Analysis

  • max time kernel
    138s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/09/2023, 13:34

General

  • Target

    7d84e0aa0d09425ff3ef23d6a01dc8c8e709488dd4ebfb66d005d00c96b56636.exe

  • Size

    936KB

  • MD5

    cea83b418dd632977bc71493b6a7616a

  • SHA1

    f868454521eca497af6c4d7d05731d94c5402a69

  • SHA256

    7d84e0aa0d09425ff3ef23d6a01dc8c8e709488dd4ebfb66d005d00c96b56636

  • SHA512

    8e2e4d3136abbca50adbceac3f5e9c7f8e06262892ecd3e51908c3f1b2f827eec6b6b854a0737cac7bf09e28c25790d06ea0ed9b6fdd46057c9534cc8513827a

  • SSDEEP

    24576:ByVFL7CF8CLGT805b0777tO7U7zGcslxK:0VFL7CF8eMnl0JFhsl

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Attributes
  • install_dir

    b40d11255d

  • install_file

    saves.exe

  • strings_key

    fa622dfc42544927a6471829ee1fa9fe

rc4.plain

Extracted

Family

redline

Botnet

narik

C2

77.91.124.82:19071

Attributes
  • auth_value

    07924f5ef90576eb64faea857b8ba3e5

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d84e0aa0d09425ff3ef23d6a01dc8c8e709488dd4ebfb66d005d00c96b56636.exe
    "C:\Users\Admin\AppData\Local\Temp\7d84e0aa0d09425ff3ef23d6a01dc8c8e709488dd4ebfb66d005d00c96b56636.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1408
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0560926.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0560926.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2112
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8486235.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8486235.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2976
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9144819.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9144819.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4480
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8151404.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8151404.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:5068
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3458581.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3458581.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4844
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7004959.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7004959.exe
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2448
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:3092
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                  8⤵
                  • Creates scheduled task(s)
                  PID:3488
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4696
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    9⤵
                      PID:2056
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:N"
                      9⤵
                        PID:948
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "saves.exe" /P "Admin:R" /E
                        9⤵
                          PID:1724
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                          9⤵
                            PID:3508
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:N"
                            9⤵
                              PID:2660
                            • C:\Windows\SysWOW64\cacls.exe
                              CACLS "..\b40d11255d" /P "Admin:R" /E
                              9⤵
                                PID:1468
                            • C:\Windows\SysWOW64\rundll32.exe
                              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                              8⤵
                              • Loads dropped DLL
                              PID:344
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5030867.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5030867.exe
                        5⤵
                        • Executes dropped EXE
                        PID:4708
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d4609858.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d4609858.exe
                      4⤵
                      • Executes dropped EXE
                      PID:3628
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:1124
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:2076

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0560926.exe

                Filesize

                831KB

                MD5

                6db98d0b4aee4ae6801b1d387bafe2a7

                SHA1

                3f4ca7d60e5c4a1655750ab6eb2fc35f04175491

                SHA256

                37964f6594dab32b64a74d7a50d05549d2b866221317a0bd9f4216b4746da09d

                SHA512

                e7a00efbaa6da89cc966e33468652b2affebb878e2237809cbd0774fcb250a5c62654a028d88dcea2feef13c41e7443c9635404b2575ea82f6f4df083d727c39

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0560926.exe

                Filesize

                831KB

                MD5

                6db98d0b4aee4ae6801b1d387bafe2a7

                SHA1

                3f4ca7d60e5c4a1655750ab6eb2fc35f04175491

                SHA256

                37964f6594dab32b64a74d7a50d05549d2b866221317a0bd9f4216b4746da09d

                SHA512

                e7a00efbaa6da89cc966e33468652b2affebb878e2237809cbd0774fcb250a5c62654a028d88dcea2feef13c41e7443c9635404b2575ea82f6f4df083d727c39

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8486235.exe

                Filesize

                706KB

                MD5

                cc3d37417ce924543003dbf04c09687f

                SHA1

                43e8a2a0c25dea13fac1f251136885929b7d6da9

                SHA256

                22b7323125c35582d0a99ad47c13db3197aa86ee79aa4ffcade0bfe3928dc177

                SHA512

                79b4bc751aca57b4d20993c256c388aae24e83af5f22a1afebdc5fb5d075f3689afa3996ab05d2d839ebc67baa7eb735003e83b8aaa45fbb66b6a1bf4c7f6f50

