Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-06-2023 08:54

General

  • Target

    bfb9673aa05a5ffe99bf6dbe80e621e2c6d1883e132a4d6888430b5913a1d69b.exe

  • Size

    801KB

  • MD5

    a5526238e78f6e7e9463f06448dd210a

  • SHA1

    926e75fee8c64cbdc2c20be74eec713f2cdc2fde

  • SHA256

    bfb9673aa05a5ffe99bf6dbe80e621e2c6d1883e132a4d6888430b5913a1d69b

  • SHA512

    539b1c221a16de23eed19b6ab8f656ce502d65711178d9c157945f52fb2bc3a5ea9f6598e3cb0f685b9d95b3b48ac967288b597eda8cf476dba561efedfeb488

  • SSDEEP

    24576:4yqupAOP4UhyTMY4w6hiZaG64O0F0EZul:/NivUhIMRdhId7k

Malware Config

Extracted

Family

redline

Botnet

joker

C2

83.97.73.130:19061

Attributes
  • auth_value

    a98d303cc28bb3b32a23c59214ae3bc0

Extracted

Family

redline

Botnet

mana

C2

83.97.73.130:19061

Attributes
  • auth_value

    4f5139d6c845fe72d05faf05763b6c31

Extracted

Family

amadey

Version

3.84

C2

77.91.68.63/doma/net/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bfb9673aa05a5ffe99bf6dbe80e621e2c6d1883e132a4d6888430b5913a1d69b.exe
    "C:\Users\Admin\AppData\Local\Temp\bfb9673aa05a5ffe99bf6dbe80e621e2c6d1883e132a4d6888430b5913a1d69b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4632
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8565662.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8565662.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4396
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4165699.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4165699.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1644
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9590266.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9590266.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3632
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0262040.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0262040.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3536
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7219173.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7219173.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1636
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2797732.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2797732.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2768
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d7219085.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d7219085.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1488
        • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
          "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4816
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:3924
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4928
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:1440
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "rugen.exe" /P "Admin:N"
                6⤵
                  PID:3720
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "rugen.exe" /P "Admin:R" /E
                  6⤵
                    PID:1160
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:3124
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\200f691d32" /P "Admin:N"
                      6⤵
                        PID:4728
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\200f691d32" /P "Admin:R" /E
                        6⤵
                          PID:944
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:264
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e8889833.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e8889833.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5056
              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                1⤵
                • Executes dropped EXE
                PID:3804

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                2KB

                MD5

                6bb82e63cdf8de9d79154002b8987663

                SHA1

                45a4870c3dbff09b9ea31d4ab2909e6ee86908a7

                SHA256

                57261cbea6f3d4a3755ec9cc56fa0adadb77b159fc7103c9e80e34d4d443b51e

                SHA512

                c55ffb0c9dca0c2e35e31f382089c7221cc518b6931df5b321cfa11a2a9923e8ea7560312cecfee532a912d2d2fcd02db620a2dc4d41e5094b0e14dfc6b51a05

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                28c2037ce1c35548aee1602c54f8e92b

                SHA1

                e0ea11b14721b229a988070871b8a2b06c7f4d93

                SHA256

                7ff2279f72832f1f53319f9d62fd102ddd84e4d77e8d12cb85852d2fdac2018e

                SHA512

                93494d49fc2b1b52dbdf0e1161e9a746d5eed4c3c65bbb61ad0bab3e59b146531470c53779c52a835f78837738acaf35fb577a195a32669f2320452da2106180

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                28c2037ce1c35548aee1602c54f8e92b

                SHA1

                e0ea11b14721b229a988070871b8a2b06c7f4d93

                SHA256

                7ff2279f72832f1f53319f9d62fd102ddd84e4d77e8d12cb85852d2fdac2018e

                SHA512

                93494d49fc2b1b52dbdf0e1161e9a746d5eed4c3c65bbb61ad0bab3e59b146531470c53779c52a835f78837738acaf35fb577a195a32669f2320452da2106180

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                28c2037ce1c35548aee1602c54f8e92b

                SHA1

                e0ea11b14721b229a988070871b8a2b06c7f4d93

                SHA256

                7ff2279f72832f1f53319f9d62fd102ddd84e4d77e8d12cb85852d2fdac2018e

                SHA512

                93494d49fc2b1b52dbdf0e1161e9a746d5eed4c3c65bbb61ad0bab3e59b146531470c53779c52a835f78837738acaf35fb577a195a32669f2320452da2106180

