Analysis

  • max time kernel
    30s
  • max time network
    83s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-07-2023 13:14

General

  • Target

    tmp.exe

  • Size

    6.8MB

  • MD5

    4fcd70f4d036361d2fef09cf03932f7b

  • SHA1

    b8c39838498676d95a267e8f9ee2bb59edb8e76e

  • SHA256

    bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67

  • SHA512

    3bec3c60d903a348712a179bb96cc20ca868abda2019077279877f40b877b2f127b2a60704f276c23fec4da58a5bff78638ca228dfc79726d6afe048120eb9ab

  • SSDEEP

    98304:TBWqiL18HkxPnA8n+wuxT4NqP2ozzv68ZslF8QLkY52P:9RiSk9pnNuiiXi8mF7LkY52P

Malware Config

Extracted

Family

amadey

Version

3.80

C2

45.15.156.208/jd9dd3Vw/index.php

second.amadgood.com/jd9dd3Vw/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Downloads MZ/PE file
  • .NET Reactor proctector 4 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Themida packer 20 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:388
    • C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe
      "C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3268
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:4332
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\eb0f58bce7" /P "Admin:N"&&CACLS "..\eb0f58bce7" /P "Admin:R" /E&&Exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3396
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          4⤵
            PID:4032
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "oneetx.exe" /P "Admin:N"
            4⤵
              PID:2540
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:R" /E
              4⤵
                PID:3560
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                4⤵
                  PID:2656
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\eb0f58bce7" /P "Admin:N"
                  4⤵
                    PID:2216
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\eb0f58bce7" /P "Admin:R" /E
                    4⤵
                      PID:1248
                  • C:\Users\Admin\AppData\Local\Temp\1000120001\taskmask.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000120001\taskmask.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2080
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe"
                      4⤵
                        PID:2440
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe"
                        4⤵
                          PID:640
                      • C:\Users\Admin\AppData\Local\Temp\1000121001\taskhostclp.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000121001\taskhostclp.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Checks whether UAC is enabled
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        PID:1232
                        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
                          C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
                          4⤵
                            PID:4032
                        • C:\Users\Admin\AppData\Local\Temp\1000122101\rdpcllp.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000122101\rdpcllp.exe"
                          3⤵
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4888
                    • C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe
                      C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe
                      1⤵
                        PID:4732

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\1000120001\taskmask.exe

                        Filesize

                        3.4MB

                        MD5

                        126db18bbcf58a186b422970c57e4dbf

                        SHA1

                        97246ee3686052bb9e1142ac789b421b1bb067cc

                        SHA256

                        85693616d48b2266134fccd7197503d7da7d317c318016ea0f988c414a10e756

                        SHA512

                        59a58b17323329286bfc85d410fb7d269f6df82d05fc603871ac4f3440e4cf36e5e4f3a5f19a410fa7f9b4c23785bf38440396e847bb1d87611c2551a12fbca6

                      • C:\Users\Admin\AppData\Local\Temp\1000120001\taskmask.exe

                        Filesize

                        3.4MB

                        MD5

                        126db18bbcf58a186b422970c57e4dbf

                        SHA1

                        97246ee3686052bb9e1142ac789b421b1bb067cc

                        SHA256

                        85693616d48b2266134fccd7197503d7da7d317c318016ea0f988c414a10e756

                        SHA512

                        59a58b17323329286bfc85d410fb7d269f6df82d05fc603871ac4f3440e4cf36e5e4f3a5f19a410fa7f9b4c23785bf38440396e847bb1d87611c2551a12fbca6

                      • C:\Users\Admin\AppData\Local\Temp\1000120001\taskmask.exe

                        Filesize

                        3.4MB

                        MD5

                        126db18bbcf58a186b422970c57e4dbf

                        SHA1

                        97246ee3686052bb9e1142ac789b421b1bb067cc

                        SHA256

                        85693616d48b2266134fccd7197503d7da7d317c318016ea0f988c414a10e756

                        SHA512

                        59a58b17323329286bfc85d410fb7d269f6df82d05fc603871ac4f3440e4cf36e5e4f3a5f19a410fa7f9b4c23785bf38440396e847bb1d87611c2551a12fbca6

