Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-1703_x64
  • resource
    win10-20230831-en
  • resource tags

    arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/09/2023, 12:47

General

  • Target

    1e36f2a85e69cfaf0050ec911c3d3b1260cad6c6d858e642b63b69ebf51d6dbb.exe

  • Size

    1.0MB

  • MD5

    3f6e28d5d15211a228288145d9eb0b4a

  • SHA1

    6c2b77d18bbdb36be72dfe33c1e3d9eb7dd20b28

  • SHA256

    1e36f2a85e69cfaf0050ec911c3d3b1260cad6c6d858e642b63b69ebf51d6dbb

  • SHA512

    c8d803f263fbcfcd84f10eecfcb1ada854e9e52623ae001dbf0fa27fd41b7a5b01d36d39f4e10bed9ae27f3b42e32ae998a6d28733412bb224b98c0cdc0bd23d

  • SSDEEP

    24576:hyjVdo87bAOQs8eiXGiCoMqnorY2MwZluj/vc/TA:UxdpEOHlyZCHqF8ZE

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Attributes
  • install_dir

    b40d11255d

  • install_file

    saves.exe

  • strings_key

    fa622dfc42544927a6471829ee1fa9fe

rc4.plain

Extracted

Family

redline

Botnet

narik

C2

77.91.124.82:19071

Attributes
  • auth_value

    07924f5ef90576eb64faea857b8ba3e5

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e36f2a85e69cfaf0050ec911c3d3b1260cad6c6d858e642b63b69ebf51d6dbb.exe
    "C:\Users\Admin\AppData\Local\Temp\1e36f2a85e69cfaf0050ec911c3d3b1260cad6c6d858e642b63b69ebf51d6dbb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4132
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7313884.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7313884.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4852
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4119473.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4119473.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1056
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5473939.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5473939.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4968
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5007471.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5007471.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2712
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1388395.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1388395.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3556
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1637739.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1637739.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:648
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:2600
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                  8⤵
                  • Creates scheduled task(s)
                  PID:2948
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2112
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    9⤵
                      PID:4276
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:N"
                      9⤵
                        PID:2180
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "saves.exe" /P "Admin:R" /E
                        9⤵
                          PID:2116
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                          9⤵
                            PID:2924
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:N"
                            9⤵
                              PID:2968
                            • C:\Windows\SysWOW64\cacls.exe
                              CACLS "..\b40d11255d" /P "Admin:R" /E
                              9⤵
                                PID:2160
                            • C:\Windows\SysWOW64\rundll32.exe
                              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                              8⤵
                              • Loads dropped DLL
                              PID:3212
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0368518.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0368518.exe
                        5⤵
                        • Executes dropped EXE
                        PID:4516
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t2867458.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t2867458.exe
                      4⤵
                      • Executes dropped EXE
                      PID:2676
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4932

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7313884.exe

                Filesize

                931KB

                MD5

                db434dd9275b70f218739fc4d57cab6f

                SHA1

                1f391fbac234b52337280912106b7b2b5d9835e4

                SHA256

                42c04294f83ff5c35ed00dc159b5ae134eb267c373e044888ca46509ad94544b

                SHA512

                4f3f8d3dd2a6607b1d4bf16b29e1e0bedfd47578aa8930f4341a6e41c4b0df367827fb011dacec9a4b52a7d3a2cf015b1095f4c7aff01eb0dc2dfdac86e494fb

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7313884.exe

                Filesize

                931KB

                MD5

                db434dd9275b70f218739fc4d57cab6f

                SHA1

                1f391fbac234b52337280912106b7b2b5d9835e4

                SHA256

                42c04294f83ff5c35ed00dc159b5ae134eb267c373e044888ca46509ad94544b

                SHA512

                4f3f8d3dd2a6607b1d4bf16b29e1e0bedfd47578aa8930f4341a6e41c4b0df367827fb011dacec9a4b52a7d3a2cf015b1095f4c7aff01eb0dc2dfdac86e494fb

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4119473.exe

                Filesize

                705KB

                MD5

                fe5a394229d597c889c8be5f19c30a8c

                SHA1

                dd876dbf90ab2713312ef204a8f6401f291c9602

                SHA256

                b9a69e0a468651936bf96494897e5b3ffbc973aa94528762ff84695b7ff71ef7

                SHA512

                4d1f6c09feb58408aea0717b0f1d5a6295d78d7fdc0697bf4cbfa04163913963ca1f6854465c1fab0daa85e1f9e6372f34701f06717992520da96f3dfc09750c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4119473.exe