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                28c2037ce1c35548aee1602c54f8e92b

                SHA1

                e0ea11b14721b229a988070871b8a2b06c7f4d93

                SHA256

                7ff2279f72832f1f53319f9d62fd102ddd84e4d77e8d12cb85852d2fdac2018e

                SHA512

                93494d49fc2b1b52dbdf0e1161e9a746d5eed4c3c65bbb61ad0bab3e59b146531470c53779c52a835f78837738acaf35fb577a195a32669f2320452da2106180

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e8889833.exe

                Filesize

                267KB

                MD5

                1eebe594467e1d418a99bd5c1928ca5b

                SHA1

                f5619b80fb805c9ecece3e7a7818c89213292dcc

                SHA256

                871d6729e0a55f6754d934c3efa52f6b493556a377320c5c6353f65931353079

                SHA512

                c948fee323a224e5b42e891d468156a2e64497b6385da8104a51f7896d9c86142c46b5c964e17c3f5ef0a5b044d3724f276c2479fd8e6403df87cf48ff311e3f

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e8889833.exe

                Filesize

                267KB

                MD5

                1eebe594467e1d418a99bd5c1928ca5b

                SHA1

                f5619b80fb805c9ecece3e7a7818c89213292dcc

                SHA256

                871d6729e0a55f6754d934c3efa52f6b493556a377320c5c6353f65931353079

                SHA512

                c948fee323a224e5b42e891d468156a2e64497b6385da8104a51f7896d9c86142c46b5c964e17c3f5ef0a5b044d3724f276c2479fd8e6403df87cf48ff311e3f

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8565662.exe

                Filesize

                595KB

                MD5

                a100c61c49f395887a66d013904dad1d

                SHA1

                dedbc371706702a69fe64d4181b3d2ad91d324c3

                SHA256

                76e63e276758dfa615e33d792b3ce0b2de39ad085bebf62381672715746e050f

                SHA512

                ace426d6d37078a1a1e8046c88bb9f9edd484fe79ec393cf6744d45e3f05b692acc3870283e3784b373bc0b3d5ee54ed4c1a189a9a996eafd12fd53d47d4b391

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8565662.exe

                Filesize

                595KB

                MD5

                a100c61c49f395887a66d013904dad1d

                SHA1

                dedbc371706702a69fe64d4181b3d2ad91d324c3

                SHA256

                76e63e276758dfa615e33d792b3ce0b2de39ad085bebf62381672715746e050f

                SHA512

                ace426d6d37078a1a1e8046c88bb9f9edd484fe79ec393cf6744d45e3f05b692acc3870283e3784b373bc0b3d5ee54ed4c1a189a9a996eafd12fd53d47d4b391

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d7219085.exe

                Filesize

                205KB

                MD5

                28c2037ce1c35548aee1602c54f8e92b

                SHA1

                e0ea11b14721b229a988070871b8a2b06c7f4d93

                SHA256

                7ff2279f72832f1f53319f9d62fd102ddd84e4d77e8d12cb85852d2fdac2018e

                SHA512

                93494d49fc2b1b52dbdf0e1161e9a746d5eed4c3c65bbb61ad0bab3e59b146531470c53779c52a835f78837738acaf35fb577a195a32669f2320452da2106180

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d7219085.exe

                Filesize

                205KB

                MD5

                28c2037ce1c35548aee1602c54f8e92b

                SHA1

                e0ea11b14721b229a988070871b8a2b06c7f4d93

                SHA256

                7ff2279f72832f1f53319f9d62fd102ddd84e4d77e8d12cb85852d2fdac2018e

                SHA512

                93494d49fc2b1b52dbdf0e1161e9a746d5eed4c3c65bbb61ad0bab3e59b146531470c53779c52a835f78837738acaf35fb577a195a32669f2320452da2106180

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4165699.exe

                Filesize

                422KB

                MD5

                ae9a38f7ee4a533ffca85e64ca3d3b7c

                SHA1

                bcd3e93f4bcb32c0052540263a11b44d2702b600

                SHA256

                e6c5c3b6d24ca784dfae86f62ee2bdab8e8004a31c6c2584618113644db6979c

                SHA512

                3fd32cf509977e086f531366f07c582f8cf4b5e57ab6ba44f348a71028054b82227ff31a0a34f29e923f4364afd06c7d54d01ec35b8387184b78f63a58780933

