Analysis

  • max time kernel
    92s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-06-2023 18:39

General

  • Target

    84876b6ac21c958c1c8812e7e915957d34838965e91556772141bea0bfd8bc22.exe

  • Size

    730KB

  • MD5

    87c99398afd80dd27ed890a8b371461c

  • SHA1

    feddc06103d4c92ada5cf0e698bbb14b82c5d54e

  • SHA256

    84876b6ac21c958c1c8812e7e915957d34838965e91556772141bea0bfd8bc22

  • SHA512

    e53ecb19ad8dffa342cb2eadf2067cc2b921f1127fda4c6e859058d72abd5ab73535dab1efd366d169a4f2856e49c6d7813b5a21be14ecd46f13e39246806f7f

  • SSDEEP

    12288:yMrMy90ER0WzYroJq0zTtEOZ6YQ4Wf7WINO1dTjpX/v/eGQ4YHS39W:2yPrRNEOZ9Wf7WINObpX/vm/4+kM

Malware Config

Extracted

Family

redline

Botnet

dedo

C2

83.97.73.130:19061

Attributes
  • auth_value

    ac76f7438fbe49011f900c651cb85e26

Extracted

Family

amadey

Version

3.84

C2

77.91.68.63/doma/net/index.php

Extracted

Family

redline

Botnet

grega

C2

83.97.73.130:19061

Attributes
  • auth_value

    16e2fbc2847b2270b3f0679e2dd76c8d

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84876b6ac21c958c1c8812e7e915957d34838965e91556772141bea0bfd8bc22.exe
    "C:\Users\Admin\AppData\Local\Temp\84876b6ac21c958c1c8812e7e915957d34838965e91556772141bea0bfd8bc22.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3656
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5713440.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5713440.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5000
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3258474.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3258474.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4988
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y7085834.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y7085834.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4396
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j8051732.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j8051732.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4132
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k3825017.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k3825017.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2964
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l0138253.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l0138253.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1552
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7891649.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7891649.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:216
        • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
          "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3652
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:1484
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1780
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:3404
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "rugen.exe" /P "Admin:N"
                6⤵
                  PID:432
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "rugen.exe" /P "Admin:R" /E
                  6⤵
                    PID:1504
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:2360
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\200f691d32" /P "Admin:N"
                      6⤵
                        PID:2212
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\200f691d32" /P "Admin:R" /E
                        6⤵
                          PID:1772
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:692
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n2703600.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n2703600.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3712
              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                1⤵
                • Executes dropped EXE
                PID:4596

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                226B

                MD5

                916851e072fbabc4796d8916c5131092

                SHA1

                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                SHA256

                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                SHA512

                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                835f1373b125353f2b0615a2f105d3dd

                SHA1

                1aae6edfedcfe6d6828b98b114c581d9f15db807

                SHA256

                00f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4

                SHA512

                8826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                835f1373b125353f2b0615a2f105d3dd

                SHA1

                1aae6edfedcfe6d6828b98b114c581d9f15db807

                SHA256

                00f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4

                SHA512

                8826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                835f1373b125353f2b0615a2f105d3dd

                SHA1

                1aae6edfedcfe6d6828b98b114c581d9f15db807

                SHA256

                00f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4

                SHA512

                8826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                835f1373b125353f2b0615a2f105d3dd

                SHA1

                1aae6edfedcfe6d6828b98b114c581d9f15db807

                SHA256

                00f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4

                SHA512

                8826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n2703600.exe

                Filesize

                267KB

                MD5

                61881fd7f2dc3d4d54e2c170a43dac29

                SHA1

                ab87039e388c201a1faf0ae1a33607a28be86799

                SHA256

                97805568ce8265f91cdb6785d99aadff46910e14b76594ff44ae76bde23c4421

                SHA512

                d06cfa06b7890ff7d3a9206f6931cfb7ad686338f58c7a456a39452116e66d19db5cc4704846427a67be51356048ce5dc2724c6e7a71af7c442653046ad80c0c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n2703600.exe

                Filesize

                267KB

                MD5

                61881fd7f2dc3d4d54e2c170a43dac29

                SHA1

                ab87039e388c201a1faf0ae1a33607a28be86799

                SHA256

                97805568ce8265f91cdb6785d99aadff46910e14b76594ff44ae76bde23c4421

                SHA512

                d06cfa06b7890ff7d3a9206f6931cfb7ad686338f58c7a456a39452116e66d19db5cc4704846427a67be51356048ce5dc2724c6e7a71af7c442653046ad80c0c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5713440.exe

