Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-1703_x64
  • resource
    win10-20230831-en
  • resource tags

    arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/09/2023, 07:51

General

  • Target

    d2967a6225bc4a93d4abba3aa8dda5662ac5e9f47fa5d30b164631f9c74d9e33.exe

  • Size

    1.0MB

  • MD5

    57febf5de4ec61fc3c6c6b8b69aea695

  • SHA1

    2604a736a6abc204a680d6dc6424dfee986faae3

  • SHA256

    d2967a6225bc4a93d4abba3aa8dda5662ac5e9f47fa5d30b164631f9c74d9e33

  • SHA512

    b465255bd562abed2d88e837f7a2f361aeae152f1b459e98bd1e2437f8f1ec556d2b7083a28d26dfe94c9e699e2370c1bc06d9d33101e24068941e66864fc9df

  • SSDEEP

    24576:ByLfeHV4qL/9JOqnoMzFTTgWOhud3n5vGAIywp:0rCV4q7yqoTC3n

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Attributes
  • install_dir

    b40d11255d

  • install_file

    saves.exe

  • strings_key

    fa622dfc42544927a6471829ee1fa9fe

rc4.plain

Extracted

Family

redline

Botnet

narik

C2

77.91.124.82:19071

Attributes
  • auth_value

    07924f5ef90576eb64faea857b8ba3e5

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2967a6225bc4a93d4abba3aa8dda5662ac5e9f47fa5d30b164631f9c74d9e33.exe
    "C:\Users\Admin\AppData\Local\Temp\d2967a6225bc4a93d4abba3aa8dda5662ac5e9f47fa5d30b164631f9c74d9e33.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3936
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9789752.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9789752.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3908
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9796011.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9796011.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1736
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0277097.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0277097.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3068
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7713143.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7713143.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4508
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4382327.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4382327.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3720
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0934220.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0934220.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4584
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:2856
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                  8⤵
                  • Creates scheduled task(s)
                  PID:4344
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3268
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    9⤵
                      PID:5112
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:N"
                      9⤵
                        PID:2036
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "saves.exe" /P "Admin:R" /E
                        9⤵
                          PID:5008
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                          9⤵
                            PID:4992
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:N"
                            9⤵
                              PID:3316
                            • C:\Windows\SysWOW64\cacls.exe
                              CACLS "..\b40d11255d" /P "Admin:R" /E
                              9⤵
                                PID:216
                            • C:\Windows\SysWOW64\rundll32.exe
                              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                              8⤵
                              • Loads dropped DLL
                              PID:4032
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s6406620.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s6406620.exe
                        5⤵
                        • Executes dropped EXE
                        PID:4964
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t7303716.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t7303716.exe
                      4⤵
                      • Executes dropped EXE
                      PID:2612
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4676

              Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9789752.exe

                      Filesize

                      932KB

                      MD5

                      b4a3e3e02900a606ee7fffe54c9e7722

                      SHA1

                      e7d70e89ded498157046488632c23476335e5480

                      SHA256

                      2ab6accca78c69ee24a5ec5a2e7c689cc09f989e7d808c4a454142f9f1d973a7

                      SHA512

                      d31919bfa152baf6beb9d95684511341a1a389b650b33f9b81c53f9e5a32724a687f17f3eae5890d11ddb2df6a870bfef3cf785772138980cf34ce9aa1baab00

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9789752.exe

                      Filesize

                      932KB

                      MD5

                      b4a3e3e02900a606ee7fffe54c9e7722

                      SHA1

                      e7d70e89ded498157046488632c23476335e5480

                      SHA256

                      2ab6accca78c69ee24a5ec5a2e7c689cc09f989e7d808c4a454142f9f1d973a7

                      SHA512

                      d31919bfa152baf6beb9d95684511341a1a389b650b33f9b81c53f9e5a32724a687f17f3eae5890d11ddb2df6a870bfef3cf785772138980cf34ce9aa1baab00

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9796011.exe

                      Filesize

                      706KB

                      MD5

                      cf9c8fa47e5c7d2bda5522b001d23d7e

                      SHA1

                      92daf211f529e936614f8dbebb9904fa5882eb17

                      SHA256

                      7cfe733b8b83809f0c9b7ce236753e0b428868e7c1a92f99734cca9ed934c0ab

                      SHA512

                      82aab2dd47415b590298b6f5186658d7692f8a5472271325dd97033c90948ef9631a5d5faa82ab8b0ee3420daf1ccb82c8b6ba61b05fbde4091490842471a4f4