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4165699.exe

                Filesize

                422KB

                MD5

                ae9a38f7ee4a533ffca85e64ca3d3b7c

                SHA1

                bcd3e93f4bcb32c0052540263a11b44d2702b600

                SHA256

                e6c5c3b6d24ca784dfae86f62ee2bdab8e8004a31c6c2584618113644db6979c

                SHA512

                3fd32cf509977e086f531366f07c582f8cf4b5e57ab6ba44f348a71028054b82227ff31a0a34f29e923f4364afd06c7d54d01ec35b8387184b78f63a58780933

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2797732.exe

                Filesize

                172KB

                MD5

                1ee417508b4a36f3391a9682f2e3d83c

                SHA1

                c685e0611a9d157602b6c09ffec9ef0d0263b8df

                SHA256

                43dfacd246a37d97d46241faca715377816caa3c56570d95620ba13b74ddbfd9

                SHA512

                7c951fd451a5ec6fa06f39f174dc23016ed8320d65d72ec9892203183377b9469d6bc8bb917de8cb592ed33e5c374dcda001cd1b1e1cfcb804d3af450323dd93

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2797732.exe

                Filesize

                172KB

                MD5

                1ee417508b4a36f3391a9682f2e3d83c

                SHA1

                c685e0611a9d157602b6c09ffec9ef0d0263b8df

                SHA256

                43dfacd246a37d97d46241faca715377816caa3c56570d95620ba13b74ddbfd9

                SHA512

                7c951fd451a5ec6fa06f39f174dc23016ed8320d65d72ec9892203183377b9469d6bc8bb917de8cb592ed33e5c374dcda001cd1b1e1cfcb804d3af450323dd93

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9590266.exe

                Filesize

                267KB

                MD5

                b18dbadd1ba0d2f259d292a31a7f6bd5

                SHA1

                c389522845f55e6779b134e717e1826db8ec6b56

                SHA256

                593c7aecb5e686a9fc7ed595fadab2f305432c3e8b8e3cc0ccf68db3d6423241

                SHA512

                37fd179ae94b706b9229f5363deed2a63a7875e48ddc1c7fa9cac073896b5e38efde706141627a82e8bac3513e03362ad833325a0764fae06edbc737672a4ef5

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9590266.exe

                Filesize

                267KB

                MD5

                b18dbadd1ba0d2f259d292a31a7f6bd5

                SHA1

                c389522845f55e6779b134e717e1826db8ec6b56

                SHA256

                593c7aecb5e686a9fc7ed595fadab2f305432c3e8b8e3cc0ccf68db3d6423241

                SHA512

                37fd179ae94b706b9229f5363deed2a63a7875e48ddc1c7fa9cac073896b5e38efde706141627a82e8bac3513e03362ad833325a0764fae06edbc737672a4ef5

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0262040.exe

                Filesize

                267KB

                MD5

                72d7d4926475fb89c36efb4a4c29cda4

                SHA1

                86bd850e8a9897bb8eece603854671c783b160a5

                SHA256

                b4c12adfdf799408463b14200524ebc573401e356bf52deadb835b950f860e5d

                SHA512

                7cf954097dd0ce3cd9c1ec5485f195220e520c7131b1d940ce746c5958ac2c4f794f607ee4635d5e037bf29442ebd75a83267a5185d72de5643ffec662e4edae

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0262040.exe

                Filesize

                267KB

                MD5

                72d7d4926475fb89c36efb4a4c29cda4

                SHA1

                86bd850e8a9897bb8eece603854671c783b160a5

                SHA256

                b4c12adfdf799408463b14200524ebc573401e356bf52deadb835b950f860e5d

                SHA512

                7cf954097dd0ce3cd9c1ec5485f195220e520c7131b1d940ce746c5958ac2c4f794f607ee4635d5e037bf29442ebd75a83267a5185d72de5643ffec662e4edae