                      • C:\Users\Admin\AppData\Local\Temp\1000121001\taskhostclp.exe

                        Filesize

                        3.2MB

                        MD5

                        4472444218925ed8fd4982f141af1978

                        SHA1

                        101ff99cec2f571002915f23290d495671967db3

                        SHA256

                        613d401501fccdf49d405bb8b6ce5f6fe96a2619db54e1e7a6f2410eb2aec72c

                        SHA512

                        b2255bced17a9cf9ab8afb461cea7005d2df77984f3122609d82d9a2f7f5ec3ca23ee8f20f609e60937db134ef721bf90fd759ddbe4df9acbf6216d8d2e15cff

                      • C:\Users\Admin\AppData\Local\Temp\1000121001\taskhostclp.exe

                        Filesize

                        3.2MB

                        MD5

                        4472444218925ed8fd4982f141af1978

                        SHA1

                        101ff99cec2f571002915f23290d495671967db3

                        SHA256

                        613d401501fccdf49d405bb8b6ce5f6fe96a2619db54e1e7a6f2410eb2aec72c

                        SHA512

                        b2255bced17a9cf9ab8afb461cea7005d2df77984f3122609d82d9a2f7f5ec3ca23ee8f20f609e60937db134ef721bf90fd759ddbe4df9acbf6216d8d2e15cff

                      • C:\Users\Admin\AppData\Local\Temp\1000121001\taskhostclp.exe

                        Filesize

                        3.2MB

                        MD5

                        4472444218925ed8fd4982f141af1978

                        SHA1

                        101ff99cec2f571002915f23290d495671967db3

                        SHA256

                        613d401501fccdf49d405bb8b6ce5f6fe96a2619db54e1e7a6f2410eb2aec72c

                        SHA512

                        b2255bced17a9cf9ab8afb461cea7005d2df77984f3122609d82d9a2f7f5ec3ca23ee8f20f609e60937db134ef721bf90fd759ddbe4df9acbf6216d8d2e15cff

                      • C:\Users\Admin\AppData\Local\Temp\1000122101\rdpcllp.exe

                        Filesize

                        10.5MB

                        MD5

                        78e97779f936b06a8c4c96240b7bc85b

                        SHA1

                        c005df8a050723df4127a429b00b9e1ac489c3ff

                        SHA256

                        f4edf7a7d5dba93cbf95ed6b266b64579544676b1f09a27fa487d3c95700eadc

                        SHA512

                        cda792eeb136f3d9a4136c4d7a38056835a01d1bad31e4d12f5381a3fdb86b24b7b1690c77c10f8244806b6316be07c78d1ffa4886ecf0a133b1d57d319f08d2

                      • C:\Users\Admin\AppData\Local\Temp\1000122101\rdpcllp.exe

                        Filesize

                        10.5MB

                        MD5

                        78e97779f936b06a8c4c96240b7bc85b

                        SHA1

                        c005df8a050723df4127a429b00b9e1ac489c3ff

                        SHA256

                        f4edf7a7d5dba93cbf95ed6b266b64579544676b1f09a27fa487d3c95700eadc

                        SHA512

                        cda792eeb136f3d9a4136c4d7a38056835a01d1bad31e4d12f5381a3fdb86b24b7b1690c77c10f8244806b6316be07c78d1ffa4886ecf0a133b1d57d319f08d2

                      • C:\Users\Admin\AppData\Local\Temp\1000122101\rdpcllp.exe

                        Filesize

                        10.5MB

                        MD5

                        78e97779f936b06a8c4c96240b7bc85b

                        SHA1

                        c005df8a050723df4127a429b00b9e1ac489c3ff

                        SHA256

                        f4edf7a7d5dba93cbf95ed6b266b64579544676b1f09a27fa487d3c95700eadc

                        SHA512

                        cda792eeb136f3d9a4136c4d7a38056835a01d1bad31e4d12f5381a3fdb86b24b7b1690c77c10f8244806b6316be07c78d1ffa4886ecf0a133b1d57d319f08d2

