635a7a765c84f

              SHA512

              dba425db0d1ea91b0d417b1ff4fb0b9191ee62b9c11f5a180ad1f42ab844f979f78a95c2b3e8453eb0630d024b0e0ef40f877883b38623a73a5e7e7408aec640

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za050289.exe

              Filesize

              737KB

              MD5

              15263338e56e6ed2ba9de3fb8725c950

              SHA1

              438fca56a5a3b2121a267c3597a05b9fd9c5916e

              SHA256

              453f5befa6239dbccbaded6e106c236441a0d26ac3e857b6ad7635a7a765c84f

              SHA512

              dba425db0d1ea91b0d417b1ff4fb0b9191ee62b9c11f5a180ad1f42ab844f979f78a95c2b3e8453eb0630d024b0e0ef40f877883b38623a73a5e7e7408aec640

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w29bG22.exe

              Filesize

              230KB

              MD5

              c908340f5046fbf2ae76988cefbc43d5

              SHA1

              9d14e3ba90e0dc38148800ff5994890d75edfabb

              SHA256

              69ffd98065c40497be1c61aca78eff2469b9f0b4102bba77aaaf56e67b82c514

              SHA512

              2f9e3a0477a646edc45d1c383832ffed52391335f876b677ed23554566cfd776d0a0b954d2e5aaf393b7e44a41562f65b06c300958f553e637f84ada1d9481d6

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w29bG22.exe

              Filesize

              230KB

              MD5

              c908340f5046fbf2ae76988cefbc43d5

              SHA1

              9d14e3ba90e0dc38148800ff5994890d75edfabb

              SHA256

              69ffd98065c40497be1c61aca78eff2469b9f0b4102bba77aaaf56e67b82c514

              SHA512

              2f9e3a0477a646edc45d1c383832ffed52391335f876b677ed23554566cfd776d0a0b954d2e5aaf393b7e44a41562f65b06c300958f553e637f84ada1d9481d6

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za415532.exe

              Filesize

              554KB

              MD5

              a62c334060752d20de5d0259f63485b8

              SHA1

              b41a56acc30b4eaade35d2bc6f0210bd75a7a742

              SHA256

              b978d235735bfd8cfd2079b3f050fd0aa2ae2b6ef5e47192b3b8c2fc59905ecd

              SHA512

              3d4b63f9d79dea9a84ab22e09791fae223bd32fb0e2ddd0f9e28ff927125227f3e8d088fabfc596eb38081186645c6ffa2391d7fd36c8f82c0af82a78deaf4d2

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za415532.exe

              Filesize

              554KB

              MD5

              a62c334060752d20de5d0259f63485b8

              SHA1

              b41a56acc30b4eaade35d2bc6f0210bd75a7a742

              SHA256

              b978d235735bfd8cfd2079b3f050fd0aa2ae2b6ef5e47192b3b8c2fc59905ecd

              SHA512

              3d4b63f9d79dea9a84ab22e09791fae223bd32fb0e2ddd0f9e28ff927125227f3e8d088fabfc596eb38081186645c6ffa2391d7fd36c8f82c0af82a78deaf4d2

            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\24862050.exe

              Filesize

              303KB

              MD5

              491ab690b99977a8fe8dae06e660e833

              SHA1

              186823cdca8371d4437d60c49f814d0de975c55a

              SHA256

              4499b4c43c1b5b97178d97fc3679591634c7261f15785aed049c80f03d132426

              SHA512

              abde3979c51e57fb488e6c16409df3d8825941d4cdccf55da0005e219b7923248ad831f8f6605b74a1f42b51678174853c47f9e956e8aac28ac52a14b378e5a3

            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\24862050.exe

              Filesize

              303KB

              MD5

              491ab690b99977a8fe8dae06e660e833

              SHA1

              186823cdca8371d4437d60c49f814d0de975c55a

              SHA256

              4499b4c43c1b5b97178d97fc3679591634c7261f15785aed049c80f03d132426

              SHA512

              abde3979c51e57fb488e6c16409df3d8825941d4cdccf55da0005e219b7923248ad831f8f6605b74a1f42b51678174853c47f9e956e8aac28ac52a14b378e5a3

            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u79689744.exe

              Filesize

              391KB

              MD5

              b82e41d257a04270d141f000536320eb

              SHA1

              9f8ff3547db62bc28b9cb8a8e5329ec8b08d7315

              SHA256

              348dc4c05ce9f6c50045f7c49d48fcced8cfd484a8555626b92775e52839f903

              SHA512

              de83c5280a4ae4442d15a6796d9391b81ccf32ae13f7a0665e202c43fed9e31b59546019d1b7a9e47f219698a7732a52f6427d2518a96b52ac84a5532642c1fd

