Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24/07/2023, 10:28

General

  • Target

    73947b6bd759aa3e24faea844850c4390e9da1d2e1bbba442ed08b2b0cafb61d.exe

  • Size

    515KB

  • MD5

    8722f47f642cd61aaae838743ee6c479

  • SHA1

    2d96888cd6107fda04b784c40def80029d8bec9b

  • SHA256

    73947b6bd759aa3e24faea844850c4390e9da1d2e1bbba442ed08b2b0cafb61d

  • SHA512

    9f6e21ad6957f530f57115a58d5cbcb52b18e86fef7a2b7d65e20cbb803b0629e6675b55cc8e81237e78eca06a004a108a996ebeda355f6277f2c2a2fe5b2f35

  • SSDEEP

    12288:wMrFy90bUTNcIK7l71Qfa+Tq5soH8a9BePr8YTcBQHmlh:ly4U+Ig3QmNFBIXT4

Malware Config

Extracted

Family

amadey

Version

3.85

C2

77.91.68.3/home/love/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

news

C2

77.91.68.68:19071

Attributes
  • auth_value

    99ba2ffe8d72ebe9fdc7e758c94db148

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 2 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73947b6bd759aa3e24faea844850c4390e9da1d2e1bbba442ed08b2b0cafb61d.exe
    "C:\Users\Admin\AppData\Local\Temp\73947b6bd759aa3e24faea844850c4390e9da1d2e1bbba442ed08b2b0cafb61d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8187360.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8187360.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4732
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2574621.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2574621.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4976
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1190345.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1190345.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3768
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3511088.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3511088.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3288
          • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
            "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2568
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:4000
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4384
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:3808
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "danke.exe" /P "Admin:N"
                  7⤵
                    PID:4516
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "danke.exe" /P "Admin:R" /E
                    7⤵
                      PID:4388
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:2140
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\3ec1f323b5" /P "Admin:N"
                        7⤵
                          PID:3004
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\3ec1f323b5" /P "Admin:R" /E
                          7⤵
                            PID:2148
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                          6⤵
                          • Loads dropped DLL
                          PID:3752
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0404293.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0404293.exe
                    3⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    PID:2340
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8956495.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8956495.exe
                  2⤵
                  • Executes dropped EXE
                  PID:4488
              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                1⤵
                • Executes dropped EXE
                PID:404
              • C:\Users\Admin\AppData\Local\Temp\1C39.exe
                C:\Users\Admin\AppData\Local\Temp\1C39.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:1268
                • C:\Windows\SysWOW64\regsvr32.exe
                  "C:\Windows\System32\regsvr32.exe" -s .\LRfi8YXb.C5
                  2⤵
                  • Loads dropped DLL
                  PID:916

              Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\1C39.exe

                      Filesize

                      1.7MB

                      MD5

                      f952f27abe238f17db7adf6c4b2d92f9

                      SHA1

                      3df41f097a385052aed4af2385b4a7007baa05a8

                      SHA256

                      558148f295c2f1c7e925bbeb65dacab01d9dbf8a5ecfeaf82f0d8e7cf322b79f

                      SHA512

                      ac8758de38e3ec08d974d1a9fa1a6a318e4456ad118a33d13a23a58818c956d5e75e4392d02075bdd137ab44328d2a493446903ec5e4ea90f6190260bb32fedd

                    • C:\Users\Admin\AppData\Local\Temp\1C39.exe

                      Filesize

                      1.7MB

                      MD5

                      f952f27abe238f17db7adf6c4b2d92f9

                      SHA1

                      3df41f097a385052aed4af2385b4a7007baa05a8

                      SHA256

                      558148f295c2f1c7e925bbeb65dacab01d9dbf8a5ecfeaf82f0d8e7cf322b79f

                      SHA512

                      ac8758de38e3ec08d974d1a9fa1a6a318e4456ad118a33d13a23a58818c956d5e75e4392d02075bdd137ab44328d2a493446903ec5e4ea90f6190260bb32fedd

                    • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                      Filesize

                      230KB

                      MD5

                      f4467e9fb1d2e63ad7c5b03132b42809

                      SHA1

                      919c4dbebd5e6fb38f961cd010d5e0a02e75e05a

                      SHA256

                      71008e6b396dcb6e9eeba55a9241cfec9830c6b698c8e87ef997fe17f739add9

                      SHA512

                      02a06106865f890a24b669b63d62eb972a97a9a9faad8d331fbcec5ef0484cbad1823907c54d48fe8f78da1a7dbfc33609714f85d1e14f40e05b808e44bfc05c