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0262040.exe

                Filesize

                267KB

                MD5

                72d7d4926475fb89c36efb4a4c29cda4

                SHA1

                86bd850e8a9897bb8eece603854671c783b160a5

                SHA256

                b4c12adfdf799408463b14200524ebc573401e356bf52deadb835b950f860e5d

                SHA512

                7cf954097dd0ce3cd9c1ec5485f195220e520c7131b1d940ce746c5958ac2c4f794f607ee4635d5e037bf29442ebd75a83267a5185d72de5643ffec662e4edae

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7219173.exe

                Filesize

                105KB

                MD5

                38809479c2582373ce7be2e739713178

                SHA1

                3dbf92777022f017f3967f2a87091ffbf1188c18

                SHA256

                40e25c4d6c23ee6a1bc53013a2a3af9d76562778fcee9bdbaa41148118394b67

                SHA512

                c889521585aa6a25d938ca001b3b94593d0a83fe9ca40a6f1e08d2560c48004e6a6d57c95ced014348a67451a74aaba01667ed5359b6a6ae634aa5e443d1d2c0

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7219173.exe

                Filesize

                105KB

                MD5

                38809479c2582373ce7be2e739713178

                SHA1

                3dbf92777022f017f3967f2a87091ffbf1188c18

                SHA256

                40e25c4d6c23ee6a1bc53013a2a3af9d76562778fcee9bdbaa41148118394b67

                SHA512

                c889521585aa6a25d938ca001b3b94593d0a83fe9ca40a6f1e08d2560c48004e6a6d57c95ced014348a67451a74aaba01667ed5359b6a6ae634aa5e443d1d2c0

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                83fc14fb36516facb19e0e96286f7f48

                SHA1

                40082ca06de4c377585cd164fb521bacadb673da

                SHA256

                08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                SHA512

                ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                83fc14fb36516facb19e0e96286f7f48

                SHA1

                40082ca06de4c377585cd164fb521bacadb673da

                SHA256

                08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                SHA512

                ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                83fc14fb36516facb19e0e96286f7f48

                SHA1

                40082ca06de4c377585cd164fb521bacadb673da

                SHA256

                08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                SHA512

                ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/1636-183-0x00000000001F0000-0x00000000001FA000-memory.dmp

                Filesize

                40KB

              • memory/2768-193-0x0000000004AA0000-0x0000000004AB0000-memory.dmp

                Filesize

                64KB

              • memory/2768-192-0x0000000000200000-0x0000000000230000-memory.dmp

                Filesize

                192KB

              • memory/3536-166-0x000000000A000000-0x000000000A10A000-memory.dmp

                Filesize

                1.0MB

              • memory/3536-171-0x000000000A3C0000-0x000000000A452000-memory.dmp

                Filesize

                584KB

              • memory/3536-176-0x00000000045C0000-0x0000000004610000-memory.dmp

                Filesize

                320KB

              • memory/3536-175-0x000000000B920000-0x000000000BE4C000-memory.dmp

                Filesize

                5.2MB

              • memory/3536-174-0x000000000B750000-0x000000000B912000-memory.dmp

                Filesize

                1.8MB

              • memory/3536-173-0x000000000B000000-0x000000000B5A4000-memory.dmp

                Filesize

                5.6MB

              • memory/3536-172-0x000000000A460000-0x000000000A4C6000-memory.dmp

                Filesize

                408KB

              • memory/3536-177-0x0000000004C30000-0x0000000004C40000-memory.dmp

                Filesize

                64KB

              • memory/3536-170-0x000000000A340000-0x000000000A3B6000-memory.dmp

                Filesize

                472KB

              • memory/3536-161-0x0000000000520000-0x0000000000550000-memory.dmp

                Filesize

                192KB

              • memory/3536-165-0x000000000A5E0000-0x000000000ABF8000-memory.dmp

                Filesize

                6.1MB

              • memory/3536-169-0x000000000A160000-0x000000000A19C000-memory.dmp

                Filesize

                240KB

              • memory/3536-168-0x0000000004C30000-0x0000000004C40000-memory.dmp

                Filesize

                64KB

              • memory/3536-167-0x000000000A140000-0x000000000A152000-memory.dmp

                Filesize

                72KB

              • memory/5056-215-0x0000000004A40000-0x0000000004A50000-memory.dmp

                Filesize

                64KB

              • memory/5056-211-0x0000000000520000-0x0000000000550000-memory.dmp

                Filesize

                192KB