                Filesize

                530KB

                MD5

                81072033eefbdd7b6252a65a37d83ee9

                SHA1

                7a87bb499246072c239c7b09859fdabd1445a1b6

                SHA256

                098aa51ef32572cf2ebb2f7c74b097683cf2b624718cce3b3ed964d1508826a4

                SHA512

                e6769dbd2dacaf812aa818386b7f0fd4d900aaa172108c17990bf8d0f4dc991d17ac6d5518d91994eaf19d72695862778aaea5ecb1fb2566826f632d82f893e2

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5713440.exe

                Filesize

                530KB

                MD5

                81072033eefbdd7b6252a65a37d83ee9

                SHA1

                7a87bb499246072c239c7b09859fdabd1445a1b6

                SHA256

                098aa51ef32572cf2ebb2f7c74b097683cf2b624718cce3b3ed964d1508826a4

                SHA512

                e6769dbd2dacaf812aa818386b7f0fd4d900aaa172108c17990bf8d0f4dc991d17ac6d5518d91994eaf19d72695862778aaea5ecb1fb2566826f632d82f893e2

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7891649.exe

                Filesize

                205KB

                MD5

                835f1373b125353f2b0615a2f105d3dd

                SHA1

                1aae6edfedcfe6d6828b98b114c581d9f15db807

                SHA256

                00f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4

                SHA512

                8826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7891649.exe

                Filesize

                205KB

                MD5

                835f1373b125353f2b0615a2f105d3dd

                SHA1

                1aae6edfedcfe6d6828b98b114c581d9f15db807

                SHA256

                00f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4

                SHA512

                8826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3258474.exe

                Filesize

                358KB

                MD5

                d9002638e5835a41f1b6946a63557967

                SHA1

                9b75ddff3f2f91c5efe30ba7c45d41dbbeb99b81

                SHA256

                c9e074f4f728e787d9a024db5b02420e1711f87bc5fd17a2e5eb9847839ce2c0

                SHA512

                7a778546821d2cae8b52b49f46ef874a23b47f7dd701f6d03f7fdf06824148d5871b3b0dee6fad4742cc0fd9cdfbd857cb0f136262c01af5aefb43dfe5a200bb

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3258474.exe

                Filesize

                358KB

                MD5

                d9002638e5835a41f1b6946a63557967

                SHA1

                9b75ddff3f2f91c5efe30ba7c45d41dbbeb99b81

                SHA256

                c9e074f4f728e787d9a024db5b02420e1711f87bc5fd17a2e5eb9847839ce2c0

                SHA512

                7a778546821d2cae8b52b49f46ef874a23b47f7dd701f6d03f7fdf06824148d5871b3b0dee6fad4742cc0fd9cdfbd857cb0f136262c01af5aefb43dfe5a200bb

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l0138253.exe

                Filesize

                172KB

                MD5

                25856d9e2fdfce269fa1284986dc23cf

                SHA1

                91a1687d9caeea2658cc0feb26d0ae19b1636490

                SHA256

                4e1731c259b168e6d85293f2f764eacc5840ead8b334fc8805c4cd1e5378f143

                SHA512

                3441994ee141bb01c1cfde21ac51a2a5b2b14f6d7998652b53da0ba9842ab7b990da74174ae1ce74ba9b2d536f392ab8655235a03e1d6180255f986b691de592

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l0138253.exe

                Filesize

                172KB

                MD5

                25856d9e2fdfce269fa1284986dc23cf

                SHA1

                91a1687d9caeea2658cc0feb26d0ae19b1636490

                SHA256

                4e1731c259b168e6d85293f2f764eacc5840ead8b334fc8805c4cd1e5378f143

                SHA512

                3441994ee141bb01c1cfde21ac51a2a5b2b14f6d7998652b53da0ba9842ab7b990da74174ae1ce74ba9b2d536f392ab8655235a03e1d6180255f986b691de592

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y7085834.exe

                Filesize

                202KB

                MD5

                b10365a8d08971f2c4d8111eda84c444

                SHA1

                e5bbd09fbf440d7aee176931894ee880a041e943

                SHA256

                4420fb7f716f4368763f0bf37683be17a8691d59e3aa5203a271d7bb4361685c

                SHA512

                b1c8776d2fb4262074e558661f91d2139f1000845ce196bff5c1f367277560fc65220cdc7846bb559e29d1ae656ba8859eebdbdbc2ff59ada7bf3a5c73490cf7