                    • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                      Filesize

                      230KB

                      MD5

                      f4467e9fb1d2e63ad7c5b03132b42809

                      SHA1

                      919c4dbebd5e6fb38f961cd010d5e0a02e75e05a

                      SHA256

                      71008e6b396dcb6e9eeba55a9241cfec9830c6b698c8e87ef997fe17f739add9

                      SHA512

                      02a06106865f890a24b669b63d62eb972a97a9a9faad8d331fbcec5ef0484cbad1823907c54d48fe8f78da1a7dbfc33609714f85d1e14f40e05b808e44bfc05c

                    • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                      Filesize

                      230KB

                      MD5

                      f4467e9fb1d2e63ad7c5b03132b42809

                      SHA1

                      919c4dbebd5e6fb38f961cd010d5e0a02e75e05a

                      SHA256

                      71008e6b396dcb6e9eeba55a9241cfec9830c6b698c8e87ef997fe17f739add9

                      SHA512

                      02a06106865f890a24b669b63d62eb972a97a9a9faad8d331fbcec5ef0484cbad1823907c54d48fe8f78da1a7dbfc33609714f85d1e14f40e05b808e44bfc05c

                    • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                      Filesize

                      230KB

                      MD5

                      f4467e9fb1d2e63ad7c5b03132b42809

                      SHA1

                      919c4dbebd5e6fb38f961cd010d5e0a02e75e05a

                      SHA256

                      71008e6b396dcb6e9eeba55a9241cfec9830c6b698c8e87ef997fe17f739add9

                      SHA512

                      02a06106865f890a24b669b63d62eb972a97a9a9faad8d331fbcec5ef0484cbad1823907c54d48fe8f78da1a7dbfc33609714f85d1e14f40e05b808e44bfc05c

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8956495.exe

                      Filesize

                      175KB

                      MD5

                      52e38eb8f98a4c1cfb6a78cb026bbfdb

                      SHA1

                      3c7286692ed1e4dad8b1bc6901d7de3cce89d6ff

                      SHA256

                      7f47169612f6f5d6731c83b77bcbd94fff0b8ca1ac88c1f28cbdf7576f66092e

                      SHA512

                      8c1f45a21ad38034acc9a6ea7842008f07cfce17abc542931071c63c03ff5bb152ed774e141c226d5d589149832ce020d23d2efc723a3e8b3d6b8cb4da1c93bb

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8956495.exe

                      Filesize

                      175KB

                      MD5

                      52e38eb8f98a4c1cfb6a78cb026bbfdb

                      SHA1

                      3c7286692ed1e4dad8b1bc6901d7de3cce89d6ff

                      SHA256

                      7f47169612f6f5d6731c83b77bcbd94fff0b8ca1ac88c1f28cbdf7576f66092e

                      SHA512

                      8c1f45a21ad38034acc9a6ea7842008f07cfce17abc542931071c63c03ff5bb152ed774e141c226d5d589149832ce020d23d2efc723a3e8b3d6b8cb4da1c93bb

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8187360.exe

                      Filesize

                      359KB

                      MD5

                      f24d4af80cbcefc4c4e39d97356f409f

                      SHA1

                      b6b0ee7e113b2c1d4dcf6ed37f023666624b983c

                      SHA256

                      19babfc7cba5ecd320c3d446b4e41c38eda8dbae52c7a687907dac43aec04243

                      SHA512

                      2f95f2f25375459a12afc3e1c5580d3c3ec59df2aa8cff4594f5c77012664db5fc6bb3c246e96ce7214a453fe30086d7834d00627a135f84292bb8e7e65769f4

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8187360.exe

                      Filesize

                      359KB

                      MD5

                      f24d4af80cbcefc4c4e39d97356f409f

                      SHA1

                      b6b0ee7e113b2c1d4dcf6ed37f023666624b983c

                      SHA256

                      19babfc7cba5ecd320c3d446b4e41c38eda8dbae52c7a687907dac43aec04243

                      SHA512

                      2f95f2f25375459a12afc3e1c5580d3c3ec59df2aa8cff4594f5c77012664db5fc6bb3c246e96ce7214a453fe30086d7834d00627a135f84292bb8e7e65769f4

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0404293.exe

                      Filesize

                      34KB

                      MD5

                      e086b6eb9234aec9bc2d80a6a6f82d86

                      SHA1

                      98249bec3b35a74d374c70dc370cbf3cc4b15a4e

                      SHA256

                      5e70293c162aae4aaf99cc62d97051641aaf17279cacaf04bad2838db5698804

                      SHA512

                      519f2bbc259e3e900b9211067fba887fedde95723a7197686cf3e5f90f30635efa53bd813af72597cc54adaab6046d266fe8d0692e3a14a90f51e5f71be3b612

