Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    158s
  • platform
    windows10-1703_x64
  • resource
    win10-20230831-en
  • resource tags

    arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/09/2023, 06:37

General

  • Target

    1a490f37dcb88a56f9dc6dea843d29e52310eddc1a0d47524e3ad29a04963e14.exe

  • Size

    936KB

  • MD5

    4631d54d8bdbbd10d62319e92c0a8846

  • SHA1

    9e5292273e490cef4e1328092a502937293b4db0

  • SHA256

    1a490f37dcb88a56f9dc6dea843d29e52310eddc1a0d47524e3ad29a04963e14

  • SHA512

    e64851e3af0c8944d6015227a310d3564e5420bc1845b988ee963084c12f46ba1f489d9443c47fcf2c2aa7b34b6d68ecee200a09dadfa9cc05a14eb3efedc58d

  • SSDEEP

    24576:eywnIdwT8Ket56F+v/rLiTmSot65Mq6iE3a9s:tVdwT8KeK+XrLiKSoA5N6p30

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Attributes
  • install_dir

    b40d11255d

  • install_file

    saves.exe

  • strings_key

    fa622dfc42544927a6471829ee1fa9fe

rc4.plain

Extracted

Family

redline

Botnet

narik

C2

77.91.124.82:19071

Attributes
  • auth_value

    07924f5ef90576eb64faea857b8ba3e5

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a490f37dcb88a56f9dc6dea843d29e52310eddc1a0d47524e3ad29a04963e14.exe
    "C:\Users\Admin\AppData\Local\Temp\1a490f37dcb88a56f9dc6dea843d29e52310eddc1a0d47524e3ad29a04963e14.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5108
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5193587.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5193587.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1780
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8533510.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8533510.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4928
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3954079.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3954079.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3060
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8083986.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8083986.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:3056
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a0608024.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a0608024.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2392
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0108389.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0108389.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1912
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:3592
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                  8⤵
                  • Creates scheduled task(s)
                  PID:1644
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:668
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    9⤵
                      PID:3516
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:N"
                      9⤵
                        PID:4524
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "saves.exe" /P "Admin:R" /E
                        9⤵
                          PID:3344
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:N"
                          9⤵
                            PID:3684
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                            9⤵
                              PID:1564
                            • C:\Windows\SysWOW64\cacls.exe
                              CACLS "..\b40d11255d" /P "Admin:R" /E
                              9⤵
                                PID:3504
                            • C:\Windows\SysWOW64\rundll32.exe
                              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                              8⤵
                              • Loads dropped DLL
                              PID:1492
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7997468.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7997468.exe
                        5⤵
                        • Executes dropped EXE
                        PID:212
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d1854762.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d1854762.exe
                      4⤵
                      • Executes dropped EXE
                      PID:4804
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4720
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4316

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5193587.exe

                Filesize

                831KB

                MD5

                69bc59579e58adca7119a98dfbb01dc5

                SHA1

                d815cbb59c6c1d2100e61224760d295f435f46bd

                SHA256

                7ea44be0d6eda6b5bcb271376ba9d6c7226866a74725d29730ffc077de3628ed

                SHA512

                dce5a31824eae9647795ae027b7132c4ac2943e5796afd6edff47f50328116b555a81a10dd9f77a0e52fc9a66c47faceabf34e721898626df705fa1dabe848a1

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5193587.exe

                Filesize

                831KB

                MD5

                69bc59579e58adca7119a98dfbb01dc5

                SHA1

                d815cbb59c6c1d2100e61224760d295f435f46bd

                SHA256

                7ea44be0d6eda6b5bcb271376ba9d6c7226866a74725d29730ffc077de3628ed

                SHA512

                dce5a31824eae9647795ae027b7132c4ac2943e5796afd6edff47f50328116b555a81a10dd9f77a0e52fc9a66c47faceabf34e721898626df705fa1dabe848a1

