Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-09-2023 00:59

General

  • Target

    57dfdf53603e8cda4f3f312f2a332624afbe7631c3bc9dd5161b247add71ca5a.exe

  • Size

    1.0MB

  • MD5

    6a0e16f4804acace2ce1b42e56c11246

  • SHA1

    6b993820edda8eff23a75f95ed74733cdfc95499

  • SHA256

    57dfdf53603e8cda4f3f312f2a332624afbe7631c3bc9dd5161b247add71ca5a

  • SHA512

    23c4ad51aebe2dce4a08c17b5950fb2aac4cd78e8dbd9cfe0abe0af8f4d69fa0f359061a6aa23d478b8b90f9d21eb12c850f04aabc59ce2639333358ed910529

  • SSDEEP

    24576:KyeLpYndiN2IuF5Q5DWqOPVkyBCqnojLb70zhuPxisMSlgRKRhi:RTUQfULOqyBCqmoIAPxK

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Attributes
  • install_dir

    b40d11255d

  • install_file

    saves.exe

  • strings_key

    fa622dfc42544927a6471829ee1fa9fe

rc4.plain

Extracted

Family

redline

Botnet

gena

C2

77.91.124.82:19071

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57dfdf53603e8cda4f3f312f2a332624afbe7631c3bc9dd5161b247add71ca5a.exe
    "C:\Users\Admin\AppData\Local\Temp\57dfdf53603e8cda4f3f312f2a332624afbe7631c3bc9dd5161b247add71ca5a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8752680.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8752680.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3452
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1587691.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1587691.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2284
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6990294.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6990294.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4388
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9170578.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9170578.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2200
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5203218.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5203218.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2664
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0071169.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0071169.exe
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4228
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:4396
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                  8⤵
                  • Creates scheduled task(s)
                  PID:3016
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4432
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    9⤵
                      PID:4748
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:N"
                      9⤵
                        PID:4560
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "saves.exe" /P "Admin:R" /E
                        9⤵
                          PID:2540
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                          9⤵
                            PID:2168
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:N"
                            9⤵
                              PID:936
                            • C:\Windows\SysWOW64\cacls.exe
                              CACLS "..\b40d11255d" /P "Admin:R" /E
                              9⤵
                                PID:4020
                            • C:\Windows\SysWOW64\rundll32.exe
                              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                              8⤵
                              • Loads dropped DLL
                              PID:1992
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5808407.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5808407.exe
                        5⤵
                        • Executes dropped EXE
                        PID:1192
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0144458.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0144458.exe
                      4⤵
                      • Executes dropped EXE
                      PID:2300
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:2152
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:2316

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8752680.exe

                Filesize

                929KB

                MD5

                f631a42d79e08d0fab570705127f9649

                SHA1

                f7ce426d4ce69fac7b3bc4f125a80a58a7e823b2

                SHA256

                80b7334f8bffd34bb7f80096876f1530e5b9b72ee08675293ed9402cb507dca9

                SHA512

                46374b382e0006804503594488b86e5f8514de64bfcae23ab2f4375dde304ab2dbbb2817b72ad5115bd5764d20a6b1dcc61eed1ed296028b02b934ebf12d2ae7

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8752680.exe

                Filesize

                929KB

                MD5

                f631a42d79e08d0fab570705127f9649

                SHA1

                f7ce426d4ce69fac7b3bc4f125a80a58a7e823b2

                SHA256

                80b7334f8bffd34bb7f80096876f1530e5b9b72ee08675293ed9402cb507dca9

                SHA512

                46374b382e0006804503594488b86e5f8514de64bfcae23ab2f4375dde304ab2dbbb2817b72ad5115bd5764d20a6b1dcc61eed1ed296028b02b934ebf12d2ae7

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1587691.exe

                Filesize

                705KB

                MD5

                503efa1fdd6181b2d8fc28bb0219e9ad

                SHA1

                c39ef0f4a6b731b34ed8df8a8a4615eecce8bf3d

                SHA256

                c7057bdc538b8275a2df7ca3141df5b74ffc02374934f78a8b902914082bf8c7

                SHA512

                95f5d1846051a91eb074cbf5a1137115d89fc15cced7a9f7e815022e8ca8851fb22516f45b64cb8d36b4cb645298deac30fc74cd050838bb0907bcc7bed1d2f9

