Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/07/2023, 13:46

General

  • Target

    246bb5b5f471c8e65caa48a14c1fac03cd15ea8c98bb27700a36ec2b1da971f5.exe

  • Size

    514KB

  • MD5

    4cdce3cc944c680e312fe20999b63230

  • SHA1

    e7f1b517f4ebcebed6b8b0f9b85ba41b6d3d9fe8

  • SHA256

    246bb5b5f471c8e65caa48a14c1fac03cd15ea8c98bb27700a36ec2b1da971f5

  • SHA512

    21f6867e87d32410e02856db22ee097be941087aab79e5e2f86dd04cbb5c839e52f95800e68a085735086cc1fdf0c810e304d70653bd8924e88a00fa3ac864ab

  • SSDEEP

    12288:XMrXy90c/cRbD4P70/BTMoC1Vx5bBQry1sNZDF8ET5VfV:cyAKUTMoC1VXyDDCM5BV

Malware Config

Extracted

Family

amadey

Version

3.85

C2

77.91.68.3/home/love/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

roma

C2

77.91.68.56:19071

Attributes
  • auth_value

    f099c2cf92834dbc554a94e1456cf576

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 2 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\246bb5b5f471c8e65caa48a14c1fac03cd15ea8c98bb27700a36ec2b1da971f5.exe
    "C:\Users\Admin\AppData\Local\Temp\246bb5b5f471c8e65caa48a14c1fac03cd15ea8c98bb27700a36ec2b1da971f5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:428
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0878865.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0878865.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4916
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3854355.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3854355.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4680
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6572726.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6572726.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2928
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2827235.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2827235.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1732
          • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
            "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4828
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:4436
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3768
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:4848
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "danke.exe" /P "Admin:N"
                  7⤵
                    PID:3100
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "danke.exe" /P "Admin:R" /E
                    7⤵
                      PID:1652
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:4280
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\3ec1f323b5" /P "Admin:N"
                        7⤵
                          PID:2224
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\3ec1f323b5" /P "Admin:R" /E
                          7⤵
                            PID:2700
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                          6⤵
                          • Loads dropped DLL
                          PID:3000
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1772286.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1772286.exe
                    3⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    PID:828
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d4762103.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d4762103.exe
                  2⤵
                  • Executes dropped EXE
                  PID:4224
              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                1⤵
                • Executes dropped EXE
                PID:3516
              • C:\Users\Admin\AppData\Local\Temp\284E.exe
                C:\Users\Admin\AppData\Local\Temp\284E.exe
                1⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:5092
                • C:\Windows\SysWOW64\regsvr32.exe
                  "C:\Windows\System32\regsvr32.exe" M2W0FJ._nC -S
                  2⤵
                  • Loads dropped DLL
                  PID:4648
              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                1⤵
                • Executes dropped EXE
                PID:4720

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\284E.exe

                Filesize

                1.5MB

                MD5

                c80819c58e8f589679c849ede9ed3fd4

                SHA1

                73377369b69fa27013be241a3415fe18983ceb93

                SHA256

                0cbe67d8c27ec889eca8e073097555e79c2f0d59334c9e6537828638f0aeec52

                SHA512

                d6ab22161278ffd2328672d046089f15d634abbfdbdc9a2ee69e87a372bb34726138ef94f1493337a3f183f7fc9cc67a8923e90d5c3b4d0651984ad684a4e05a

              • C:\Users\Admin\AppData\Local\Temp\284E.exe

                Filesize

                1.5MB

                MD5

                c80819c58e8f589679c849ede9ed3fd4

                SHA1

                73377369b69fa27013be241a3415fe18983ceb93

                SHA256

                0cbe67d8c27ec889eca8e073097555e79c2f0d59334c9e6537828638f0aeec52

                SHA512

                d6ab22161278ffd2328672d046089f15d634abbfdbdc9a2ee69e87a372bb34726138ef94f1493337a3f183f7fc9cc67a8923e90d5c3b4d0651984ad684a4e05a

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                225KB

                MD5

                9b95a4806715a2ae4e9062908b1d717e

                SHA1

                9eca4f283a424e3b52c0f2cd127f1852f90b1ed2

                SHA256

                85d7b5864b5c6d6c22dcdca1cf17019f1727123a12dc9b827facf88a58f6e957

                SHA512

                43f6713f817bd03a0bda0b4327dfb2cd03078c3621ef6558a21fe7b6295cc8590f2dded50922968e578b39ce5822c89080c2478854bf5637cc14c31466a1a55f