            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u79689744.exe

              Filesize

              391KB

              MD5

              b82e41d257a04270d141f000536320eb

              SHA1

              9f8ff3547db62bc28b9cb8a8e5329ec8b08d7315

              SHA256

              348dc4c05ce9f6c50045f7c49d48fcced8cfd484a8555626b92775e52839f903

              SHA512

              de83c5280a4ae4442d15a6796d9391b81ccf32ae13f7a0665e202c43fed9e31b59546019d1b7a9e47f219698a7732a52f6427d2518a96b52ac84a5532642c1fd

            • C:\Windows\Temp\1.exe

              Filesize

              11KB

              MD5

              7e93bacbbc33e6652e147e7fe07572a0

              SHA1

              421a7167da01c8da4dc4d5234ca3dd84e319e762

              SHA256

              850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

              SHA512

              250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

            • C:\Windows\Temp\1.exe

              Filesize

              11KB

              MD5

              7e93bacbbc33e6652e147e7fe07572a0

              SHA1

              421a7167da01c8da4dc4d5234ca3dd84e319e762

              SHA256

              850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

              SHA512

              250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

            • C:\Windows\Temp\1.exe

              Filesize

              11KB

              MD5

              7e93bacbbc33e6652e147e7fe07572a0

              SHA1

              421a7167da01c8da4dc4d5234ca3dd84e319e762

              SHA256

              850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

              SHA512

              250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

            • C:\Windows\Temp\1.exe

              Filesize

              168KB

              MD5

              f16fb63d4e551d3808e8f01f2671b57e

              SHA1

              781153ad6235a1152da112de1fb39a6f2d063575

              SHA256

              8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

              SHA512

              fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

            • C:\Windows\Temp\1.exe

              Filesize

              168KB

              MD5

              f16fb63d4e551d3808e8f01f2671b57e

              SHA1

              781153ad6235a1152da112de1fb39a6f2d063575

              SHA256

              8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

              SHA512

              fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

            • C:\Windows\Temp\1.exe

              Filesize

              168KB

              MD5

              f16fb63d4e551d3808e8f01f2671b57e

              SHA1

              781153ad6235a1152da112de1fb39a6f2d063575

              SHA256

              8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

              SHA512

              fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

            • memory/1516-210-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-2295-0x0000000004A70000-0x0000000004A80000-memory.dmp

              Filesize

              64KB

            • memory/1516-182-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-180-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-184-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-186-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-188-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-190-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-192-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-194-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-196-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-198-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-200-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-202-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-204-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-206-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-208-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-176-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-212-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-214-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-216-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-218-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-220-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-222-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-224-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-228-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-226-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-2293-0x0000000004A70000-0x0000000004A80000-memory.dmp

              Filesize

              64KB

            • memory/1516-2294-0x0000000004A70000-0x0000000004A80000-memory.dmp

              Filesize

              64KB

            • memory/1516-178-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-2297-0x0000000004A70000-0x0000000004A80000-memory.dmp

              Filesize

              64KB

            • memory/1516-161-0x0000000004AE0000-0x0000000005084000-memory.dmp

              Filesize

              5.6MB

            • memory/1516-163-0x0000000004A70000-0x0000000004A80000-memory.dmp

              Filesize

              64KB

            • memory/1516-162-0x0000000004A70000-0x0000000004A80000-memory.dmp

              Filesize

              64KB

            • memory/1516-164-0x0000000004A70000-0x0000000004A80000-memory.dmp

              Filesize

              64KB

            • memory/1516-165-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-166-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-168-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-170-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-174-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1516-172-0x00000000050D0000-0x0000000005121000-memory.dmp

              Filesize

              324KB

            • memory/1976-4539-0x00000000050E0000-0x00000000050F0000-memory.dmp

              Filesize

              64KB

            • memory/1976-2380-0x00000000050E0000-0x00000000050F0000-memory.dmp

              Filesize

              64KB

            • memory/1976-4541-0x00000000050E0000-0x00000000050F0000-memory.dmp

              Filesize

              64KB

            • memory/1976-4540-0x00000000050E0000-0x00000000050F0000-memory.dmp

              Filesize

              64KB

            • memory/1976-2383-0x00000000050E0000-0x00000000050F0000-memory.dmp

              Filesize

              64KB

            • memory/1976-2379-0x0000000000910000-0x000000000096B000-memory.dmp

              Filesize

              364KB

            • memory/1976-4526-0x00000000050E0000-0x00000000050F0000-memory.dmp

              Filesize

              64KB

            • memory/3424-2315-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

              Filesize

              64KB

            • memory/3424-2348-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

              Filesize

              64KB

            • memory/3424-2316-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

              Filesize

              64KB

            • memory/3424-2314-0x0000000000810000-0x000000000083D000-memory.dmp

              Filesize

              180KB

            • memory/3424-2349-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

              Filesize

              64KB

            • memory/3424-2317-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

              Filesize

              64KB

            • memory/3424-2347-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

              Filesize

              64KB

            • memory/3600-2312-0x0000000000900000-0x000000000090A000-memory.dmp

              Filesize

              40KB

            • memory/4036-4543-0x00000000006F0000-0x000000000071E000-memory.dmp

              Filesize

              184KB