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1587691.exe

                Filesize

                705KB

                MD5

                503efa1fdd6181b2d8fc28bb0219e9ad

                SHA1

                c39ef0f4a6b731b34ed8df8a8a4615eecce8bf3d

                SHA256

                c7057bdc538b8275a2df7ca3141df5b74ffc02374934f78a8b902914082bf8c7

                SHA512

                95f5d1846051a91eb074cbf5a1137115d89fc15cced7a9f7e815022e8ca8851fb22516f45b64cb8d36b4cb645298deac30fc74cd050838bb0907bcc7bed1d2f9

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0144458.exe

                Filesize

                174KB

                MD5

                6fcc50632d6a01958843f5cad831636f

                SHA1

                43cf8ce4503236256baa70059f6a86ee21679773

                SHA256

                686adcf02eb9c773970ab2201515776529f5c42d4047b00239682979d8ca3b73

                SHA512

                19d06dd39d0921955e957f6411049800e0f4063ff78f298a7e011f2c542b78564b8b5bcc37c9b947947097260c1b0080fd681126c912d2e6162ef728692a49ba

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0144458.exe

                Filesize

                174KB

                MD5

                6fcc50632d6a01958843f5cad831636f

                SHA1

                43cf8ce4503236256baa70059f6a86ee21679773

                SHA256

                686adcf02eb9c773970ab2201515776529f5c42d4047b00239682979d8ca3b73

                SHA512

                19d06dd39d0921955e957f6411049800e0f4063ff78f298a7e011f2c542b78564b8b5bcc37c9b947947097260c1b0080fd681126c912d2e6162ef728692a49ba

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6990294.exe

                Filesize

                550KB

                MD5

                bfd2cf1ba011ebd8ca6be0d09f779d3c

                SHA1

                ab50b43433190cfd736dbae78b6902c1d85efbc1

                SHA256

                8600ed936444eeae50b2546b0a27a48572f201e998cd47e09e0ef940d4042fe5

                SHA512

                4d0d985dfcb67c026e2ee588b4d5050492b74b7912503352ac648cc235d52bf638e9bdccfbd8a24df702291736afc099c276670e782b85e1f806b1924521056c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6990294.exe

                Filesize

                550KB

                MD5

                bfd2cf1ba011ebd8ca6be0d09f779d3c

                SHA1

                ab50b43433190cfd736dbae78b6902c1d85efbc1

                SHA256

                8600ed936444eeae50b2546b0a27a48572f201e998cd47e09e0ef940d4042fe5

                SHA512

                4d0d985dfcb67c026e2ee588b4d5050492b74b7912503352ac648cc235d52bf638e9bdccfbd8a24df702291736afc099c276670e782b85e1f806b1924521056c

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5808407.exe

                Filesize

                140KB

                MD5

                ecce54c58091557b5bdacbfb8bf9c064

                SHA1

                6e1b3435698b269397f5cebee295cc89a3ffebe4

                SHA256

                39cd6606f8a449cca10c06a231e388d97df6326c1f154dd55ecc1b66044e726f

                SHA512

                1d697276864680bbf87c31e8a89a64657c42362eeb997442a9cd9b9ad4be0fc8a75d9d6f3931113deac650ca684ba389ccb3b9f3fa049a6a96507805d3ef05e6

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5808407.exe

                Filesize

                140KB

                MD5

                ecce54c58091557b5bdacbfb8bf9c064

                SHA1

                6e1b3435698b269397f5cebee295cc89a3ffebe4

                SHA256

                39cd6606f8a449cca10c06a231e388d97df6326c1f154dd55ecc1b66044e726f

                SHA512

                1d697276864680bbf87c31e8a89a64657c42362eeb997442a9cd9b9ad4be0fc8a75d9d6f3931113deac650ca684ba389ccb3b9f3fa049a6a96507805d3ef05e6