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                225KB

                MD5

                9b95a4806715a2ae4e9062908b1d717e

                SHA1

                9eca4f283a424e3b52c0f2cd127f1852f90b1ed2

                SHA256

                85d7b5864b5c6d6c22dcdca1cf17019f1727123a12dc9b827facf88a58f6e957

                SHA512

                43f6713f817bd03a0bda0b4327dfb2cd03078c3621ef6558a21fe7b6295cc8590f2dded50922968e578b39ce5822c89080c2478854bf5637cc14c31466a1a55f

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                225KB

                MD5

                9b95a4806715a2ae4e9062908b1d717e

                SHA1

                9eca4f283a424e3b52c0f2cd127f1852f90b1ed2

                SHA256

                85d7b5864b5c6d6c22dcdca1cf17019f1727123a12dc9b827facf88a58f6e957

                SHA512

                43f6713f817bd03a0bda0b4327dfb2cd03078c3621ef6558a21fe7b6295cc8590f2dded50922968e578b39ce5822c89080c2478854bf5637cc14c31466a1a55f

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                225KB

                MD5

                9b95a4806715a2ae4e9062908b1d717e

                SHA1

                9eca4f283a424e3b52c0f2cd127f1852f90b1ed2

                SHA256

                85d7b5864b5c6d6c22dcdca1cf17019f1727123a12dc9b827facf88a58f6e957

                SHA512

                43f6713f817bd03a0bda0b4327dfb2cd03078c3621ef6558a21fe7b6295cc8590f2dded50922968e578b39ce5822c89080c2478854bf5637cc14c31466a1a55f

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                225KB

                MD5

                9b95a4806715a2ae4e9062908b1d717e

                SHA1

                9eca4f283a424e3b52c0f2cd127f1852f90b1ed2

                SHA256

                85d7b5864b5c6d6c22dcdca1cf17019f1727123a12dc9b827facf88a58f6e957

                SHA512

                43f6713f817bd03a0bda0b4327dfb2cd03078c3621ef6558a21fe7b6295cc8590f2dded50922968e578b39ce5822c89080c2478854bf5637cc14c31466a1a55f

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d4762103.exe

                Filesize

                174KB

                MD5

                32890e85fb0319370d3a82f781503b10

                SHA1

                044127f1beb6456dcd14cc1320d76e3141e0101e

                SHA256

                4dff876a22f999151d814bf5cf5fab5546e58966165edbfc5fcebe2a4cea3ece

                SHA512

                1ebf0053f966af94ca9db1df1af3b84324c2d4b03179b42a564bf2200ffeb692b76bf4e5a75ec1ed6c427db455bd269e7912e4b3b8dde1c07ec055f351f04727

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d4762103.exe

                Filesize

                174KB

                MD5

                32890e85fb0319370d3a82f781503b10

                SHA1

                044127f1beb6456dcd14cc1320d76e3141e0101e

                SHA256

                4dff876a22f999151d814bf5cf5fab5546e58966165edbfc5fcebe2a4cea3ece

                SHA512

                1ebf0053f966af94ca9db1df1af3b84324c2d4b03179b42a564bf2200ffeb692b76bf4e5a75ec1ed6c427db455bd269e7912e4b3b8dde1c07ec055f351f04727

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0878865.exe

                Filesize

                359KB

                MD5

                ded4cee0f054c2c5be69bd1c23ed072f

                SHA1

                216af7a850b378d342b0ee3356e10392a8e9b654

                SHA256

                2b993538af652c913dfb7883c3704325ee31a3c98c604f68349d2aed40290efa

                SHA512

                51dc671d2823e67985ffd41d44ced150749a511540598f972c40bb6a6bce61c95b53537a178740c229f03f96419cc78bc1d15533df0cb67caddaa7e08daa772c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0878865.exe

                Filesize

                359KB

                MD5

                ded4cee0f054c2c5be69bd1c23ed072f

                SHA1

                216af7a850b378d342b0ee3356e10392a8e9b654

                SHA256

                2b993538af652c913dfb7883c3704325ee31a3c98c604f68349d2aed40290efa

                SHA512

                51dc671d2823e67985ffd41d44ced150749a511540598f972c40bb6a6bce61c95b53537a178740c229f03f96419cc78bc1d15533df0cb67caddaa7e08daa772c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1772286.exe

