Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24/07/2023, 04:56

General

  • Target

    c1f81d0ea8c6ae86b6e0b37ad067e21b6681795461c973ab64f5892611a3f589.exe

  • Size

    515KB

  • MD5

    43e960bfea9d2887033f5ecc415922ee

  • SHA1

    7112c11139b58c7562b6039babd7c745811d7d4e

  • SHA256

    c1f81d0ea8c6ae86b6e0b37ad067e21b6681795461c973ab64f5892611a3f589

  • SHA512

    108d1f7561b52f8b7a6ec23e52fb1f50c923bf2dfb6bf5e69ef37d1ad81dd093abb78dafe958e8d91c124660a128a22140b043382cf27a2038789cd9b38cc09f

  • SSDEEP

    6144:Kiy+bnr+lp0yN90QEYk9YwnRDYms4i2hSFZGgBiStStdGsgzaek6onFTT4mRTsh5:WMrhy90bn9PjhiZDutdgoFQmG6bub

Malware Config

Extracted

Family

amadey

Version

3.85

C2

77.91.68.3/home/love/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

news

C2

77.91.68.68:19071

Attributes
  • auth_value

    99ba2ffe8d72ebe9fdc7e758c94db148

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 2 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1f81d0ea8c6ae86b6e0b37ad067e21b6681795461c973ab64f5892611a3f589.exe
    "C:\Users\Admin\AppData\Local\Temp\c1f81d0ea8c6ae86b6e0b37ad067e21b6681795461c973ab64f5892611a3f589.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3232
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9347279.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9347279.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4704
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7796433.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7796433.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4648
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0274911.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0274911.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4628
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9968398.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9968398.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2212
          • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
            "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3720
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:4432
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3996
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:3684
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "danke.exe" /P "Admin:N"
                  7⤵
                    PID:4092
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "danke.exe" /P "Admin:R" /E
                    7⤵
                      PID:3528
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:196
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\3ec1f323b5" /P "Admin:N"
                        7⤵
                          PID:1080
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\3ec1f323b5" /P "Admin:R" /E
                          7⤵
                            PID:208
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                          6⤵
                          • Loads dropped DLL
                          PID:4744
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0716994.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0716994.exe
                    3⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    PID:2080
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5856297.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5856297.exe
                  2⤵
                  • Executes dropped EXE
                  PID:2100
              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                1⤵
                • Executes dropped EXE
                PID:2860
              • C:\Users\Admin\AppData\Local\Temp\83.exe
                C:\Users\Admin\AppData\Local\Temp\83.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:4740
                • C:\Windows\SysWOW64\msiexec.exe
                  "C:\Windows\System32\msiexec.exe" -y .\_E62LIn4.O
                  2⤵
                  • Loads dropped DLL
                  PID:5096

              Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                      Filesize

                      230KB

                      MD5

                      5eb7c1af927c791a38e30aebf280c2ba

                      SHA1

                      d3a06fc12d2c2967d59f869595a8a67d77ebc015

                      SHA256

                      144a35fa39f55dfcab2a4fcc0b68d699cdb3ce3ca759f0921161bde63e7cbe10

                      SHA512

                      e84981c02fcbec9f06ec492f3232b138df5584e51d7687f0b4d06328fd07ef948101d57e7bb20c25b389d68608178a095bdc1f9f3eb7b2e019afe42ddd23651b

                    • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                      Filesize

                      230KB

                      MD5

                      5eb7c1af927c791a38e30aebf280c2ba

                      SHA1

                      d3a06fc12d2c2967d59f869595a8a67d77ebc015

                      SHA256

                      144a35fa39f55dfcab2a4fcc0b68d699cdb3ce3ca759f0921161bde63e7cbe10

                      SHA512

                      e84981c02fcbec9f06ec492f3232b138df5584e51d7687f0b4d06328fd07ef948101d57e7bb20c25b389d68608178a095bdc1f9f3eb7b2e019afe42ddd23651b

                    • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                      Filesize

                      230KB

                      MD5

                      5eb7c1af927c791a38e30aebf280c2ba

                      SHA1

                      d3a06fc12d2c2967d59f869595a8a67d77ebc015

                      SHA256

                      144a35fa39f55dfcab2a4fcc0b68d699cdb3ce3ca759f0921161bde63e7cbe10

                      SHA512

                      e84981c02fcbec9f06ec492f3232b138df5584e51d7687f0b4d06328fd07ef948101d57e7bb20c25b389d68608178a095bdc1f9f3eb7b2e019afe42ddd23651b

                    • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                      Filesize