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9170578.exe

                Filesize

                384KB

                MD5

                e835a399f65b394a9a529b7158d86bf7

                SHA1

                aeb34c8513caa3c11884eb25d0a4ea87b32d8622

                SHA256

                75c82c505e58400d99e069e85aae9488e1b43d020f1abffe2d1ea5c17ba49bd0

                SHA512

                8387c5a1c13c161131070d93242f9994a931ceed1e3655508bf3e2e9ad07bed7db8c7875551d65382a70fea9d6de571c1816cd8876c5d5f0f9c373ef6545c091

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9170578.exe

                Filesize

                384KB

                MD5

                e835a399f65b394a9a529b7158d86bf7

                SHA1

                aeb34c8513caa3c11884eb25d0a4ea87b32d8622

                SHA256

                75c82c505e58400d99e069e85aae9488e1b43d020f1abffe2d1ea5c17ba49bd0

                SHA512

                8387c5a1c13c161131070d93242f9994a931ceed1e3655508bf3e2e9ad07bed7db8c7875551d65382a70fea9d6de571c1816cd8876c5d5f0f9c373ef6545c091

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5203218.exe

                Filesize

                185KB

                MD5

                c561f354e07a511cf08a1e0410725d73

                SHA1

                1be5a998dd6f839a1a997afec986d3704e665838

                SHA256

                ea4376c9f6bef31e2c9846a74c54b3f4c85855624a0b72b52e958768eea7f3ad

                SHA512

                e52cb23fbef81eb2789d328ab4a074e29eadb42e837e0bb64e3f66afd3c35a879fe839b1b348d89425a90c10331adea69722cf64bfb023b705a8847b2b68ce9b

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5203218.exe

                Filesize

                185KB

                MD5

                c561f354e07a511cf08a1e0410725d73

                SHA1

                1be5a998dd6f839a1a997afec986d3704e665838

                SHA256

                ea4376c9f6bef31e2c9846a74c54b3f4c85855624a0b72b52e958768eea7f3ad

                SHA512

                e52cb23fbef81eb2789d328ab4a074e29eadb42e837e0bb64e3f66afd3c35a879fe839b1b348d89425a90c10331adea69722cf64bfb023b705a8847b2b68ce9b

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0071169.exe

                Filesize

                334KB

                MD5

                c809f6fec64d78e5639ae002f550e1ae

                SHA1

                5d83d5b13db1e5a8f57a401296fad6f0d1e375bd

                SHA256

                9ec597cb240af1654c450dba327cbfab0962e40f85aa471707aa476a1ad8a4fc

                SHA512

                212884556530cfb297ab65204f27e52e7f6487b5fc24f8dd3230210d5fbdc3e58e4d0777436f8d723c91ec82681e394a52c6eff78cf0ee17a7988d84ac0bb5f3

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0071169.exe

                Filesize

                334KB

                MD5

                c809f6fec64d78e5639ae002f550e1ae

                SHA1

                5d83d5b13db1e5a8f57a401296fad6f0d1e375bd

                SHA256

                9ec597cb240af1654c450dba327cbfab0962e40f85aa471707aa476a1ad8a4fc

                SHA512

                212884556530cfb297ab65204f27e52e7f6487b5fc24f8dd3230210d5fbdc3e58e4d0777436f8d723c91ec82681e394a52c6eff78cf0ee17a7988d84ac0bb5f3

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                334KB

                MD5

                c809f6fec64d78e5639ae002f550e1ae

                SHA1

                5d83d5b13db1e5a8f57a401296fad6f0d1e375bd

                SHA256

                9ec597cb240af1654c450dba327cbfab0962e40f85aa471707aa476a1ad8a4fc

                SHA512

                212884556530cfb297ab65204f27e52e7f6487b5fc24f8dd3230210d5fbdc3e58e4d0777436f8d723c91ec82681e394a52c6eff78cf0ee17a7988d84ac0bb5f3