                Filesize

                31KB

                MD5

                5e23d9a31bcffbe140e3042366ae7898

                SHA1

                e330dedc1f07305d8c5f7ddea879062aa2f950d5

                SHA256

                f4b4f123814fe1b4953fdbb95169ddca4614d0cadf31261097f372ebaac4421b

                SHA512

                9cb67d62e1d5f507d84e5eca703813d71a3612fd55770023bba2c9deac6fdb2218f0f4b130ba304cc849767289c5597b37932d24120fba77f3a80415468353a9

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1772286.exe

                Filesize

                31KB

                MD5

                5e23d9a31bcffbe140e3042366ae7898

                SHA1

                e330dedc1f07305d8c5f7ddea879062aa2f950d5

                SHA256

                f4b4f123814fe1b4953fdbb95169ddca4614d0cadf31261097f372ebaac4421b

                SHA512

                9cb67d62e1d5f507d84e5eca703813d71a3612fd55770023bba2c9deac6fdb2218f0f4b130ba304cc849767289c5597b37932d24120fba77f3a80415468353a9

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3854355.exe

                Filesize

                235KB

                MD5

                ae52aa1c9350d49b324093a66286e07e

                SHA1

                124b3f647120a98055070fc3cf0ef32ec938b82b

                SHA256

                d9643aa10e82b629dbc1f811b4ce07a1553146227ee0e78c69fe38059a952335

                SHA512

                064efc56152645afa1fdc5f0fe0c6093522b498b9159921ccb6143811b0bc9efab3c4cb104fb9fc9ef855d1fb27dac41427397b7e5a14e19ef0245f5c2fa3c9e

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3854355.exe

                Filesize

                235KB

                MD5

                ae52aa1c9350d49b324093a66286e07e

                SHA1

                124b3f647120a98055070fc3cf0ef32ec938b82b

                SHA256

                d9643aa10e82b629dbc1f811b4ce07a1553146227ee0e78c69fe38059a952335

                SHA512

                064efc56152645afa1fdc5f0fe0c6093522b498b9159921ccb6143811b0bc9efab3c4cb104fb9fc9ef855d1fb27dac41427397b7e5a14e19ef0245f5c2fa3c9e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6572726.exe

                Filesize

                13KB

                MD5

                c79f84e2f3fd2b7df6c046d5c4d95ad1

                SHA1

                e106f129ac747aa7f181af2572e5151eaccd31ee

                SHA256

                0c8e5eaa6e83d02a0a22f1438acc80c5299be6c3d247e11c8f6ba7303cc5ec14

                SHA512

                6fb9a4aad276cbc4664c0ee1939f1675eaca91fb23fbee0795f0b873579660b7a9beddd6dc6b5c112a3038d6b5e05ac27835c38f18413c74c651ee075653f2e1

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6572726.exe

                Filesize

                13KB

                MD5

                c79f84e2f3fd2b7df6c046d5c4d95ad1

                SHA1

                e106f129ac747aa7f181af2572e5151eaccd31ee

                SHA256

                0c8e5eaa6e83d02a0a22f1438acc80c5299be6c3d247e11c8f6ba7303cc5ec14

                SHA512

                6fb9a4aad276cbc4664c0ee1939f1675eaca91fb23fbee0795f0b873579660b7a9beddd6dc6b5c112a3038d6b5e05ac27835c38f18413c74c651ee075653f2e1

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2827235.exe

                Filesize

                225KB

                MD5

                9b95a4806715a2ae4e9062908b1d717e

                SHA1

                9eca4f283a424e3b52c0f2cd127f1852f90b1ed2

                SHA256

                85d7b5864b5c6d6c22dcdca1cf17019f1727123a12dc9b827facf88a58f6e957

                SHA512

                43f6713f817bd03a0bda0b4327dfb2cd03078c3621ef6558a21fe7b6295cc8590f2dded50922968e578b39ce5822c89080c2478854bf5637cc14c31466a1a55f

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2827235.exe

                Filesize

                225KB

                MD5

                9b95a4806715a2ae4e9062908b1d717e

                SHA1

                9eca4f283a424e3b52c0f2cd127f1852f90b1ed2

                SHA256

                85d7b5864b5c6d6c22dcdca1cf17019f1727123a12dc9b827facf88a58f6e957

                SHA512

                43f6713f817bd03a0bda0b4327dfb2cd03078c3621ef6558a21fe7b6295cc8590f2dded50922968e578b39ce5822c89080c2478854bf5637cc14c31466a1a55f