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8533510.exe

                Filesize

                706KB

                MD5

                09364895faae9b746abc1be57f65a0a1

                SHA1

                35aae603c1c1e9e0fa978717fbe80b8c71bc19a7

                SHA256

                a0f3a189350747982ef0e81c5e48c1cf99162558e4d409f4e2de8e2e0e8fb8c0

                SHA512

                474e496ddf5311417be14a3efecbe8ae3adb4ac6ef23eab327c54c6c12fc14e73cb21a1ebfad2f06e4b031853c65724259b3a55010a2324288ba04cba991c01c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8533510.exe

                Filesize

                706KB

                MD5

                09364895faae9b746abc1be57f65a0a1

                SHA1

                35aae603c1c1e9e0fa978717fbe80b8c71bc19a7

                SHA256

                a0f3a189350747982ef0e81c5e48c1cf99162558e4d409f4e2de8e2e0e8fb8c0

                SHA512

                474e496ddf5311417be14a3efecbe8ae3adb4ac6ef23eab327c54c6c12fc14e73cb21a1ebfad2f06e4b031853c65724259b3a55010a2324288ba04cba991c01c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d1854762.exe

                Filesize

                174KB

                MD5

                9ad4c37bc7637acd56f1f11107d0a3a2

                SHA1

                b5e29307f150aefeb3c99ccebbe0f736853d1c27

                SHA256

                e9e8791b06789c73d4a9c74b56747e1d055037ea4b7c298b488329363e2ae8fa

                SHA512

                e819d977293e22b150d1222bf3509365c3821d3cb2eea9e54445a1c4359d1fea8e8f9bc0334fef309935f655e139f51c9afec705281bf97657c48d8097b943ae

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d1854762.exe

                Filesize

                174KB

                MD5

                9ad4c37bc7637acd56f1f11107d0a3a2

                SHA1

                b5e29307f150aefeb3c99ccebbe0f736853d1c27

                SHA256

                e9e8791b06789c73d4a9c74b56747e1d055037ea4b7c298b488329363e2ae8fa

                SHA512

                e819d977293e22b150d1222bf3509365c3821d3cb2eea9e54445a1c4359d1fea8e8f9bc0334fef309935f655e139f51c9afec705281bf97657c48d8097b943ae

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3954079.exe

                Filesize

                550KB

                MD5

                7db9fe45435523f108b048743e0f84a8

                SHA1

                804e4397897f0b4047540cf7d372aa1ee7e8b4a9

                SHA256

                f244129ea3cc0da98ec7280b5fc297d0de05396bed5a0eaa89b8320ee79e1741

                SHA512

                07d15a9107186e45360d4fb29def6c7ddb72a31d171901f617ad2254c69ac6ef1af7407ed9b2e35f67165b6711af9ebd0861f784c0ecad6b3a8d9cba2dfa933a

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3954079.exe

                Filesize

                550KB

                MD5

                7db9fe45435523f108b048743e0f84a8

                SHA1

                804e4397897f0b4047540cf7d372aa1ee7e8b4a9

                SHA256

                f244129ea3cc0da98ec7280b5fc297d0de05396bed5a0eaa89b8320ee79e1741

                SHA512

                07d15a9107186e45360d4fb29def6c7ddb72a31d171901f617ad2254c69ac6ef1af7407ed9b2e35f67165b6711af9ebd0861f784c0ecad6b3a8d9cba2dfa933a

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7997468.exe

                Filesize

                140KB

                MD5

                90daef7f4b67d3d023a7a9910136ffb6

                SHA1

                f10820127bc91ec66f70ef76c0bafe318fb59c9b

                SHA256

                d49e61d74d939b0d760e885f7dd2a3902e2ab4ba1182c0bb32538a7170df31f3

                SHA512

                8d91de1ff6f908256b4ede8a784e24027593083f17e1d88e987e6ebcc2d69acf9a00e82d73fe2c4b243907d5bc4b141d1dd0fa02c20df893a100d93bf9332512

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7997468.exe

                Filesize

                140KB

                MD5

                90daef7f4b67d3d023a7a9910136ffb6

                SHA1

                f10820127bc91ec66f70ef76c0bafe318fb59c9b

                SHA256

                d49e61d74d939b0d760e885f7dd2a3902e2ab4ba1182c0bb32538a7170df31f3

                SHA512

                8d91de1ff6f908256b4ede8a784e24027593083f17e1d88e987e6ebcc2d69acf9a00e82d73fe2c4b243907d5bc4b141d1dd0fa02c20df893a100d93bf9332512