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8486235.exe

                Filesize

                706KB

                MD5

                cc3d37417ce924543003dbf04c09687f

                SHA1

                43e8a2a0c25dea13fac1f251136885929b7d6da9

                SHA256

                22b7323125c35582d0a99ad47c13db3197aa86ee79aa4ffcade0bfe3928dc177

                SHA512

                79b4bc751aca57b4d20993c256c388aae24e83af5f22a1afebdc5fb5d075f3689afa3996ab05d2d839ebc67baa7eb735003e83b8aaa45fbb66b6a1bf4c7f6f50

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d4609858.exe

                Filesize

                175KB

                MD5

                5b2cf61c2ada4d68838165f3f068c0dc

                SHA1

                3c5bf147c49fe86bd62abc29323ed0f00afba49c

                SHA256

                9fa211ddeb8ec339d4c1a3fe50eb6cf4c465f9e2744109a7436e76af406a7ef0

                SHA512

                1523bd73981108c224e7ebc5107f6887a6be51f6131667e59e321fc88a02044d14c8cd74f2371c7cfc31be468aac5a1e35ff8b8d89df1d21f7f37f2212f82248

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d4609858.exe

                Filesize

                175KB

                MD5

                5b2cf61c2ada4d68838165f3f068c0dc

                SHA1

                3c5bf147c49fe86bd62abc29323ed0f00afba49c

                SHA256

                9fa211ddeb8ec339d4c1a3fe50eb6cf4c465f9e2744109a7436e76af406a7ef0

                SHA512

                1523bd73981108c224e7ebc5107f6887a6be51f6131667e59e321fc88a02044d14c8cd74f2371c7cfc31be468aac5a1e35ff8b8d89df1d21f7f37f2212f82248

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9144819.exe

                Filesize

                550KB

                MD5

                fd1d99aa55844e1b16535571eb7012e3

                SHA1

                d49366af7f11c164f5c8b5f8c1bd7c6bbd67bff1

                SHA256

                69d4ff43ccd4cd4de90d0052ab8b77a5548587c4eb541ff9fdde94320141a76f

                SHA512

                2da074f8513201bd0ab3ab6618182101062931efc3167b3084b58ee9193adf786bafc14d6d0c6e73b5dd44349bb9ff37291925c95b5d0f10b3de5e3a5c3904f9

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9144819.exe

                Filesize

                550KB

                MD5

                fd1d99aa55844e1b16535571eb7012e3

                SHA1

                d49366af7f11c164f5c8b5f8c1bd7c6bbd67bff1

                SHA256

                69d4ff43ccd4cd4de90d0052ab8b77a5548587c4eb541ff9fdde94320141a76f

                SHA512

                2da074f8513201bd0ab3ab6618182101062931efc3167b3084b58ee9193adf786bafc14d6d0c6e73b5dd44349bb9ff37291925c95b5d0f10b3de5e3a5c3904f9

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5030867.exe

                Filesize

                141KB

                MD5

                596f9a9448262bc11aff4a67db9a1ecb

                SHA1

                35089336e333766d78d97ebf1d80500dff601502

                SHA256

                bd54643ce72e8ad7d26271dd93755e7c3303def00aff91d78cd2863d0651ec5f

                SHA512

                25debb3db4f6a1dcff177aed6a13accb0af73625b2f937004df40d3e2cd09b58d50639ac42caf73d22d7be3620a153ad115cb2b7efa35c299cdee902c6dc7d01

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5030867.exe

                Filesize

                141KB

                MD5

                596f9a9448262bc11aff4a67db9a1ecb

                SHA1

                35089336e333766d78d97ebf1d80500dff601502

                SHA256

                bd54643ce72e8ad7d26271dd93755e7c3303def00aff91d78cd2863d0651ec5f

                SHA512

                25debb3db4f6a1dcff177aed6a13accb0af73625b2f937004df40d3e2cd09b58d50639ac42caf73d22d7be3620a153ad115cb2b7efa35c299cdee902c6dc7d01