              • C:\Users\Admin\AppData\Local\Temp\M2W0FJ._nC

                Filesize

                1.2MB

                MD5

                69900723d2d8bcb9c946f57d73272d2d

                SHA1

                b8c2e1ee5bb2215ee4dfd693767e19919359fec0

                SHA256

                b2c89e5f1c506b6d3e8a969358d0c7f7d21b98bd166112e2c39c55c925eac928

                SHA512

                92d3f472881e3b748742205d012f89829a1c663fe51051b06e20bf9bf8def1eb2bf4eea683be74bd1bbf65c6b660324d1370c45a6926fa81ae1952b349bcc8d7

              • C:\Users\Admin\AppData\Local\Temp\M2w0FJ._nC

                Filesize

                1.2MB

                MD5

                69900723d2d8bcb9c946f57d73272d2d

                SHA1

                b8c2e1ee5bb2215ee4dfd693767e19919359fec0

                SHA256

                b2c89e5f1c506b6d3e8a969358d0c7f7d21b98bd166112e2c39c55c925eac928

                SHA512

                92d3f472881e3b748742205d012f89829a1c663fe51051b06e20bf9bf8def1eb2bf4eea683be74bd1bbf65c6b660324d1370c45a6926fa81ae1952b349bcc8d7

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                dc587d08b8ca3cd62e5dc057d41a966b

                SHA1

                0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                SHA256

                7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                SHA512

                7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                dc587d08b8ca3cd62e5dc057d41a966b

                SHA1

                0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                SHA256

                7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                SHA512

                7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                dc587d08b8ca3cd62e5dc057d41a966b

                SHA1

                0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                SHA256

                7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                SHA512

                7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                272B

                MD5

                d867eabb1be5b45bc77bb06814e23640

                SHA1

                3139a51ce7e8462c31070363b9532c13cc52c82d

                SHA256

                38c69e3f9f3927f8178d55cde9774a2b170c057b349b73932b87b76499d03349

                SHA512

                afc40d5fa7bcd41b8445f597990d150d57e3621ddef9400af742471aa0d14c2e66cfecc34482dadbaeb6f20912fda8ab786e584bf7fd1ad5fa23d3b95425fd59

              • memory/828-175-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/828-178-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/2928-154-0x0000000000870000-0x000000000087A000-memory.dmp

                Filesize

                40KB

              • memory/2928-155-0x00007FFFB50C0000-0x00007FFFB5B81000-memory.dmp

                Filesize

                10.8MB

              • memory/2928-156-0x00007FFFB50C0000-0x00007FFFB5B81000-memory.dmp

                Filesize

                10.8MB

              • memory/2928-158-0x00007FFFB50C0000-0x00007FFFB5B81000-memory.dmp

                Filesize

                10.8MB

              • memory/3108-176-0x0000000002B90000-0x0000000002BA6000-memory.dmp

                Filesize

                88KB

              • memory/4224-190-0x0000000073010000-0x00000000737C0000-memory.dmp

                Filesize

                7.7MB

              • memory/4224-186-0x00000000059A0000-0x0000000005AAA000-memory.dmp

                Filesize

                1.0MB

              • memory/4224-191-0x0000000005680000-0x0000000005690000-memory.dmp

                Filesize

                64KB

              • memory/4224-184-0x0000000073010000-0x00000000737C0000-memory.dmp

                Filesize

                7.7MB

              • memory/4224-189-0x00000000058F0000-0x000000000592C000-memory.dmp

                Filesize

                240KB

              • memory/4224-187-0x0000000005890000-0x00000000058A2000-memory.dmp

                Filesize

                72KB

              • memory/4224-188-0x0000000005680000-0x0000000005690000-memory.dmp

                Filesize

                64KB

              • memory/4224-183-0x0000000000DC0000-0x0000000000DF0000-memory.dmp

                Filesize

                192KB

              • memory/4224-185-0x0000000005EB0000-0x00000000064C8000-memory.dmp

                Filesize

                6.1MB

              • memory/4648-220-0x0000000000FF0000-0x0000000000FF6000-memory.dmp

                Filesize

                24KB

              • memory/4648-225-0x0000000002DA0000-0x0000000002EB6000-memory.dmp

                Filesize

                1.1MB

              • memory/4648-226-0x0000000002EC0000-0x0000000002FBB000-memory.dmp

                Filesize

                1004KB

              • memory/4648-229-0x0000000002EC0000-0x0000000002FBB000-memory.dmp

                Filesize

                1004KB

              • memory/4648-230-0x0000000002EC0000-0x0000000002FBB000-memory.dmp

                Filesize

                1004KB

              • memory/4648-221-0x0000000000400000-0x000000000053F000-memory.dmp

                Filesize

                1.2MB