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8083986.exe

                Filesize

                384KB

                MD5

                faf3e8b804c9882c7f8007a0245f2992

                SHA1

                0334c171b5409b49bb99e59dfdae864b83e39ad4

                SHA256

                709dfab6143071f1eacb697986797157a508b003dc9bca8bde89b01856943727

                SHA512

                9b2e379f4545bd13ff42bf84505cfea5329f92ff16eab9bd19b4948128e3239f654485a51554fa13b0b5c4574408e69ec6dfe01aea0903b483cfecf6b020e67d

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8083986.exe

                Filesize

                384KB

                MD5

                faf3e8b804c9882c7f8007a0245f2992

                SHA1

                0334c171b5409b49bb99e59dfdae864b83e39ad4

                SHA256

                709dfab6143071f1eacb697986797157a508b003dc9bca8bde89b01856943727

                SHA512

                9b2e379f4545bd13ff42bf84505cfea5329f92ff16eab9bd19b4948128e3239f654485a51554fa13b0b5c4574408e69ec6dfe01aea0903b483cfecf6b020e67d

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a0608024.exe

                Filesize

                184KB

                MD5

                7f247c400594724af9800883392ff751

                SHA1

                f65eedf138d67fe0c67be5eccff362b5f624a152

                SHA256

                bf97e5a4b376790b77e64ae4337c268de812b4d4cb1897bcd0fec11ac21266b6

                SHA512

                51be7bce248d0f6709e8b6c4683bbd1caa5e9b5257df609a53c23a51e23c8c6403b74b4526b62826edbd13610a7deec9d054981b841557462c51c01e838e36c4

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a0608024.exe

                Filesize

                184KB

                MD5

                7f247c400594724af9800883392ff751

                SHA1

                f65eedf138d67fe0c67be5eccff362b5f624a152

                SHA256

                bf97e5a4b376790b77e64ae4337c268de812b4d4cb1897bcd0fec11ac21266b6

                SHA512

                51be7bce248d0f6709e8b6c4683bbd1caa5e9b5257df609a53c23a51e23c8c6403b74b4526b62826edbd13610a7deec9d054981b841557462c51c01e838e36c4

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0108389.exe

                Filesize

                333KB

                MD5

                f43f9985253675b3dec349e14450f025

                SHA1

                403e6f1e7077ad6710aff6595fe925414e2ecdc0

                SHA256

                0dc852ba376de1095a110d55fa6a15361b3e3dd2ef4085afc1d46706f0c3cf4a

                SHA512

                8199c93ccd48ac95b94ef012f1d01c1a58fe4d9159aa2f571ef5c1368736171b77bab4d5bf46239957ba8a0f1d1600f2c6b608097791e61d3f640a839687ee6a

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0108389.exe

                Filesize

                333KB

                MD5

                f43f9985253675b3dec349e14450f025

                SHA1

                403e6f1e7077ad6710aff6595fe925414e2ecdc0

                SHA256

                0dc852ba376de1095a110d55fa6a15361b3e3dd2ef4085afc1d46706f0c3cf4a

                SHA512

                8199c93ccd48ac95b94ef012f1d01c1a58fe4d9159aa2f571ef5c1368736171b77bab4d5bf46239957ba8a0f1d1600f2c6b608097791e61d3f640a839687ee6a

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                333KB

                MD5

                f43f9985253675b3dec349e14450f025

                SHA1

                403e6f1e7077ad6710aff6595fe925414e2ecdc0

                SHA256

                0dc852ba376de1095a110d55fa6a15361b3e3dd2ef4085afc1d46706f0c3cf4a

                SHA512

                8199c93ccd48ac95b94ef012f1d01c1a58fe4d9159aa2f571ef5c1368736171b77bab4d5bf46239957ba8a0f1d1600f2c6b608097791e61d3f640a839687ee6a