                      230KB

                      MD5

                      5eb7c1af927c791a38e30aebf280c2ba

                      SHA1

                      d3a06fc12d2c2967d59f869595a8a67d77ebc015

                      SHA256

                      144a35fa39f55dfcab2a4fcc0b68d699cdb3ce3ca759f0921161bde63e7cbe10

                      SHA512

                      e84981c02fcbec9f06ec492f3232b138df5584e51d7687f0b4d06328fd07ef948101d57e7bb20c25b389d68608178a095bdc1f9f3eb7b2e019afe42ddd23651b

                    • C:\Users\Admin\AppData\Local\Temp\83.exe

                      Filesize

                      1.6MB

                      MD5

                      436c574c5b11a763dd96c83bca8bb4b3

                      SHA1

                      3d0bca0898cb7cb43c93f5b1a24b3a099f760891

                      SHA256

                      a4996fca522880b7495304b8b0959c56b71dd62e42d8dfd2001e73bcb5023499

                      SHA512

                      bfbc35d14d682018608f30f874c71608cb1ffd0077e4445ced049344e359ab1d2a114013c2bb7c49a32982a9cffdba4667646e45a1ec7fbafead221fb9d84144

                    • C:\Users\Admin\AppData\Local\Temp\83.exe

                      Filesize

                      1.6MB

                      MD5

                      436c574c5b11a763dd96c83bca8bb4b3

                      SHA1

                      3d0bca0898cb7cb43c93f5b1a24b3a099f760891

                      SHA256

                      a4996fca522880b7495304b8b0959c56b71dd62e42d8dfd2001e73bcb5023499

                      SHA512

                      bfbc35d14d682018608f30f874c71608cb1ffd0077e4445ced049344e359ab1d2a114013c2bb7c49a32982a9cffdba4667646e45a1ec7fbafead221fb9d84144

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5856297.exe

                      Filesize

                      175KB

                      MD5

                      f1ef1ba3dd6aeef74eaedd4bfd0677ec

                      SHA1

                      2056261bc211ab8d6ffca1ce9d7d163d45cfd54e

                      SHA256

                      4862a98300813dc8e57621966bfbdfcd1ca2960f54d406a396c2a6f30037c64f

                      SHA512

                      4e4e997253fb112fc9d33d7c066054e6d7b0a003b73c4eb9432bc264f35674cda10a76682248c0c5e50bb10e35b1a7b806a7bda881d76224710364e4da3d65c1

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5856297.exe

                      Filesize

                      175KB

                      MD5

                      f1ef1ba3dd6aeef74eaedd4bfd0677ec

                      SHA1

                      2056261bc211ab8d6ffca1ce9d7d163d45cfd54e

                      SHA256

                      4862a98300813dc8e57621966bfbdfcd1ca2960f54d406a396c2a6f30037c64f

                      SHA512

                      4e4e997253fb112fc9d33d7c066054e6d7b0a003b73c4eb9432bc264f35674cda10a76682248c0c5e50bb10e35b1a7b806a7bda881d76224710364e4da3d65c1

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9347279.exe

                      Filesize

                      359KB

                      MD5

                      e0e29155eeda8856f2f0075678ab939b

                      SHA1

                      f550f8064d652e8bea1323b677b95a457090a973

                      SHA256

                      dd34ffa0313b2aadb56edd7eb41b8916688785ac43656076b186db9a61d509c9

                      SHA512

                      4cd24b6d2334bb01b57da2bce29a9a2a6abf1c56247bdeb1d17f0dfc5547119a7989806e0dd6ef7114d0ce2860f07eb7e38c429e99b15dcc2954c84c603a3d1f

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9347279.exe

                      Filesize

                      359KB

                      MD5

                      e0e29155eeda8856f2f0075678ab939b

                      SHA1

                      f550f8064d652e8bea1323b677b95a457090a973

                      SHA256

                      dd34ffa0313b2aadb56edd7eb41b8916688785ac43656076b186db9a61d509c9

                      SHA512

                      4cd24b6d2334bb01b57da2bce29a9a2a6abf1c56247bdeb1d17f0dfc5547119a7989806e0dd6ef7114d0ce2860f07eb7e38c429e99b15dcc2954c84c603a3d1f

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0716994.exe

                      Filesize

                      34KB

                      MD5

                      50a4bb97574b416678209762f9367c8b

                      SHA1

                      d0bee71104a22d4cdf4f837266882d05eb39479f

                      SHA256

                      a142ca4464878fca69239ec7cca427ffe73f78318164f05db924e95b222a6af1

                      SHA512

                      ac4cdbede1dabe84ffa476aa59ec38d963f2b79cfa9b85b6a3183f1eb8da0c40450e40af64852b0513a136226099b307a055975fc03a2bcd6c65b733842b478c