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8151404.exe

                Filesize

                384KB

                MD5

                731177a7fdc2ae3ce34a7a41a7b9db9e

                SHA1

                9dda13b54b4c216355d9e38433155b399810a7b6

                SHA256

                f4a7240f52b000554cdf12953dd9d276e13bf2c561439cd5e342f88d7855d834

                SHA512

                7e5b03353db959a295a9b2567f0c17f3aa5613a40608558586dcfa2e3d14bcf8675a166a30fa2bae7044a68d54cd66f058021650af5e5da39bc2be8f06afaa86

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8151404.exe

                Filesize

                384KB

                MD5

                731177a7fdc2ae3ce34a7a41a7b9db9e

                SHA1

                9dda13b54b4c216355d9e38433155b399810a7b6

                SHA256

                f4a7240f52b000554cdf12953dd9d276e13bf2c561439cd5e342f88d7855d834

                SHA512

                7e5b03353db959a295a9b2567f0c17f3aa5613a40608558586dcfa2e3d14bcf8675a166a30fa2bae7044a68d54cd66f058021650af5e5da39bc2be8f06afaa86

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3458581.exe

                Filesize

                184KB

                MD5

                9e244590df7b7643d2313c3519255d05

                SHA1

                6c678ed621162f748e8fd6bfc874f2a38773a7e4

                SHA256

                c6da808f9002ac2ad9e6e70a63c35fcc6a50d5b4cbdc83b47950a41a0aba0427

                SHA512

                857d2cd82217c68425445ef80f2c995cfc04cc19e64c96b1ea206ffb966e750da5fc6bf3fa7c5ffb718f1cd7d59b389195fe33c720a6c5e3b3fe310064a54dfb

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3458581.exe

                Filesize

                184KB

                MD5

                9e244590df7b7643d2313c3519255d05

                SHA1

                6c678ed621162f748e8fd6bfc874f2a38773a7e4

                SHA256

                c6da808f9002ac2ad9e6e70a63c35fcc6a50d5b4cbdc83b47950a41a0aba0427

                SHA512

                857d2cd82217c68425445ef80f2c995cfc04cc19e64c96b1ea206ffb966e750da5fc6bf3fa7c5ffb718f1cd7d59b389195fe33c720a6c5e3b3fe310064a54dfb

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7004959.exe

                Filesize

                333KB

                MD5

                67cfd4d785db9bdfac040ffd8fec0926

                SHA1

                ec7b4ef445c03442ec9ba696b939315ae2c94522

                SHA256

                c627e2e966162e6435ec11a2dcc3f99393853fa867883550f8bd9970e7a7b2d0

                SHA512

                6c32a82a515491bd04fbe951c282940412ffb69e135d909c5116d218904a8b09cc1107f855c7e8da60b637403b3e321bce3b17406dabd98637aaa8db84ad1a76

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7004959.exe

                Filesize

                333KB

                MD5

                67cfd4d785db9bdfac040ffd8fec0926

                SHA1

                ec7b4ef445c03442ec9ba696b939315ae2c94522

                SHA256

                c627e2e966162e6435ec11a2dcc3f99393853fa867883550f8bd9970e7a7b2d0

                SHA512

                6c32a82a515491bd04fbe951c282940412ffb69e135d909c5116d218904a8b09cc1107f855c7e8da60b637403b3e321bce3b17406dabd98637aaa8db84ad1a76

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                333KB

                MD5

                67cfd4d785db9bdfac040ffd8fec0926

                SHA1

                ec7b4ef445c03442ec9ba696b939315ae2c94522

                SHA256

                c627e2e966162e6435ec11a2dcc3f99393853fa867883550f8bd9970e7a7b2d0

                SHA512

                6c32a82a515491bd04fbe951c282940412ffb69e135d909c5116d218904a8b09cc1107f855c7e8da60b637403b3e321bce3b17406dabd98637aaa8db84ad1a76

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                333KB

                MD5

                67cfd4d785db9bdfac040ffd8fec0926

                SHA1

                ec7b4ef445c03442ec9ba696b939315ae2c94522

                SHA256

                c627e2e966162e6435ec11a2dcc3f99393853fa867883550f8bd9970e7a7b2d0

                SHA512

                6c32a82a515491bd04fbe951c282940412ffb69e135d909c5116d218904a8b09cc1107f855c7e8da60b637403b3e321bce3b17406dabd98637aaa8db84ad1a76