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                334KB

                MD5

                c809f6fec64d78e5639ae002f550e1ae

                SHA1

                5d83d5b13db1e5a8f57a401296fad6f0d1e375bd

                SHA256

                9ec597cb240af1654c450dba327cbfab0962e40f85aa471707aa476a1ad8a4fc

                SHA512

                212884556530cfb297ab65204f27e52e7f6487b5fc24f8dd3230210d5fbdc3e58e4d0777436f8d723c91ec82681e394a52c6eff78cf0ee17a7988d84ac0bb5f3

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                334KB

                MD5

                c809f6fec64d78e5639ae002f550e1ae

                SHA1

                5d83d5b13db1e5a8f57a401296fad6f0d1e375bd

                SHA256

                9ec597cb240af1654c450dba327cbfab0962e40f85aa471707aa476a1ad8a4fc

                SHA512

                212884556530cfb297ab65204f27e52e7f6487b5fc24f8dd3230210d5fbdc3e58e4d0777436f8d723c91ec82681e394a52c6eff78cf0ee17a7988d84ac0bb5f3

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                334KB

                MD5

                c809f6fec64d78e5639ae002f550e1ae

                SHA1

                5d83d5b13db1e5a8f57a401296fad6f0d1e375bd

                SHA256

                9ec597cb240af1654c450dba327cbfab0962e40f85aa471707aa476a1ad8a4fc

                SHA512

                212884556530cfb297ab65204f27e52e7f6487b5fc24f8dd3230210d5fbdc3e58e4d0777436f8d723c91ec82681e394a52c6eff78cf0ee17a7988d84ac0bb5f3

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                334KB

                MD5

                c809f6fec64d78e5639ae002f550e1ae

                SHA1

                5d83d5b13db1e5a8f57a401296fad6f0d1e375bd

                SHA256

                9ec597cb240af1654c450dba327cbfab0962e40f85aa471707aa476a1ad8a4fc

                SHA512

                212884556530cfb297ab65204f27e52e7f6487b5fc24f8dd3230210d5fbdc3e58e4d0777436f8d723c91ec82681e394a52c6eff78cf0ee17a7988d84ac0bb5f3

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                374bfdcfcf19f4edfe949022092848d2

                SHA1

                df5ee40497e98efcfba30012452d433373d287d4

                SHA256

                224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                SHA512

                bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

              • memory/2300-90-0x0000000072F50000-0x0000000073700000-memory.dmp

                Filesize

                7.7MB

              • memory/2300-94-0x0000000005230000-0x0000000005242000-memory.dmp

                Filesize

                72KB

              • memory/2300-95-0x0000000005290000-0x00000000052CC000-memory.dmp

                Filesize

                240KB

              • memory/2300-96-0x0000000072F50000-0x0000000073700000-memory.dmp

                Filesize

                7.7MB

              • memory/2300-97-0x0000000005120000-0x0000000005130000-memory.dmp

                Filesize

                64KB

              • memory/2300-89-0x00000000008A0000-0x00000000008D0000-memory.dmp

                Filesize

                192KB

              • memory/2300-93-0x0000000005120000-0x0000000005130000-memory.dmp

                Filesize

                64KB

              • memory/2300-91-0x0000000005850000-0x0000000005E68000-memory.dmp

                Filesize

                6.1MB

              • memory/2300-92-0x0000000005340000-0x000000000544A000-memory.dmp

                Filesize

                1.0MB

              • memory/2664-39-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/2664-70-0x00000000743B0000-0x0000000074B60000-memory.dmp

                Filesize

                7.7MB

              • memory/2664-68-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB

              • memory/2664-67-0x00000000743B0000-0x0000000074B60000-memory.dmp

                Filesize

                7.7MB

              • memory/2664-66-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/2664-64-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/2664-62-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/2664-60-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/2664-58-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/2664-56-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/2664-54-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/2664-52-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/2664-50-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/2664-48-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/2664-46-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/2664-44-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/2664-42-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/2664-40-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/2664-38-0x0000000004A80000-0x0000000005024000-memory.dmp

                Filesize

                5.6MB

              • memory/2664-37-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB

              • memory/2664-36-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB

              • memory/2664-35-0x00000000743B0000-0x0000000074B60000-memory.dmp

                Filesize

                7.7MB