                      • C:\Users\Admin\AppData\Local\Temp\722984668182

                        Filesize

                        76KB

                        MD5

                        13afd022074f6b0381a1dfb9e6a3cd92

                        SHA1

                        38ac9850d10a3f631aa7238035f004891bc5cc25

                        SHA256

                        b7620ad43d277acfc0d91d28723be3595275a395b2ecaa9535893f2da7559038

                        SHA512

                        01c1c7f0c417b48eaf54d24d60a0db4b2674221548568bf6c91f58549d49fa784a5026b747812f5d9e1e464c31972b7cba7f244e8ba78e1ed4b6d19b669f7322

                      • C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe

                        Filesize

                        6.8MB

                        MD5

                        4fcd70f4d036361d2fef09cf03932f7b

                        SHA1

                        b8c39838498676d95a267e8f9ee2bb59edb8e76e

                        SHA256

                        bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67

                        SHA512

                        3bec3c60d903a348712a179bb96cc20ca868abda2019077279877f40b877b2f127b2a60704f276c23fec4da58a5bff78638ca228dfc79726d6afe048120eb9ab

                      • C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe

                        Filesize

                        6.8MB

                        MD5

                        4fcd70f4d036361d2fef09cf03932f7b

                        SHA1

                        b8c39838498676d95a267e8f9ee2bb59edb8e76e

                        SHA256

                        bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67

                        SHA512

                        3bec3c60d903a348712a179bb96cc20ca868abda2019077279877f40b877b2f127b2a60704f276c23fec4da58a5bff78638ca228dfc79726d6afe048120eb9ab

                      • C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe

                        Filesize

                        6.8MB

                        MD5

                        4fcd70f4d036361d2fef09cf03932f7b

                        SHA1

                        b8c39838498676d95a267e8f9ee2bb59edb8e76e

                        SHA256

                        bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67

                        SHA512

                        3bec3c60d903a348712a179bb96cc20ca868abda2019077279877f40b877b2f127b2a60704f276c23fec4da58a5bff78638ca228dfc79726d6afe048120eb9ab

                      • C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe

                        Filesize

                        6.8MB

                        MD5

                        4fcd70f4d036361d2fef09cf03932f7b

                        SHA1

                        b8c39838498676d95a267e8f9ee2bb59edb8e76e

                        SHA256

                        bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67

                        SHA512

                        3bec3c60d903a348712a179bb96cc20ca868abda2019077279877f40b877b2f127b2a60704f276c23fec4da58a5bff78638ca228dfc79726d6afe048120eb9ab

                      • memory/388-153-0x0000000076B80000-0x0000000076C70000-memory.dmp

                        Filesize

                        960KB

                      • memory/388-151-0x0000000000C10000-0x0000000001306000-memory.dmp

                        Filesize

                        7.0MB

                      • memory/388-141-0x0000000000C10000-0x0000000001306000-memory.dmp

                        Filesize

                        7.0MB

                      • memory/388-140-0x0000000000C10000-0x0000000001306000-memory.dmp

                        Filesize

                        7.0MB

                      • memory/388-133-0x0000000000C10000-0x0000000001306000-memory.dmp

                        Filesize

                        7.0MB

                      • memory/388-139-0x0000000000C10000-0x0000000001306000-memory.dmp

                        Filesize

                        7.0MB

                      • memory/388-138-0x0000000000C10000-0x0000000001306000-memory.dmp

                        Filesize

                        7.0MB

                      • memory/388-137-0x0000000077674000-0x0000000077676000-memory.dmp

                        Filesize

                        8KB

                      • memory/388-136-0x0000000076B80000-0x0000000076C70000-memory.dmp

                        Filesize

                        960KB

                      • memory/388-135-0x0000000076B80000-0x0000000076C70000-memory.dmp

                        Filesize

                        960KB

                      • memory/388-134-0x0000000076B80000-0x0000000076C70000-memory.dmp

                        Filesize

                        960KB

                      • memory/640-302-0x00000000083C0000-0x00000000089D8000-memory.dmp

                        Filesize

                        6.1MB

                      • memory/640-297-0x00000000077F0000-0x0000000007D94000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/640-298-0x0000000007320000-0x00000000073B2000-memory.dmp

                        Filesize

                        584KB

                      • memory/640-294-0x0000000072F10000-0x00000000736C0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/640-290-0x0000000000400000-0x000000000045A000-memory.dmp