                Filesize

                705KB

                MD5

                fe5a394229d597c889c8be5f19c30a8c

                SHA1

                dd876dbf90ab2713312ef204a8f6401f291c9602

                SHA256

                b9a69e0a468651936bf96494897e5b3ffbc973aa94528762ff84695b7ff71ef7

                SHA512

                4d1f6c09feb58408aea0717b0f1d5a6295d78d7fdc0697bf4cbfa04163913963ca1f6854465c1fab0daa85e1f9e6372f34701f06717992520da96f3dfc09750c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t2867458.exe

                Filesize

                175KB

                MD5

                dec1ab9315e5b97e6c126713aa761122

                SHA1

                e07d8e31f1b088e46cb33201bf2dd4342dd62111

                SHA256

                d0ab873b119f01db0d9997fc6ea7a9a4acad7a1b579e8159c33320373d121b4b

                SHA512

                55809415c359cc04f1bb5efb66141b5ce42daed7f589b45ec8450b5c10df34c2463d066ebfc213da4c3ffe36ae2c7f73f461ece7111dabf581a634875373344e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t2867458.exe

                Filesize

                175KB

                MD5

                dec1ab9315e5b97e6c126713aa761122

                SHA1

                e07d8e31f1b088e46cb33201bf2dd4342dd62111

                SHA256

                d0ab873b119f01db0d9997fc6ea7a9a4acad7a1b579e8159c33320373d121b4b

                SHA512

                55809415c359cc04f1bb5efb66141b5ce42daed7f589b45ec8450b5c10df34c2463d066ebfc213da4c3ffe36ae2c7f73f461ece7111dabf581a634875373344e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5473939.exe

                Filesize

                550KB

                MD5

                73cabef81473652811caff68b09dc833

                SHA1

                7b6353916c193698c95b002d1d837f7abff1667d

                SHA256

                b0f540c13fc74640dbd05dd04a100c0f9c75246b35d42c5fc667da4953e1ee80

                SHA512

                c9a6843b645737ec232b09101f5a651fc1a308d76d3c382d03c0fca8326cb115763ed50f0370d738fb52f76a6b5a61f5835ea0f7595554e0cbaa1ee66c390eee

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5473939.exe

                Filesize

                550KB

                MD5

                73cabef81473652811caff68b09dc833

                SHA1

                7b6353916c193698c95b002d1d837f7abff1667d

                SHA256

                b0f540c13fc74640dbd05dd04a100c0f9c75246b35d42c5fc667da4953e1ee80

                SHA512

                c9a6843b645737ec232b09101f5a651fc1a308d76d3c382d03c0fca8326cb115763ed50f0370d738fb52f76a6b5a61f5835ea0f7595554e0cbaa1ee66c390eee

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0368518.exe

                Filesize

                141KB

                MD5

                509d90736e3aaf2fed22996c120ca5a8

                SHA1

                975ee6d057e0db0b50a16dc1b1d2bede185349a7

                SHA256

                71fc18c581f716647fcbf5c25dbaf463c34f48d21e8cceac751c9016a14b6416

                SHA512

                b9eacebb8c9d2ea5fc2c62184c2195ee8d179da5b207509cd1dafb88443769fb77c64d5ef17ca6aab273933d165093bb767875545450a9df34560661234af4da

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0368518.exe

                Filesize

                141KB

                MD5

                509d90736e3aaf2fed22996c120ca5a8

                SHA1

                975ee6d057e0db0b50a16dc1b1d2bede185349a7

                SHA256

                71fc18c581f716647fcbf5c25dbaf463c34f48d21e8cceac751c9016a14b6416

                SHA512

                b9eacebb8c9d2ea5fc2c62184c2195ee8d179da5b207509cd1dafb88443769fb77c64d5ef17ca6aab273933d165093bb767875545450a9df34560661234af4da

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5007471.exe

                Filesize

                384KB

                MD5

                f3ff7d82846652f22d102dc537fe081d

                SHA1

                6f03b664373ab4b1966e196e869e1aa076aa336c

                SHA256

                3cd74486c98efb93c16dbefd6a2a5c84dcd1bd690c9b5aa054eecea0d761936d

                SHA512

                b3e4a777ab8782d1fc61e15ee4ccf9b9aab839d430bd92d49f359a69ae7019db56976eed6bc55442e6be8e080ee4620ca63c6c0ae72579995c7a40ff9718e236