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y7085834.exe

                Filesize

                202KB

                MD5

                b10365a8d08971f2c4d8111eda84c444

                SHA1

                e5bbd09fbf440d7aee176931894ee880a041e943

                SHA256

                4420fb7f716f4368763f0bf37683be17a8691d59e3aa5203a271d7bb4361685c

                SHA512

                b1c8776d2fb4262074e558661f91d2139f1000845ce196bff5c1f367277560fc65220cdc7846bb559e29d1ae656ba8859eebdbdbc2ff59ada7bf3a5c73490cf7

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j8051732.exe

                Filesize

                105KB

                MD5

                1cefc6aaa22e0fb75522b5c21484ea0a

                SHA1

                481f500da09cf9559ee83c226f137dcdb10c5d23

                SHA256

                cd839760a6a39ac1a898bad4648e49ba5557d52bcfb9524b492647f6d5baf406

                SHA512

                34f9e6fd35364e81556374af36f4f204d391d3dc69dcac8b542734417a60e0464aa1354d0067e501df07e002189539a548e03232a4918d59f10aae5f653e08f3

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j8051732.exe

                Filesize

                105KB

                MD5

                1cefc6aaa22e0fb75522b5c21484ea0a

                SHA1

                481f500da09cf9559ee83c226f137dcdb10c5d23

                SHA256

                cd839760a6a39ac1a898bad4648e49ba5557d52bcfb9524b492647f6d5baf406

                SHA512

                34f9e6fd35364e81556374af36f4f204d391d3dc69dcac8b542734417a60e0464aa1354d0067e501df07e002189539a548e03232a4918d59f10aae5f653e08f3

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k3825017.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k3825017.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                83fc14fb36516facb19e0e96286f7f48

                SHA1

                40082ca06de4c377585cd164fb521bacadb673da

                SHA256

                08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                SHA512

                ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                83fc14fb36516facb19e0e96286f7f48

                SHA1

                40082ca06de4c377585cd164fb521bacadb673da

                SHA256

                08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                SHA512

                ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                83fc14fb36516facb19e0e96286f7f48

                SHA1

                40082ca06de4c377585cd164fb521bacadb673da

                SHA256

                08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                SHA512

                ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/1552-178-0x000000000ADD0000-0x000000000ADE2000-memory.dmp

                Filesize

                72KB

              • memory/1552-175-0x0000000000F10000-0x0000000000F40000-memory.dmp

                Filesize

                192KB

              • memory/1552-188-0x0000000005700000-0x0000000005710000-memory.dmp

                Filesize

                64KB

              • memory/1552-181-0x000000000B240000-0x000000000B2B6000-memory.dmp

                Filesize

                472KB

              • memory/1552-180-0x000000000AE30000-0x000000000AE6C000-memory.dmp

                Filesize

                240KB

              • memory/1552-179-0x0000000005700000-0x0000000005710000-memory.dmp

                Filesize

                64KB

              • memory/1552-182-0x000000000B9D0000-0x000000000BA62000-memory.dmp

                Filesize

                584KB

              • memory/1552-177-0x000000000AE90000-0x000000000AF9A000-memory.dmp

                Filesize

                1.0MB

              • memory/1552-176-0x000000000B310000-0x000000000B928000-memory.dmp

                Filesize

                6.1MB

              • memory/1552-187-0x000000000CEA0000-0x000000000D3CC000-memory.dmp

                Filesize

                5.2MB

              • memory/1552-183-0x000000000C020000-0x000000000C5C4000-memory.dmp

                Filesize

                5.6MB

              • memory/1552-184-0x000000000BA70000-0x000000000BAD6000-memory.dmp

                Filesize

                408KB

              • memory/1552-185-0x000000000BE40000-0x000000000BE90000-memory.dmp

                Filesize

                320KB

              • memory/1552-186-0x000000000C7A0000-0x000000000C962000-memory.dmp

                Filesize

                1.8MB

              • memory/2964-170-0x0000000000690000-0x000000000069A000-memory.dmp

                Filesize

                40KB

              • memory/3712-211-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

                Filesize

                64KB

              • memory/3712-206-0x0000000000530000-0x0000000000560000-memory.dmp

                Filesize

                192KB

              • memory/4132-161-0x00000000001F0000-0x00000000001FA000-memory.dmp

                Filesize

                40KB