Analysis

  • max time kernel
    146s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/06/2023, 12:03

General

  • Target

    f13833c715b8953829521e7ffb29c074e456514e575ccd4484ab284ccbbb00b6.exe

  • Size

    799KB

  • MD5

    c72810d0182af371bab1e2db0df64cf0

  • SHA1

    053ba634836970151fa77864c4c1b416d10d3b7e

  • SHA256

    f13833c715b8953829521e7ffb29c074e456514e575ccd4484ab284ccbbb00b6

  • SHA512

    9df8b017dc08b598f462ff493c6ef40f685d3a739e359a5666866e0037ddb1814ee9f18da39cf16b3392b276c49a6043c41c363dbbe03babdfe2559fb860c662

  • SSDEEP

    24576:syNQRlN3fP83WEiq2TGNcc2GewZMg7uv:bNOldn83WEtcc2fwGg

Malware Config

Extracted

Family

redline

Botnet

grega

C2

83.97.73.130:19061

Attributes
  • auth_value

    16e2fbc2847b2270b3f0679e2dd76c8d

Extracted

Family

redline

Botnet

mana

C2

83.97.73.130:19061

Attributes
  • auth_value

    4f5139d6c845fe72d05faf05763b6c31

Extracted

Family

amadey

Version

3.84

C2

77.91.68.63/doma/net/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f13833c715b8953829521e7ffb29c074e456514e575ccd4484ab284ccbbb00b6.exe
    "C:\Users\Admin\AppData\Local\Temp\f13833c715b8953829521e7ffb29c074e456514e575ccd4484ab284ccbbb00b6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7383003.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7383003.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3192
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6365320.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6365320.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3036
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8597980.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8597980.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2688
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1763596.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1763596.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:228
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5232971.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5232971.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3116
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8267112.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8267112.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3320
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d8796011.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d8796011.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:844
        • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
          "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2948
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:664
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4240
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:1508
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "rugen.exe" /P "Admin:N"
                6⤵
                  PID:5116
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "rugen.exe" /P "Admin:R" /E
                  6⤵
                    PID:4408
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:3068
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\200f691d32" /P "Admin:N"
                      6⤵
                        PID:3524
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\200f691d32" /P "Admin:R" /E
                        6⤵
                          PID:2788
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:2152
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e4368257.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e4368257.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1432
              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                1⤵
                • Executes dropped EXE
                PID:2624

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                2KB

                MD5

                9b756bc85e5324eb8f87a69e3f9959ab

                SHA1

                1778b2e2d6a00c421578a284db1e743931611d66

                SHA256

                e347a39e49ca8c835cc47d3f039230969e7c4156089f2e83e8a0aed1df88016e

                SHA512

                c897af3307e3c3163762021f49934ac5fbeab27f123e814bc390bdf1f0ed46671afeadcc87a8a4b18ddf13f4abd0d8ef00343af91ff999d7d447c96505d866d8

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                835f1373b125353f2b0615a2f105d3dd

                SHA1

                1aae6edfedcfe6d6828b98b114c581d9f15db807

                SHA256

                00f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4

                SHA512

                8826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                835f1373b125353f2b0615a2f105d3dd

                SHA1

                1aae6edfedcfe6d6828b98b114c581d9f15db807

                SHA256

                00f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4

                SHA512

                8826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                835f1373b125353f2b0615a2f105d3dd

                SHA1

                1aae6edfedcfe6d6828b98b114c581d9f15db807

                SHA256

                00f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4

                SHA512

                8826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                835f1373b125353f2b0615a2f105d3dd

                SHA1

                1aae6edfedcfe6d6828b98b114c581d9f15db807

                SHA256

                00f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4

                SHA512

                8826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e4368257.exe

                Filesize

                267KB

                MD5

                96ad3632040101278a9ee7ee1ee45788

                SHA1

                a22511727bb64cc3913b1cda76bf87de72f2cead

                SHA256

                17a2e9e0166a1f347cd986b33bec72a5cf1d8fb96935a9710f67ad2525a28102

                SHA512

                f17e4179ca8c49f579da7fa03e7658e635852e22df2bcce8609795fc0202a3cf5f536b08e633461c22a6a5a606f90f425447c72730a1a59dc3013c9118869c0a

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e4368257.exe

                Filesize

                267KB

                MD5

                96ad3632040101278a9ee7ee1ee45788

                SHA1

                a22511727bb64cc3913b1cda76bf87de72f2cead

                SHA256

                17a2e9e0166a1f347cd986b33bec72a5cf1d8fb96935a9710f67ad2525a28102

                SHA512

                f17e4179ca8c49f579da7fa03e7658e635852e22df2bcce8609795fc0202a3cf5f536b08e633461c22a6a5a606f90f425447c72730a1a59dc3013c9118869c0a