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9796011.exe

                      Filesize

                      706KB

                      MD5

                      cf9c8fa47e5c7d2bda5522b001d23d7e

                      SHA1

                      92daf211f529e936614f8dbebb9904fa5882eb17

                      SHA256

                      7cfe733b8b83809f0c9b7ce236753e0b428868e7c1a92f99734cca9ed934c0ab

                      SHA512

                      82aab2dd47415b590298b6f5186658d7692f8a5472271325dd97033c90948ef9631a5d5faa82ab8b0ee3420daf1ccb82c8b6ba61b05fbde4091490842471a4f4

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t7303716.exe

                      Filesize

                      174KB

                      MD5

                      cdf6a2cff7aca2e060ad6319ab8ffc5f

                      SHA1

                      d59cb7a71f6f04dbb4bcd11aba1c3fa119d7d36d

                      SHA256

                      ae48b620b84335acd985bace57d848c5aaa328ec67df555e8b9913124a0926c7

                      SHA512

                      d2a9115fee55df4741f52eb18a8a1fada366c3fa505f9ed50d721e9d8e9bf0bb121e2db6d1b2a381e571e3d58f9a6b7e474da00a2d2fb0d1193216a35d616d09

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t7303716.exe

                      Filesize

                      174KB

                      MD5

                      cdf6a2cff7aca2e060ad6319ab8ffc5f

                      SHA1

                      d59cb7a71f6f04dbb4bcd11aba1c3fa119d7d36d

                      SHA256

                      ae48b620b84335acd985bace57d848c5aaa328ec67df555e8b9913124a0926c7

                      SHA512

                      d2a9115fee55df4741f52eb18a8a1fada366c3fa505f9ed50d721e9d8e9bf0bb121e2db6d1b2a381e571e3d58f9a6b7e474da00a2d2fb0d1193216a35d616d09

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0277097.exe

                      Filesize

                      550KB

                      MD5

                      14d1822b6caef9e2d2dfc3cd3df5f66a

                      SHA1

                      5e33d11ccbc7c6dcf0269321bbacb6c1083884a8

                      SHA256

                      ee8bc0b62a952b24ed7cb43c989505d8c304f4368dabe7bee136dd376aa26fb6

                      SHA512

                      fe618eba37437e293f115f63ef02874fbf7b338aa56794e7686468786f7eab5119b2368a1b1ee0970661efa6eb64af9f1e02cb334e89cd9bfdc8906fcba28f82

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0277097.exe

                      Filesize

                      550KB

                      MD5

                      14d1822b6caef9e2d2dfc3cd3df5f66a

                      SHA1

                      5e33d11ccbc7c6dcf0269321bbacb6c1083884a8

                      SHA256

                      ee8bc0b62a952b24ed7cb43c989505d8c304f4368dabe7bee136dd376aa26fb6

                      SHA512

                      fe618eba37437e293f115f63ef02874fbf7b338aa56794e7686468786f7eab5119b2368a1b1ee0970661efa6eb64af9f1e02cb334e89cd9bfdc8906fcba28f82

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s6406620.exe

                      Filesize

                      141KB

                      MD5

                      2972d2b8080ff75c19613df32df02781

                      SHA1

                      2c332eb4bf6b6a0ec2ccdaab6858a6b0b22e367e

                      SHA256

                      51628bd6b14b46c8979a2311b95b55405857520c5160c1e974e780c6b983bfa6

                      SHA512

                      430c101131c84aafcddf6c06480ac91fbca32bc734e5b9956afea757783166399b9badab1f87788495e774f5a7ade56847369eca63e7436626d6e72e7887c7ce

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s6406620.exe

                      Filesize

                      141KB

                      MD5

                      2972d2b8080ff75c19613df32df02781

                      SHA1

                      2c332eb4bf6b6a0ec2ccdaab6858a6b0b22e367e

                      SHA256

                      51628bd6b14b46c8979a2311b95b55405857520c5160c1e974e780c6b983bfa6

                      SHA512

                      430c101131c84aafcddf6c06480ac91fbca32bc734e5b9956afea757783166399b9badab1f87788495e774f5a7ade56847369eca63e7436626d6e72e7887c7ce

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7713143.exe

                      Filesize

                      384KB

                      MD5

                      1208e9338ed18167f2af243061d37c2f

                      SHA1

                      e4fcf14b2ae09b5a6b7cd2d1a00a397f9822685a

                      SHA256

                      11d11151598f2a121c8f351088788a2422aa8dace3255670757d7e5544a6b64a

                      SHA512

                      39370d6097e25f4e2b20070eb5c990ef3437b2144c26984eeaf73d25fbb8213b4101c967ec3080d9373466b97a788cbfa32658ee36cb4fc62c893a813ff68171