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                333KB

                MD5

                67cfd4d785db9bdfac040ffd8fec0926

                SHA1

                ec7b4ef445c03442ec9ba696b939315ae2c94522

                SHA256

                c627e2e966162e6435ec11a2dcc3f99393853fa867883550f8bd9970e7a7b2d0

                SHA512

                6c32a82a515491bd04fbe951c282940412ffb69e135d909c5116d218904a8b09cc1107f855c7e8da60b637403b3e321bce3b17406dabd98637aaa8db84ad1a76

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                333KB

                MD5

                67cfd4d785db9bdfac040ffd8fec0926

                SHA1

                ec7b4ef445c03442ec9ba696b939315ae2c94522

                SHA256

                c627e2e966162e6435ec11a2dcc3f99393853fa867883550f8bd9970e7a7b2d0

                SHA512

                6c32a82a515491bd04fbe951c282940412ffb69e135d909c5116d218904a8b09cc1107f855c7e8da60b637403b3e321bce3b17406dabd98637aaa8db84ad1a76

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                333KB

                MD5

                67cfd4d785db9bdfac040ffd8fec0926

                SHA1

                ec7b4ef445c03442ec9ba696b939315ae2c94522

                SHA256

                c627e2e966162e6435ec11a2dcc3f99393853fa867883550f8bd9970e7a7b2d0

                SHA512

                6c32a82a515491bd04fbe951c282940412ffb69e135d909c5116d218904a8b09cc1107f855c7e8da60b637403b3e321bce3b17406dabd98637aaa8db84ad1a76

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                374bfdcfcf19f4edfe949022092848d2

                SHA1

                df5ee40497e98efcfba30012452d433373d287d4

                SHA256

                224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                SHA512

                bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

              • memory/3628-91-0x0000000072930000-0x00000000730E0000-memory.dmp

                Filesize

                7.7MB

              • memory/3628-95-0x0000000005620000-0x0000000005632000-memory.dmp

                Filesize

                72KB

              • memory/3628-96-0x0000000005680000-0x00000000056BC000-memory.dmp

                Filesize

                240KB

              • memory/3628-97-0x0000000072930000-0x00000000730E0000-memory.dmp

                Filesize

                7.7MB

              • memory/3628-98-0x00000000054F0000-0x0000000005500000-memory.dmp

                Filesize

                64KB

              • memory/3628-90-0x0000000000C80000-0x0000000000CB0000-memory.dmp

                Filesize

                192KB

              • memory/3628-94-0x00000000054F0000-0x0000000005500000-memory.dmp

                Filesize

                64KB

              • memory/3628-92-0x0000000005C20000-0x0000000006238000-memory.dmp

                Filesize

                6.1MB

              • memory/3628-93-0x0000000005710000-0x000000000581A000-memory.dmp

                Filesize

                1.0MB

              • memory/4844-39-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/4844-71-0x0000000073DB0000-0x0000000074560000-memory.dmp

                Filesize

                7.7MB

              • memory/4844-69-0x0000000004B60000-0x0000000004B70000-memory.dmp

                Filesize

                64KB

              • memory/4844-68-0x0000000004B60000-0x0000000004B70000-memory.dmp

                Filesize

                64KB

              • memory/4844-67-0x0000000004B60000-0x0000000004B70000-memory.dmp

                Filesize

                64KB

              • memory/4844-66-0x0000000073DB0000-0x0000000074560000-memory.dmp

                Filesize

                7.7MB

              • memory/4844-65-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/4844-63-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/4844-61-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/4844-59-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/4844-57-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/4844-55-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/4844-53-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/4844-51-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/4844-49-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/4844-47-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/4844-45-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/4844-43-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/4844-41-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/4844-38-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/4844-37-0x0000000004B70000-0x0000000005114000-memory.dmp

                Filesize

                5.6MB

              • memory/4844-36-0x0000000004B60000-0x0000000004B70000-memory.dmp

                Filesize

                64KB

              • memory/4844-35-0x0000000073DB0000-0x0000000074560000-memory.dmp

                Filesize

                7.7MB