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0404293.exe

                      Filesize

                      34KB

                      MD5

                      e086b6eb9234aec9bc2d80a6a6f82d86

                      SHA1

                      98249bec3b35a74d374c70dc370cbf3cc4b15a4e

                      SHA256

                      5e70293c162aae4aaf99cc62d97051641aaf17279cacaf04bad2838db5698804

                      SHA512

                      519f2bbc259e3e900b9211067fba887fedde95723a7197686cf3e5f90f30635efa53bd813af72597cc54adaab6046d266fe8d0692e3a14a90f51e5f71be3b612

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2574621.exe

                      Filesize

                      235KB

                      MD5

                      9fd020a9f27f4457f47280b199f75115

                      SHA1

                      acb76944b1a9f10ce449b2152abe4ca2937b50ab

                      SHA256

                      bdee486910c40e07e9be2c39befba49d6a44d9661c6c89ff070748dd463a538d

                      SHA512

                      a6f06ccd1d088afd7f686ead90b5a10cd451d5dba5f9133616d7c0961264c8ee6833ec17a91acb0d1a670b141e38f974a461236a9487c5a8dc8117242e07dd12

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2574621.exe

                      Filesize

                      235KB

                      MD5

                      9fd020a9f27f4457f47280b199f75115

                      SHA1

                      acb76944b1a9f10ce449b2152abe4ca2937b50ab

                      SHA256

                      bdee486910c40e07e9be2c39befba49d6a44d9661c6c89ff070748dd463a538d

                      SHA512

                      a6f06ccd1d088afd7f686ead90b5a10cd451d5dba5f9133616d7c0961264c8ee6833ec17a91acb0d1a670b141e38f974a461236a9487c5a8dc8117242e07dd12

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1190345.exe

                      Filesize

                      13KB

                      MD5

                      f26954984054e1426209e56c1e6b7b8e

                      SHA1

                      d5b808a77c1ddbf32430999150ef6e9428222d45

                      SHA256

                      e76a28de31414d72b2e1afecf473ddb2c4ba1ea84a532bb60b5e9535285d8db1

                      SHA512

                      49d7459415b6c0166c7e09dd3b29adf99713b7f094f95963f86680c6f02597bfa3678cfb43a22762dcbcfd55872d59f8d161697bc76fdb63843da11df2ab7bc1

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1190345.exe

                      Filesize

                      13KB

                      MD5

                      f26954984054e1426209e56c1e6b7b8e

                      SHA1

                      d5b808a77c1ddbf32430999150ef6e9428222d45

                      SHA256

                      e76a28de31414d72b2e1afecf473ddb2c4ba1ea84a532bb60b5e9535285d8db1

                      SHA512

                      49d7459415b6c0166c7e09dd3b29adf99713b7f094f95963f86680c6f02597bfa3678cfb43a22762dcbcfd55872d59f8d161697bc76fdb63843da11df2ab7bc1

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3511088.exe

                      Filesize

                      230KB

                      MD5

                      f4467e9fb1d2e63ad7c5b03132b42809

                      SHA1

                      919c4dbebd5e6fb38f961cd010d5e0a02e75e05a

                      SHA256

                      71008e6b396dcb6e9eeba55a9241cfec9830c6b698c8e87ef997fe17f739add9

                      SHA512

                      02a06106865f890a24b669b63d62eb972a97a9a9faad8d331fbcec5ef0484cbad1823907c54d48fe8f78da1a7dbfc33609714f85d1e14f40e05b808e44bfc05c

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3511088.exe

                      Filesize

                      230KB

                      MD5

                      f4467e9fb1d2e63ad7c5b03132b42809

                      SHA1

                      919c4dbebd5e6fb38f961cd010d5e0a02e75e05a

                      SHA256

                      71008e6b396dcb6e9eeba55a9241cfec9830c6b698c8e87ef997fe17f739add9

                      SHA512

                      02a06106865f890a24b669b63d62eb972a97a9a9faad8d331fbcec5ef0484cbad1823907c54d48fe8f78da1a7dbfc33609714f85d1e14f40e05b808e44bfc05c