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5007471.exe

                Filesize

                384KB

                MD5

                f3ff7d82846652f22d102dc537fe081d

                SHA1

                6f03b664373ab4b1966e196e869e1aa076aa336c

                SHA256

                3cd74486c98efb93c16dbefd6a2a5c84dcd1bd690c9b5aa054eecea0d761936d

                SHA512

                b3e4a777ab8782d1fc61e15ee4ccf9b9aab839d430bd92d49f359a69ae7019db56976eed6bc55442e6be8e080ee4620ca63c6c0ae72579995c7a40ff9718e236

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1388395.exe

                Filesize

                184KB

                MD5

                c03d0712fda610a66650cb33edf2b251

                SHA1

                f5757ccbc9018cf6114a988f6d33551774b4d20c

                SHA256

                afc1e481ce1546df6fd6bef447771348476d152fd340d69dac0d26aab45d21cf

                SHA512

                8dfa6f879833b6371f6d06d5d0a8f334b8b9bfd0cbb57fe8d28e8c377edf0a2b54648a479c98caaa2906872643df19f955f5fb630257b963cf3fcb44d36d7659

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1388395.exe

                Filesize

                184KB

                MD5

                c03d0712fda610a66650cb33edf2b251

                SHA1

                f5757ccbc9018cf6114a988f6d33551774b4d20c

                SHA256

                afc1e481ce1546df6fd6bef447771348476d152fd340d69dac0d26aab45d21cf

                SHA512

                8dfa6f879833b6371f6d06d5d0a8f334b8b9bfd0cbb57fe8d28e8c377edf0a2b54648a479c98caaa2906872643df19f955f5fb630257b963cf3fcb44d36d7659

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1637739.exe

                Filesize

                333KB

                MD5

                49f18f5b2ccd3539a0b34f3c93c17ba4

                SHA1

                208e455832823f3c9e7883fee7a26113893e6e74

                SHA256

                d6f935961f0b991d035967302bc2b057a3f39fec6dc2a4323c9333eac6467ef1

                SHA512

                7a69021918283bb51d251a1b523a2e6bf7445307791f5fe7839c517510a0f8b2b208d29b549946ead50c1fb9c669a49b193b862bc275deff6da1b660a8feaa6a

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1637739.exe

                Filesize

                333KB

                MD5

                49f18f5b2ccd3539a0b34f3c93c17ba4

                SHA1

                208e455832823f3c9e7883fee7a26113893e6e74

                SHA256

                d6f935961f0b991d035967302bc2b057a3f39fec6dc2a4323c9333eac6467ef1

                SHA512

                7a69021918283bb51d251a1b523a2e6bf7445307791f5fe7839c517510a0f8b2b208d29b549946ead50c1fb9c669a49b193b862bc275deff6da1b660a8feaa6a

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                333KB

                MD5

                49f18f5b2ccd3539a0b34f3c93c17ba4

                SHA1

                208e455832823f3c9e7883fee7a26113893e6e74

                SHA256

                d6f935961f0b991d035967302bc2b057a3f39fec6dc2a4323c9333eac6467ef1

                SHA512

                7a69021918283bb51d251a1b523a2e6bf7445307791f5fe7839c517510a0f8b2b208d29b549946ead50c1fb9c669a49b193b862bc275deff6da1b660a8feaa6a

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                333KB

                MD5

                49f18f5b2ccd3539a0b34f3c93c17ba4

                SHA1

                208e455832823f3c9e7883fee7a26113893e6e74

                SHA256

                d6f935961f0b991d035967302bc2b057a3f39fec6dc2a4323c9333eac6467ef1

                SHA512

                7a69021918283bb51d251a1b523a2e6bf7445307791f5fe7839c517510a0f8b2b208d29b549946ead50c1fb9c669a49b193b862bc275deff6da1b660a8feaa6a

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                333KB

                MD5

                49f18f5b2ccd3539a0b34f3c93c17ba4

                SHA1

                208e455832823f3c9e7883fee7a26113893e6e74

                SHA256

                d6f935961f0b991d035967302bc2b057a3f39fec6dc2a4323c9333eac6467ef1

                SHA512

                7a69021918283bb51d251a1b523a2e6bf7445307791f5fe7839c517510a0f8b2b208d29b549946ead50c1fb9c669a49b193b862bc275deff6da1b660a8feaa6a