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                333KB

                MD5

                f43f9985253675b3dec349e14450f025

                SHA1

                403e6f1e7077ad6710aff6595fe925414e2ecdc0

                SHA256

                0dc852ba376de1095a110d55fa6a15361b3e3dd2ef4085afc1d46706f0c3cf4a

                SHA512

                8199c93ccd48ac95b94ef012f1d01c1a58fe4d9159aa2f571ef5c1368736171b77bab4d5bf46239957ba8a0f1d1600f2c6b608097791e61d3f640a839687ee6a

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                333KB

                MD5

                f43f9985253675b3dec349e14450f025

                SHA1

                403e6f1e7077ad6710aff6595fe925414e2ecdc0

                SHA256

                0dc852ba376de1095a110d55fa6a15361b3e3dd2ef4085afc1d46706f0c3cf4a

                SHA512

                8199c93ccd48ac95b94ef012f1d01c1a58fe4d9159aa2f571ef5c1368736171b77bab4d5bf46239957ba8a0f1d1600f2c6b608097791e61d3f640a839687ee6a

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                333KB

                MD5

                f43f9985253675b3dec349e14450f025

                SHA1

                403e6f1e7077ad6710aff6595fe925414e2ecdc0

                SHA256

                0dc852ba376de1095a110d55fa6a15361b3e3dd2ef4085afc1d46706f0c3cf4a

                SHA512

                8199c93ccd48ac95b94ef012f1d01c1a58fe4d9159aa2f571ef5c1368736171b77bab4d5bf46239957ba8a0f1d1600f2c6b608097791e61d3f640a839687ee6a

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                333KB

                MD5

                f43f9985253675b3dec349e14450f025

                SHA1

                403e6f1e7077ad6710aff6595fe925414e2ecdc0

                SHA256

                0dc852ba376de1095a110d55fa6a15361b3e3dd2ef4085afc1d46706f0c3cf4a

                SHA512

                8199c93ccd48ac95b94ef012f1d01c1a58fe4d9159aa2f571ef5c1368736171b77bab4d5bf46239957ba8a0f1d1600f2c6b608097791e61d3f640a839687ee6a

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                374bfdcfcf19f4edfe949022092848d2

                SHA1

                df5ee40497e98efcfba30012452d433373d287d4

                SHA256

                224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                SHA512

                bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • memory/2392-38-0x0000000004A70000-0x0000000004A8C000-memory.dmp

                Filesize

                112KB

              • memory/2392-50-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/2392-64-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/2392-66-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/2392-67-0x0000000073890000-0x0000000073F7E000-memory.dmp

                Filesize

                6.9MB

              • memory/2392-69-0x0000000073890000-0x0000000073F7E000-memory.dmp

                Filesize

                6.9MB

              • memory/2392-60-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/2392-58-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/2392-56-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/2392-54-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/2392-52-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/2392-42-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/2392-48-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/2392-46-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/2392-44-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/2392-62-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/2392-36-0x0000000073890000-0x0000000073F7E000-memory.dmp

                Filesize

                6.9MB

              • memory/2392-35-0x0000000000890000-0x00000000008AE000-memory.dmp

                Filesize

                120KB

              • memory/2392-37-0x0000000004AF0000-0x0000000004FEE000-memory.dmp

                Filesize

                5.0MB

              • memory/2392-39-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/2392-40-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/4804-85-0x0000000000700000-0x0000000000730000-memory.dmp

                Filesize

                192KB

              • memory/4804-92-0x0000000005200000-0x000000000524B000-memory.dmp

                Filesize

                300KB

              • memory/4804-93-0x0000000072850000-0x0000000072F3E000-memory.dmp

                Filesize

                6.9MB

              • memory/4804-91-0x0000000005080000-0x00000000050BE000-memory.dmp

                Filesize

                248KB

              • memory/4804-90-0x0000000005020000-0x0000000005032000-memory.dmp

                Filesize

                72KB

              • memory/4804-89-0x00000000050F0000-0x00000000051FA000-memory.dmp

                Filesize

                1.0MB

              • memory/4804-88-0x00000000055F0000-0x0000000005BF6000-memory.dmp

                Filesize

                6.0MB

              • memory/4804-87-0x0000000004EC0000-0x0000000004EC6000-memory.dmp

                Filesize

                24KB

              • memory/4804-86-0x0000000072850000-0x0000000072F3E000-memory.dmp

                Filesize

                6.9MB