                    • C:\Users\Admin\AppData\Local\Temp\LRfi8YXb.C5

                      Filesize

                      1.2MB

                      MD5

                      d4bd1c31043e052baf2bbbaf780c9428

                      SHA1

                      3e26674840a181bf387b185221291c7843cd4162

                      SHA256

                      295ea37c6da2b4a2fe46e00b81f058a663d86161cefa6c0cbdea7a218033e194

                      SHA512

                      89e3f3951b186555922b094e4175166075777223a45db01eef98625ef4ff87006f472eacf3b9134ffe637627b815d453e6462bf27f1e6fb8134bd25d745a2e78

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      dc587d08b8ca3cd62e5dc057d41a966b

                      SHA1

                      0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                      SHA256

                      7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                      SHA512

                      7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      dc587d08b8ca3cd62e5dc057d41a966b

                      SHA1

                      0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                      SHA256

                      7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                      SHA512

                      7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                      Filesize

                      272B

                      MD5

                      d867eabb1be5b45bc77bb06814e23640

                      SHA1

                      3139a51ce7e8462c31070363b9532c13cc52c82d

                      SHA256

                      38c69e3f9f3927f8178d55cde9774a2b170c057b349b73932b87b76499d03349

                      SHA512

                      afc40d5fa7bcd41b8445f597990d150d57e3621ddef9400af742471aa0d14c2e66cfecc34482dadbaeb6f20912fda8ab786e584bf7fd1ad5fa23d3b95425fd59

                    • \Users\Admin\AppData\Local\Temp\Lrfi8YXb.C5

                      Filesize

                      1.2MB

                      MD5

                      d4bd1c31043e052baf2bbbaf780c9428

                      SHA1

                      3e26674840a181bf387b185221291c7843cd4162

                      SHA256

                      295ea37c6da2b4a2fe46e00b81f058a663d86161cefa6c0cbdea7a218033e194

                      SHA512

                      89e3f3951b186555922b094e4175166075777223a45db01eef98625ef4ff87006f472eacf3b9134ffe637627b815d453e6462bf27f1e6fb8134bd25d745a2e78

                    • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      dc587d08b8ca3cd62e5dc057d41a966b

                      SHA1

                      0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                      SHA256

                      7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                      SHA512

                      7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

                    • memory/916-214-0x00000000051A0000-0x0000000005286000-memory.dmp

                      Filesize

                      920KB

                    • memory/916-213-0x00000000051A0000-0x0000000005286000-memory.dmp

                      Filesize

                      920KB

                    • memory/916-211-0x00000000051A0000-0x0000000005286000-memory.dmp

                      Filesize

                      920KB

                    • memory/916-210-0x00000000051A0000-0x0000000005286000-memory.dmp

                      Filesize

                      920KB

                    • memory/916-209-0x00000000050A0000-0x000000000519F000-memory.dmp

                      Filesize

                      1020KB

                    • memory/916-207-0x00000000011D0000-0x00000000011D6000-memory.dmp

                      Filesize

                      24KB

                    • memory/916-206-0x0000000000400000-0x000000000053C000-memory.dmp

                      Filesize

                      1.2MB

                    • memory/2340-159-0x0000000000400000-0x0000000000409000-memory.dmp

                      Filesize

                      36KB

                    • memory/2340-161-0x0000000000400000-0x0000000000409000-memory.dmp

                      Filesize

                      36KB

                    • memory/3256-160-0x0000000001330000-0x0000000001346000-memory.dmp

                      Filesize

                      88KB

                    • memory/3768-142-0x0000000000C80000-0x0000000000C8A000-memory.dmp

                      Filesize

                      40KB

                    • memory/3768-145-0x00007FF940F70000-0x00007FF94195C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/3768-143-0x00007FF940F70000-0x00007FF94195C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/4488-175-0x00000000727B0000-0x0000000072E9E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/4488-167-0x0000000000FF0000-0x0000000001020000-memory.dmp

                      Filesize

                      192KB

                    • memory/4488-174-0x00000000059B0000-0x00000000059FB000-memory.dmp

                      Filesize

                      300KB

                    • memory/4488-173-0x0000000005970000-0x00000000059AE000-memory.dmp

                      Filesize

                      248KB

                    • memory/4488-172-0x0000000005910000-0x0000000005922000-memory.dmp

                      Filesize

                      72KB

                    • memory/4488-171-0x0000000005A00000-0x0000000005B0A000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/4488-170-0x0000000005F00000-0x0000000006506000-memory.dmp

                      Filesize

                      6.0MB

                    • memory/4488-169-0x0000000003280000-0x0000000003286000-memory.dmp

                      Filesize

                      24KB

                    • memory/4488-168-0x00000000727B0000-0x0000000072E9E000-memory.dmp

                      Filesize

                      6.9MB