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0716994.exe

                      Filesize

                      34KB

                      MD5

                      50a4bb97574b416678209762f9367c8b

                      SHA1

                      d0bee71104a22d4cdf4f837266882d05eb39479f

                      SHA256

                      a142ca4464878fca69239ec7cca427ffe73f78318164f05db924e95b222a6af1

                      SHA512

                      ac4cdbede1dabe84ffa476aa59ec38d963f2b79cfa9b85b6a3183f1eb8da0c40450e40af64852b0513a136226099b307a055975fc03a2bcd6c65b733842b478c

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7796433.exe

                      Filesize

                      235KB

                      MD5

                      6c7a3f2dc1dffff3f53db001d029d243

                      SHA1

                      20183135d71b518cff9b5df86dde7b9c27208ffd

                      SHA256

                      4fc33fffc3646395ed8a395d86a4edcc0c92d902ee63c9d736fe5838a1c3fe16

                      SHA512

                      fb28d4c3cd584761604f6d3fe4914b845090ebf523bfc1af812737f9b1b26ba525e49f3f0421ad142181f8c3d24e2eac9590259701c4cf23d1aae09074dec16b

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7796433.exe

                      Filesize

                      235KB

                      MD5

                      6c7a3f2dc1dffff3f53db001d029d243

                      SHA1

                      20183135d71b518cff9b5df86dde7b9c27208ffd

                      SHA256

                      4fc33fffc3646395ed8a395d86a4edcc0c92d902ee63c9d736fe5838a1c3fe16

                      SHA512

                      fb28d4c3cd584761604f6d3fe4914b845090ebf523bfc1af812737f9b1b26ba525e49f3f0421ad142181f8c3d24e2eac9590259701c4cf23d1aae09074dec16b

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0274911.exe

                      Filesize

                      13KB

                      MD5

                      f99716d9cc21d75bedf5faa56ebecf60

                      SHA1

                      bd65db8c35f068d27ad3d9836ca26bf23da88a03

                      SHA256

                      c0768760cbee777520dd460c8107148019bdb5c97d15075eb8539071f67d0c76

                      SHA512

                      94e45d26d8edc18ce2d231f6b5711f49fb9629676c8a5ca7ba56058bb2161986a0fe3ef65459d6bccfbc7bcb749a884fb304e316a8e01672252e477a89a9c735

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0274911.exe

                      Filesize

                      13KB

                      MD5

                      f99716d9cc21d75bedf5faa56ebecf60

                      SHA1

                      bd65db8c35f068d27ad3d9836ca26bf23da88a03

                      SHA256

                      c0768760cbee777520dd460c8107148019bdb5c97d15075eb8539071f67d0c76

                      SHA512

                      94e45d26d8edc18ce2d231f6b5711f49fb9629676c8a5ca7ba56058bb2161986a0fe3ef65459d6bccfbc7bcb749a884fb304e316a8e01672252e477a89a9c735

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9968398.exe

                      Filesize

                      230KB

                      MD5

                      5eb7c1af927c791a38e30aebf280c2ba

                      SHA1

                      d3a06fc12d2c2967d59f869595a8a67d77ebc015

                      SHA256

                      144a35fa39f55dfcab2a4fcc0b68d699cdb3ce3ca759f0921161bde63e7cbe10

                      SHA512

                      e84981c02fcbec9f06ec492f3232b138df5584e51d7687f0b4d06328fd07ef948101d57e7bb20c25b389d68608178a095bdc1f9f3eb7b2e019afe42ddd23651b

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9968398.exe

                      Filesize

                      230KB

                      MD5

                      5eb7c1af927c791a38e30aebf280c2ba

                      SHA1

                      d3a06fc12d2c2967d59f869595a8a67d77ebc015

                      SHA256

                      144a35fa39f55dfcab2a4fcc0b68d699cdb3ce3ca759f0921161bde63e7cbe10

                      SHA512

                      e84981c02fcbec9f06ec492f3232b138df5584e51d7687f0b4d06328fd07ef948101d57e7bb20c25b389d68608178a095bdc1f9f3eb7b2e019afe42ddd23651b