                        Filesize

                        360KB

                      • memory/640-300-0x00000000074C0000-0x00000000074D0000-memory.dmp

                        Filesize

                        64KB

                      • memory/640-301-0x00000000074F0000-0x00000000074FA000-memory.dmp

                        Filesize

                        40KB

                      • memory/640-303-0x00000000075B0000-0x00000000075C2000-memory.dmp

                        Filesize

                        72KB

                      • memory/640-304-0x00000000076E0000-0x00000000077EA000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/640-307-0x0000000007610000-0x000000000764C000-memory.dmp

                        Filesize

                        240KB

                      • memory/640-311-0x0000000007EE0000-0x0000000007F46000-memory.dmp

                        Filesize

                        408KB

                      • memory/1232-231-0x00000000003D0000-0x0000000000B91000-memory.dmp

                        Filesize

                        7.8MB

                      • memory/1232-218-0x00000000003D0000-0x0000000000B91000-memory.dmp

                        Filesize

                        7.8MB

                      • memory/1232-312-0x00000000003D0000-0x0000000000B91000-memory.dmp

                        Filesize

                        7.8MB

                      • memory/1232-222-0x00007FF94AF70000-0x00007FF94B165000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/1232-223-0x00000000003D0000-0x0000000000B91000-memory.dmp

                        Filesize

                        7.8MB

                      • memory/1232-224-0x00000000003D0000-0x0000000000B91000-memory.dmp

                        Filesize

                        7.8MB

                      • memory/1232-225-0x00000000003D0000-0x0000000000B91000-memory.dmp

                        Filesize

                        7.8MB

                      • memory/1232-226-0x00000000003D0000-0x0000000000B91000-memory.dmp

                        Filesize

                        7.8MB

                      • memory/1232-227-0x00000000003D0000-0x0000000000B91000-memory.dmp

                        Filesize

                        7.8MB

                      • memory/1232-228-0x00000000003D0000-0x0000000000B91000-memory.dmp

                        Filesize

                        7.8MB

                      • memory/1232-229-0x00000000003D0000-0x0000000000B91000-memory.dmp

                        Filesize

                        7.8MB

                      • memory/1232-230-0x00000000003D0000-0x0000000000B91000-memory.dmp

                        Filesize

                        7.8MB

                      • memory/1232-308-0x00000000003D0000-0x0000000000B91000-memory.dmp

                        Filesize

                        7.8MB

                      • memory/1232-278-0x00007FF94AF70000-0x00007FF94B165000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/1232-233-0x00000000003D0000-0x0000000000B91000-memory.dmp

                        Filesize

                        7.8MB

                      • memory/1232-255-0x00000000003D0000-0x0000000000B91000-memory.dmp

                        Filesize

                        7.8MB

                      • memory/1232-235-0x00000000003D0000-0x0000000000B91000-memory.dmp

                        Filesize

                        7.8MB

                      • memory/2080-274-0x00000000051B0000-0x00000000051C5000-memory.dmp

                        Filesize

                        84KB

                      • memory/2080-268-0x00000000051B0000-0x00000000051C5000-memory.dmp

                        Filesize

                        84KB

                      • memory/2080-221-0x0000000005100000-0x0000000005101000-memory.dmp

                        Filesize

                        4KB

                      • memory/2080-219-0x0000000005210000-0x0000000005220000-memory.dmp

                        Filesize

                        64KB

                      • memory/2080-256-0x0000000005210000-0x0000000005220000-memory.dmp

                        Filesize

                        64KB

                      • memory/2080-257-0x00000000051B0000-0x00000000051C5000-memory.dmp

                        Filesize

                        84KB

                      • memory/2080-258-0x00000000051B0000-0x00000000051C5000-memory.dmp

                        Filesize

                        84KB

                      • memory/2080-260-0x00000000051B0000-0x00000000051C5000-memory.dmp

                        Filesize

                        84KB

                      • memory/2080-262-0x00000000051B0000-0x00000000051C5000-memory.dmp

                        Filesize

                        84KB

                      • memory/2080-264-0x00000000051B0000-0x00000000051C5000-memory.dmp

                        Filesize

                        84KB

                      • memory/2080-266-0x00000000051B0000-0x00000000051C5000-memory.dmp

                        Filesize

                        84KB

                      • memory/2080-232-0x0000000072F10000-0x00000000736C0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/2080-270-0x00000000051B0000-0x00000000051C5000-memory.dmp