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7713143.exe

                      Filesize

                      384KB

                      MD5

                      1208e9338ed18167f2af243061d37c2f

                      SHA1

                      e4fcf14b2ae09b5a6b7cd2d1a00a397f9822685a

                      SHA256

                      11d11151598f2a121c8f351088788a2422aa8dace3255670757d7e5544a6b64a

                      SHA512

                      39370d6097e25f4e2b20070eb5c990ef3437b2144c26984eeaf73d25fbb8213b4101c967ec3080d9373466b97a788cbfa32658ee36cb4fc62c893a813ff68171

                    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4382327.exe

                      Filesize

                      184KB

                      MD5

                      2bf7187a8df7650fa71ef6642aff06e2

                      SHA1

                      59a1d7bb15d510133c8e6e2f9985df86e57815b7

                      SHA256

                      8765ea0fc95f0bfd11e5e506d9db39858bbc653fc42408e880a267efb7a243d6

                      SHA512

                      188eb8f347b8d3ee995519f2be6ea8c2ba8d113b3907dd98caf85276a678b0e8adac6e565ce7e6796c2cf4527de39b35a1fdc053a1ee4e6e209b4b828b7e599d

                    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4382327.exe

                      Filesize

                      184KB

                      MD5

                      2bf7187a8df7650fa71ef6642aff06e2

                      SHA1

                      59a1d7bb15d510133c8e6e2f9985df86e57815b7

                      SHA256

                      8765ea0fc95f0bfd11e5e506d9db39858bbc653fc42408e880a267efb7a243d6

                      SHA512

                      188eb8f347b8d3ee995519f2be6ea8c2ba8d113b3907dd98caf85276a678b0e8adac6e565ce7e6796c2cf4527de39b35a1fdc053a1ee4e6e209b4b828b7e599d

                    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0934220.exe

                      Filesize

                      333KB

                      MD5

                      29a54616304dcad590644767b64b02cf

                      SHA1

                      42498c08bed1fbc88b095c2a42ba5d9397c2a55d

                      SHA256

                      0878fb883469bd812a1ff6e7d2ca87f19e0c694ea18277547c791f5f3dc917ae

                      SHA512

                      1a04a3385d09d4efca9e2ad2e3bf84b4e517c35efc81f1048617e7b2df38e83b33ef96fde5be4c8522a08cb23f21ed37c3fa62ab0227f2d70a609b66702611d6

                    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0934220.exe

                      Filesize

                      333KB

                      MD5

                      29a54616304dcad590644767b64b02cf

                      SHA1

                      42498c08bed1fbc88b095c2a42ba5d9397c2a55d

                      SHA256

                      0878fb883469bd812a1ff6e7d2ca87f19e0c694ea18277547c791f5f3dc917ae

                      SHA512

                      1a04a3385d09d4efca9e2ad2e3bf84b4e517c35efc81f1048617e7b2df38e83b33ef96fde5be4c8522a08cb23f21ed37c3fa62ab0227f2d70a609b66702611d6

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      333KB

                      MD5

                      29a54616304dcad590644767b64b02cf

                      SHA1

                      42498c08bed1fbc88b095c2a42ba5d9397c2a55d

                      SHA256

                      0878fb883469bd812a1ff6e7d2ca87f19e0c694ea18277547c791f5f3dc917ae

                      SHA512

                      1a04a3385d09d4efca9e2ad2e3bf84b4e517c35efc81f1048617e7b2df38e83b33ef96fde5be4c8522a08cb23f21ed37c3fa62ab0227f2d70a609b66702611d6

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      333KB

                      MD5

                      29a54616304dcad590644767b64b02cf

                      SHA1

                      42498c08bed1fbc88b095c2a42ba5d9397c2a55d

                      SHA256

                      0878fb883469bd812a1ff6e7d2ca87f19e0c694ea18277547c791f5f3dc917ae

                      SHA512

                      1a04a3385d09d4efca9e2ad2e3bf84b4e517c35efc81f1048617e7b2df38e83b33ef96fde5be4c8522a08cb23f21ed37c3fa62ab0227f2d70a609b66702611d6

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      333KB

                      MD5

                      29a54616304dcad590644767b64b02cf

                      SHA1

                      42498c08bed1fbc88b095c2a42ba5d9397c2a55d

                      SHA256

                      0878fb883469bd812a1ff6e7d2ca87f19e0c694ea18277547c791f5f3dc917ae

                      SHA512

                      1a04a3385d09d4efca9e2ad2e3bf84b4e517c35efc81f1048617e7b2df38e83b33ef96fde5be4c8522a08cb23f21ed37c3fa62ab0227f2d70a609b66702611d6