                    • C:\Users\Admin\AppData\Local\Temp\_E62LIn4.O

                      Filesize

                      1.2MB

                      MD5

                      6dfa9d2297b99fd1d1785ccc47b9e0b3

                      SHA1

                      14159b943859a32c8016ecdc616ce935eee769e3

                      SHA256

                      6d84e4731457eaee5ce3dcb01014583fe6052dc86c9734a27e931c33f7372a33

                      SHA512

                      bae246147fe58b00e101c7e9d5d322687b0467cf5a4644fe8ffd28306c312c2fe87963b70189b4bb9f4f98a765335c37b7665a6e1199993659155bcd222f9ccc

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      dc587d08b8ca3cd62e5dc057d41a966b

                      SHA1

                      0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                      SHA256

                      7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                      SHA512

                      7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      dc587d08b8ca3cd62e5dc057d41a966b

                      SHA1

                      0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                      SHA256

                      7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                      SHA512

                      7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                      Filesize

                      272B

                      MD5

                      d867eabb1be5b45bc77bb06814e23640

                      SHA1

                      3139a51ce7e8462c31070363b9532c13cc52c82d

                      SHA256

                      38c69e3f9f3927f8178d55cde9774a2b170c057b349b73932b87b76499d03349

                      SHA512

                      afc40d5fa7bcd41b8445f597990d150d57e3621ddef9400af742471aa0d14c2e66cfecc34482dadbaeb6f20912fda8ab786e584bf7fd1ad5fa23d3b95425fd59

                    • \Users\Admin\AppData\Local\Temp\_E62Lin4.O

                      Filesize

                      1.2MB

                      MD5

                      6dfa9d2297b99fd1d1785ccc47b9e0b3

                      SHA1

                      14159b943859a32c8016ecdc616ce935eee769e3

                      SHA256

                      6d84e4731457eaee5ce3dcb01014583fe6052dc86c9734a27e931c33f7372a33

                      SHA512

                      bae246147fe58b00e101c7e9d5d322687b0467cf5a4644fe8ffd28306c312c2fe87963b70189b4bb9f4f98a765335c37b7665a6e1199993659155bcd222f9ccc

                    • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      dc587d08b8ca3cd62e5dc057d41a966b

                      SHA1

                      0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                      SHA256

                      7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                      SHA512

                      7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

                    • memory/2080-155-0x0000000000400000-0x0000000000409000-memory.dmp

                      Filesize

                      36KB

                    • memory/2080-157-0x0000000000400000-0x0000000000409000-memory.dmp

                      Filesize

                      36KB

                    • memory/2100-169-0x000000000AE90000-0x000000000AECE000-memory.dmp

                      Filesize

                      248KB

                    • memory/2100-164-0x0000000072040000-0x000000007272E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/2100-170-0x000000000B010000-0x000000000B05B000-memory.dmp

                      Filesize

                      300KB

                    • memory/2100-171-0x0000000072040000-0x000000007272E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/2100-168-0x000000000AE30000-0x000000000AE42000-memory.dmp

                      Filesize

                      72KB

                    • memory/2100-167-0x000000000AF00000-0x000000000B00A000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/2100-166-0x000000000B380000-0x000000000B986000-memory.dmp

                      Filesize

                      6.0MB

                    • memory/2100-165-0x0000000001940000-0x0000000001946000-memory.dmp

                      Filesize

                      24KB

                    • memory/2100-163-0x0000000000FB0000-0x0000000000FE0000-memory.dmp

                      Filesize

                      192KB

                    • memory/3240-156-0x0000000000CA0000-0x0000000000CB6000-memory.dmp

                      Filesize

                      88KB

                    • memory/4628-141-0x00007FF9CF340000-0x00007FF9CFD2C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/4628-138-0x00000000003A0000-0x00000000003AA000-memory.dmp

                      Filesize

                      40KB

                    • memory/4628-139-0x00007FF9CF340000-0x00007FF9CFD2C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/5096-204-0x0000000000F50000-0x0000000000F56000-memory.dmp

                      Filesize

                      24KB

                    • memory/5096-205-0x0000000000400000-0x000000000053C000-memory.dmp

                      Filesize

                      1.2MB

                    • memory/5096-207-0x0000000005050000-0x000000000514F000-memory.dmp

                      Filesize

                      1020KB

                    • memory/5096-208-0x0000000005150000-0x0000000005236000-memory.dmp

                      Filesize

                      920KB

                    • memory/5096-209-0x0000000005150000-0x0000000005236000-memory.dmp

                      Filesize

                      920KB

                    • memory/5096-211-0x0000000005150000-0x0000000005236000-memory.dmp

                      Filesize

                      920KB

                    • memory/5096-212-0x0000000005150000-0x0000000005236000-memory.dmp

                      Filesize

                      920KB