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7383003.exe

                Filesize

                594KB

                MD5

                07d4cacb7ec77e6545a31de4a15112b7

                SHA1

                fa571f185fd098311b9a4a0e595514ef5f1c7f5f

                SHA256

                11359c440272c33b2ce5e1690e684231d74b0ba4d0dffe592d134e9ce50212c1

                SHA512

                eecac072805ec8681b60b895434c3d34a232154807ec31508294f1f45e4f9a6758f66be8de439d77957c65aca11c26ff0e00e46daf3258b9c94310717ee8261c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7383003.exe

                Filesize

                594KB

                MD5

                07d4cacb7ec77e6545a31de4a15112b7

                SHA1

                fa571f185fd098311b9a4a0e595514ef5f1c7f5f

                SHA256

                11359c440272c33b2ce5e1690e684231d74b0ba4d0dffe592d134e9ce50212c1

                SHA512

                eecac072805ec8681b60b895434c3d34a232154807ec31508294f1f45e4f9a6758f66be8de439d77957c65aca11c26ff0e00e46daf3258b9c94310717ee8261c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d8796011.exe

                Filesize

                205KB

                MD5

                835f1373b125353f2b0615a2f105d3dd

                SHA1

                1aae6edfedcfe6d6828b98b114c581d9f15db807

                SHA256

                00f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4

                SHA512

                8826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d8796011.exe

                Filesize

                205KB

                MD5

                835f1373b125353f2b0615a2f105d3dd

                SHA1

                1aae6edfedcfe6d6828b98b114c581d9f15db807

                SHA256

                00f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4

                SHA512

                8826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6365320.exe

                Filesize

                422KB

                MD5

                ff921053dbdc679cd5b9047aaca3b534

                SHA1

                07fb5be0f705f62d13832f6a0e6e5e70475d3f43

                SHA256

                9d62e12a0f447c9888efa12fb18b1d06582a7a4ea83c367d5c2c273a6bba91cd

                SHA512

                720d5e29d63e97ceee98bc47f705497a9372632adfd7dd25c27bc0349cbe70bbfa40a227815f017eb69a789991c85a0fcb0ad06a5a94b72150c2a24359686472

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6365320.exe

                Filesize

                422KB

                MD5

                ff921053dbdc679cd5b9047aaca3b534

                SHA1

                07fb5be0f705f62d13832f6a0e6e5e70475d3f43

                SHA256

                9d62e12a0f447c9888efa12fb18b1d06582a7a4ea83c367d5c2c273a6bba91cd

                SHA512

                720d5e29d63e97ceee98bc47f705497a9372632adfd7dd25c27bc0349cbe70bbfa40a227815f017eb69a789991c85a0fcb0ad06a5a94b72150c2a24359686472

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8267112.exe

                Filesize

                172KB

                MD5

                4628413766d9de7cd69dac1230d5f187

                SHA1

                221830ac634376cd6642db98215f8230b639310c

                SHA256

                a8088ddc5cd1114eada7c8cf4635ee5b690842517f13e55823b9cdc05a43bbb7

                SHA512

                8a081463621765519553ef6a94a1e522c8098832ec42d40c99b6b04a996ed94e4e99333678aa0d36d96183e734caf9e9255d80fa7d3443bda70ef802eb99b5ed

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8267112.exe

                Filesize

                172KB

                MD5

                4628413766d9de7cd69dac1230d5f187

                SHA1

                221830ac634376cd6642db98215f8230b639310c

                SHA256

                a8088ddc5cd1114eada7c8cf4635ee5b690842517f13e55823b9cdc05a43bbb7

                SHA512

                8a081463621765519553ef6a94a1e522c8098832ec42d40c99b6b04a996ed94e4e99333678aa0d36d96183e734caf9e9255d80fa7d3443bda70ef802eb99b5ed

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8597980.exe

                Filesize

                267KB

                MD5

                04ed77f8d93376658dbf4b8caafd60ab

                SHA1

                937df82fb9b2675b822ddd3da14c1545d99f2eda

                SHA256

                ceefec47c0ce9a98a7dbc44000653987342c651eb834673f27805deb37f2a430

                SHA512

                87b708e5cfcecdc3aabc334572a78c8d9ede323d114d95a1ddd57325a84a2cf3e242fb5198315952ae34becdd0f27dffa02f93b46313c1d970589f6e11fc5141

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8597980.exe

                Filesize

                267KB

                MD5

                04ed77f8d93376658dbf4b8caafd60ab

                SHA1

                937df82fb9b2675b822ddd3da14c1545d99f2eda

                SHA256

                ceefec47c0ce9a98a7dbc44000653987342c651eb834673f27805deb37f2a430

                SHA512

                87b708e5cfcecdc3aabc334572a78c8d9ede323d114d95a1ddd57325a84a2cf3e242fb5198315952ae34becdd0f27dffa02f93b46313c1d970589f6e11fc5141

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1763596.exe

                Filesize

                267KB

                MD5

                0f1841d96c3af0c5531f8dc718cf9da7

                SHA1

                a9f5def2a0168e02e44981cf9002e4c38f040b95

                SHA256

                a52f4f93c2615b38727bff44ba1dd090d6f01c26d04af6b502470599661505fe

                SHA512

                30d905d50bacd7f36d4d289ed9e22d8f4bd17c00425d74842d8f1cf3c717a04aeba6a6e3d92be81bed1dd6edfebc365e7abb4bf0e5241e793c85fa08a40889ec