                        Filesize

                        84KB

                      • memory/2080-272-0x00000000051B0000-0x00000000051C5000-memory.dmp

                        Filesize

                        84KB

                      • memory/2080-220-0x0000000005230000-0x00000000052CC000-memory.dmp

                        Filesize

                        624KB

                      • memory/2080-276-0x00000000051B0000-0x00000000051C5000-memory.dmp

                        Filesize

                        84KB

                      • memory/2080-296-0x0000000072F10000-0x00000000736C0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/2080-279-0x00000000051B0000-0x00000000051C5000-memory.dmp

                        Filesize

                        84KB

                      • memory/2080-196-0x0000000072F10000-0x00000000736C0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/2080-195-0x0000000000480000-0x00000000007F0000-memory.dmp

                        Filesize

                        3.4MB

                      • memory/2080-283-0x00000000051B0000-0x00000000051C5000-memory.dmp

                        Filesize

                        84KB

                      • memory/3268-159-0x0000000000920000-0x0000000001016000-memory.dmp

                        Filesize

                        7.0MB

                      • memory/3268-154-0x0000000076B80000-0x0000000076C70000-memory.dmp

                        Filesize

                        960KB

                      • memory/3268-197-0x0000000076B80000-0x0000000076C70000-memory.dmp

                        Filesize

                        960KB

                      • memory/3268-152-0x0000000000920000-0x0000000001016000-memory.dmp

                        Filesize

                        7.0MB

                      • memory/3268-310-0x0000000000920000-0x0000000001016000-memory.dmp

                        Filesize

                        7.0MB

                      • memory/3268-234-0x0000000000920000-0x0000000001016000-memory.dmp

                        Filesize

                        7.0MB

                      • memory/3268-155-0x0000000076B80000-0x0000000076C70000-memory.dmp

                        Filesize

                        960KB

                      • memory/3268-156-0x0000000000920000-0x0000000001016000-memory.dmp

                        Filesize

                        7.0MB

                      • memory/3268-157-0x0000000000920000-0x0000000001016000-memory.dmp

                        Filesize

                        7.0MB

                      • memory/3268-194-0x0000000000920000-0x0000000001016000-memory.dmp

                        Filesize

                        7.0MB

                      • memory/3268-185-0x0000000076B80000-0x0000000076C70000-memory.dmp

                        Filesize

                        960KB

                      • memory/3268-173-0x0000000000920000-0x0000000001016000-memory.dmp

                        Filesize

                        7.0MB

                      • memory/3268-208-0x0000000076B80000-0x0000000076C70000-memory.dmp

                        Filesize

                        960KB

                      • memory/3268-158-0x0000000000920000-0x0000000001016000-memory.dmp

                        Filesize

                        7.0MB

                      • memory/4732-309-0x0000000000920000-0x0000000001016000-memory.dmp

                        Filesize

                        7.0MB

                      • memory/4888-280-0x00007FF94B170000-0x00007FF94B172000-memory.dmp

                        Filesize

                        8KB

                      • memory/4888-282-0x00007FF94B180000-0x00007FF94B182000-memory.dmp

                        Filesize

                        8KB

                      • memory/4888-286-0x00007FF948C00000-0x00007FF948C02000-memory.dmp

                        Filesize

                        8KB

                      • memory/4888-288-0x00007FF94B190000-0x00007FF94B192000-memory.dmp

                        Filesize

                        8KB

                      • memory/4888-291-0x00007FF6672B0000-0x00007FF668B1D000-memory.dmp

                        Filesize

                        24.4MB

                      • memory/4888-284-0x00007FF9498B0000-0x00007FF9498B2000-memory.dmp

                        Filesize

                        8KB

                      • memory/4888-285-0x00007FF9498C0000-0x00007FF9498C2000-memory.dmp

                        Filesize

                        8KB

                      • memory/4888-287-0x00007FF948C10000-0x00007FF948C12000-memory.dmp

                        Filesize

                        8KB