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      333KB

                      MD5

                      29a54616304dcad590644767b64b02cf

                      SHA1

                      42498c08bed1fbc88b095c2a42ba5d9397c2a55d

                      SHA256

                      0878fb883469bd812a1ff6e7d2ca87f19e0c694ea18277547c791f5f3dc917ae

                      SHA512

                      1a04a3385d09d4efca9e2ad2e3bf84b4e517c35efc81f1048617e7b2df38e83b33ef96fde5be4c8522a08cb23f21ed37c3fa62ab0227f2d70a609b66702611d6

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      5bc0153d2973241b72a38c51a2f72116

                      SHA1

                      cd9c689663557452631d9f8ff609208b01884a32

                      SHA256

                      68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                      SHA512

                      2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      5bc0153d2973241b72a38c51a2f72116

                      SHA1

                      cd9c689663557452631d9f8ff609208b01884a32

                      SHA256

                      68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                      SHA512

                      2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                      Filesize

                      273B

                      MD5

                      374bfdcfcf19f4edfe949022092848d2

                      SHA1

                      df5ee40497e98efcfba30012452d433373d287d4

                      SHA256

                      224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                      SHA512

                      bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

                    • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      5bc0153d2973241b72a38c51a2f72116

                      SHA1

                      cd9c689663557452631d9f8ff609208b01884a32

                      SHA256

                      68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                      SHA512

                      2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

                    • memory/2612-93-0x00000000724B0000-0x0000000072B9E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/2612-85-0x0000000000500000-0x0000000000530000-memory.dmp

                      Filesize

                      192KB

                    • memory/2612-86-0x00000000724B0000-0x0000000072B9E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/2612-87-0x0000000000C90000-0x0000000000C96000-memory.dmp

                      Filesize

                      24KB

                    • memory/2612-88-0x000000000A8E0000-0x000000000AEE6000-memory.dmp

                      Filesize

                      6.0MB

                    • memory/2612-89-0x000000000A450000-0x000000000A55A000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/2612-90-0x000000000A380000-0x000000000A392000-memory.dmp

                      Filesize

                      72KB

                    • memory/2612-91-0x000000000A3E0000-0x000000000A41E000-memory.dmp

                      Filesize

                      248KB

                    • memory/2612-92-0x000000000A560000-0x000000000A5AB000-memory.dmp

                      Filesize

                      300KB

                    • memory/3720-38-0x0000000004940000-0x000000000495C000-memory.dmp

                      Filesize

                      112KB

                    • memory/3720-69-0x00000000734F0000-0x0000000073BDE000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/3720-67-0x00000000734F0000-0x0000000073BDE000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/3720-66-0x0000000004940000-0x0000000004956000-memory.dmp

                      Filesize

                      88KB

                    • memory/3720-64-0x0000000004940000-0x0000000004956000-memory.dmp

                      Filesize

                      88KB

                    • memory/3720-62-0x0000000004940000-0x0000000004956000-memory.dmp

                      Filesize

                      88KB

                    • memory/3720-60-0x0000000004940000-0x0000000004956000-memory.dmp

                      Filesize

                      88KB

                    • memory/3720-58-0x0000000004940000-0x0000000004956000-memory.dmp

                      Filesize

                      88KB

                    • memory/3720-56-0x0000000004940000-0x0000000004956000-memory.dmp

                      Filesize

                      88KB

                    • memory/3720-54-0x0000000004940000-0x0000000004956000-memory.dmp

                      Filesize

                      88KB

                    • memory/3720-52-0x0000000004940000-0x0000000004956000-memory.dmp

                      Filesize

                      88KB

                    • memory/3720-50-0x0000000004940000-0x0000000004956000-memory.dmp

                      Filesize

                      88KB

                    • memory/3720-48-0x0000000004940000-0x0000000004956000-memory.dmp

                      Filesize

                      88KB

                    • memory/3720-46-0x0000000004940000-0x0000000004956000-memory.dmp

                      Filesize

                      88KB

                    • memory/3720-44-0x0000000004940000-0x0000000004956000-memory.dmp

                      Filesize

                      88KB

                    • memory/3720-42-0x0000000004940000-0x0000000004956000-memory.dmp

                      Filesize

                      88KB

                    • memory/3720-40-0x0000000004940000-0x0000000004956000-memory.dmp

                      Filesize

                      88KB

                    • memory/3720-39-0x0000000004940000-0x0000000004956000-memory.dmp

                      Filesize

                      88KB

                    • memory/3720-37-0x0000000004B40000-0x000000000503E000-memory.dmp

                      Filesize

                      5.0MB

                    • memory/3720-36-0x00000000734F0000-0x0000000073BDE000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/3720-35-0x0000000000800000-0x000000000081E000-memory.dmp

                      Filesize

                      120KB