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1763596.exe

                Filesize

                267KB

                MD5

                0f1841d96c3af0c5531f8dc718cf9da7

                SHA1

                a9f5def2a0168e02e44981cf9002e4c38f040b95

                SHA256

                a52f4f93c2615b38727bff44ba1dd090d6f01c26d04af6b502470599661505fe

                SHA512

                30d905d50bacd7f36d4d289ed9e22d8f4bd17c00425d74842d8f1cf3c717a04aeba6a6e3d92be81bed1dd6edfebc365e7abb4bf0e5241e793c85fa08a40889ec

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1763596.exe

                Filesize

                267KB

                MD5

                0f1841d96c3af0c5531f8dc718cf9da7

                SHA1

                a9f5def2a0168e02e44981cf9002e4c38f040b95

                SHA256

                a52f4f93c2615b38727bff44ba1dd090d6f01c26d04af6b502470599661505fe

                SHA512

                30d905d50bacd7f36d4d289ed9e22d8f4bd17c00425d74842d8f1cf3c717a04aeba6a6e3d92be81bed1dd6edfebc365e7abb4bf0e5241e793c85fa08a40889ec

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5232971.exe

                Filesize

                105KB

                MD5

                bc06278a902355c8fd7165f378a2d314

                SHA1

                a39ad4865d5f49dc14bc02f2fb80b3f343f147d9

                SHA256

                7de44010cf38602cea8776693c4afc4fef63598a0c0d2fbedd067952f69522b8

                SHA512

                4fb4273b14207e15c0ddccc73cc0e221c12fdfd3edf6a35368baad395365a247af7298db2f69a4f07f77839db4207b326dea11ec7c2c250c6ecef7eda2bd3fa7

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5232971.exe

                Filesize

                105KB

                MD5

                bc06278a902355c8fd7165f378a2d314

                SHA1

                a39ad4865d5f49dc14bc02f2fb80b3f343f147d9

                SHA256

                7de44010cf38602cea8776693c4afc4fef63598a0c0d2fbedd067952f69522b8

                SHA512

                4fb4273b14207e15c0ddccc73cc0e221c12fdfd3edf6a35368baad395365a247af7298db2f69a4f07f77839db4207b326dea11ec7c2c250c6ecef7eda2bd3fa7

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                83fc14fb36516facb19e0e96286f7f48

                SHA1

                40082ca06de4c377585cd164fb521bacadb673da

                SHA256

                08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                SHA512

                ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                83fc14fb36516facb19e0e96286f7f48

                SHA1

                40082ca06de4c377585cd164fb521bacadb673da

                SHA256

                08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                SHA512

                ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                83fc14fb36516facb19e0e96286f7f48

                SHA1

                40082ca06de4c377585cd164fb521bacadb673da

                SHA256

                08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                SHA512

                ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/228-166-0x00000000052E0000-0x00000000053EA000-memory.dmp

                Filesize

                1.0MB

              • memory/228-172-0x0000000005DF0000-0x0000000006394000-memory.dmp

                Filesize

                5.6MB

              • memory/228-177-0x0000000006CF0000-0x0000000006D40000-memory.dmp

                Filesize

                320KB

              • memory/228-161-0x0000000001DE0000-0x0000000001E10000-memory.dmp

                Filesize

                192KB

              • memory/228-165-0x0000000004CC0000-0x00000000052D8000-memory.dmp

                Filesize

                6.1MB

              • memory/228-176-0x0000000006680000-0x0000000006BAC000-memory.dmp

                Filesize

                5.2MB

              • memory/228-175-0x00000000064A0000-0x0000000006662000-memory.dmp

                Filesize

                1.8MB

              • memory/228-174-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

                Filesize

                64KB

              • memory/228-173-0x00000000057C0000-0x0000000005826000-memory.dmp

                Filesize

                408KB

              • memory/228-167-0x0000000004B00000-0x0000000004B12000-memory.dmp

                Filesize

                72KB

              • memory/228-171-0x00000000055C0000-0x0000000005652000-memory.dmp

                Filesize

                584KB

              • memory/228-170-0x0000000005540000-0x00000000055B6000-memory.dmp

                Filesize

                472KB

              • memory/228-168-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

                Filesize

                64KB

              • memory/228-169-0x0000000004B20000-0x0000000004B5C000-memory.dmp

                Filesize

                240KB

              • memory/1432-215-0x00000000049A0000-0x00000000049B0000-memory.dmp

                Filesize

                64KB

              • memory/1432-211-0x0000000000520000-0x0000000000550000-memory.dmp

                Filesize

                192KB

              • memory/3116-183-0x0000000000420000-0x000000000042A000-memory.dmp

                Filesize

                40KB

              • memory/3320-193-0x0000000004A10000-0x0000000004A20000-memory.dmp

                Filesize

                64KB

              • memory/3320-192-0x00000000000B0000-0x00000000000E0000-memory.dmp

                Filesize

                192KB