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                333KB

                MD5

                49f18f5b2ccd3539a0b34f3c93c17ba4

                SHA1

                208e455832823f3c9e7883fee7a26113893e6e74

                SHA256

                d6f935961f0b991d035967302bc2b057a3f39fec6dc2a4323c9333eac6467ef1

                SHA512

                7a69021918283bb51d251a1b523a2e6bf7445307791f5fe7839c517510a0f8b2b208d29b549946ead50c1fb9c669a49b193b862bc275deff6da1b660a8feaa6a

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                374bfdcfcf19f4edfe949022092848d2

                SHA1

                df5ee40497e98efcfba30012452d433373d287d4

                SHA256

                224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                SHA512

                bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • memory/2676-93-0x0000000072840000-0x0000000072F2E000-memory.dmp

                Filesize

                6.9MB

              • memory/2676-85-0x0000000000A30000-0x0000000000A60000-memory.dmp

                Filesize

                192KB

              • memory/2676-86-0x0000000072840000-0x0000000072F2E000-memory.dmp

                Filesize

                6.9MB

              • memory/2676-87-0x0000000002E60000-0x0000000002E66000-memory.dmp

                Filesize

                24KB

              • memory/2676-88-0x000000000ACB0000-0x000000000B2B6000-memory.dmp

                Filesize

                6.0MB

              • memory/2676-89-0x000000000A840000-0x000000000A94A000-memory.dmp

                Filesize

                1.0MB

              • memory/2676-90-0x000000000A770000-0x000000000A782000-memory.dmp

                Filesize

                72KB

              • memory/2676-91-0x000000000A7D0000-0x000000000A80E000-memory.dmp

                Filesize

                248KB

              • memory/2676-92-0x000000000A950000-0x000000000A99B000-memory.dmp

                Filesize

                300KB

              • memory/3556-38-0x00000000024F0000-0x000000000250C000-memory.dmp

                Filesize

                112KB

              • memory/3556-69-0x0000000073880000-0x0000000073F6E000-memory.dmp

                Filesize

                6.9MB

              • memory/3556-67-0x0000000073880000-0x0000000073F6E000-memory.dmp

                Filesize

                6.9MB

              • memory/3556-66-0x00000000024F0000-0x0000000002506000-memory.dmp

                Filesize

                88KB

              • memory/3556-64-0x00000000024F0000-0x0000000002506000-memory.dmp

                Filesize

                88KB

              • memory/3556-62-0x00000000024F0000-0x0000000002506000-memory.dmp

                Filesize

                88KB

              • memory/3556-60-0x00000000024F0000-0x0000000002506000-memory.dmp

                Filesize

                88KB

              • memory/3556-58-0x00000000024F0000-0x0000000002506000-memory.dmp

                Filesize

                88KB

              • memory/3556-56-0x00000000024F0000-0x0000000002506000-memory.dmp

                Filesize

                88KB

              • memory/3556-54-0x00000000024F0000-0x0000000002506000-memory.dmp

                Filesize

                88KB

              • memory/3556-52-0x00000000024F0000-0x0000000002506000-memory.dmp

                Filesize

                88KB

              • memory/3556-48-0x00000000024F0000-0x0000000002506000-memory.dmp

                Filesize

                88KB

              • memory/3556-50-0x00000000024F0000-0x0000000002506000-memory.dmp

                Filesize

                88KB

              • memory/3556-46-0x00000000024F0000-0x0000000002506000-memory.dmp

                Filesize

                88KB

              • memory/3556-42-0x00000000024F0000-0x0000000002506000-memory.dmp

                Filesize

                88KB

              • memory/3556-44-0x00000000024F0000-0x0000000002506000-memory.dmp

                Filesize

                88KB

              • memory/3556-40-0x00000000024F0000-0x0000000002506000-memory.dmp

                Filesize

                88KB

              • memory/3556-39-0x00000000024F0000-0x0000000002506000-memory.dmp

                Filesize

                88KB

              • memory/3556-37-0x0000000004B50000-0x000000000504E000-memory.dmp

                Filesize

                5.0MB

              • memory/3556-36-0x0000000002030000-0x000000000204E000-memory.dmp

                Filesize

                120KB

              • memory/3556-35-0x0000000073880000-0x0000000073F6E000-memory.dmp

                Filesize

                6.9MB