Analysis

  • max time kernel
    146s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-09-2023 17:47

General

  • Target

    6e98caee61685cb0419de3eb18ad4710_JC.exe

  • Size

    830KB

  • MD5

    6e98caee61685cb0419de3eb18ad4710

  • SHA1

    fb1122fac60cfc131dba839bb60e56222032d70a

  • SHA256

    5ca0403952d57955661676ba0ae40ea1f70e3ed8b2bef3b2282e3de34c8e9d09

  • SHA512

    503451713a579f6566187c8eea98f4991dee565bbf6886761aa4adb5319d962045bc0da1bc5b700975bfefa7351034a537777c1fe43fcb7128bb58cb0177d246

  • SSDEEP

    24576:xyPtOni0td8y4qnoOvKM2FfkNXHoVg6mS:k6p8y4qp+FkHcgv

Malware Config

Extracted

Family

amadey

Version

3.87

C2

http://77.91.68.18/nice/index.php

Attributes
  • install_dir

    b40d11255d

  • install_file

    saves.exe

  • strings_key

    fa622dfc42544927a6471829ee1fa9fe

rc4.plain

Extracted

Family

redline

Botnet

gena

C2

77.91.124.82:19071

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e98caee61685cb0419de3eb18ad4710_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\6e98caee61685cb0419de3eb18ad4710_JC.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2199702.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2199702.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1760
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8916665.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8916665.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4028
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1774369.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1774369.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4668
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6048138.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6048138.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4320
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0824104.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0824104.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1284
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2164
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:1188
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:964
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:4032
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:N"
                    8⤵
                      PID:464
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:R" /E
                      8⤵
                        PID:4144
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:872
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:N"
                          8⤵
                            PID:3720
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:R" /E
                            8⤵
                              PID:1848
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:964
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9196009.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9196009.exe
                      4⤵
                      • Executes dropped EXE
                      PID:4908
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1839257.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1839257.exe
                    3⤵
                    • Executes dropped EXE
                    PID:2572
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4588
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4404
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:2588

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2199702.exe

                Filesize

                706KB

                MD5

                aed0310033614efdd3f54c5372dac3b9

                SHA1

                1e29bea2f970de27a0f4b2157c43917fcc0e13ce

                SHA256

                7061d9d17aaf80ec35460a1d6d62a5138adcb97018b97938e16336ca10d09ec2

                SHA512

                96ab6b6c6f39142f122b2134452bc19fcaf61611ec276656d6b9fc682dfacbf31a5a984862a8935cb2bb808bc61a4eb76ec41009bf7ab0425798c8c1ae9635c2

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2199702.exe

                Filesize

                706KB

                MD5

                aed0310033614efdd3f54c5372dac3b9

                SHA1

                1e29bea2f970de27a0f4b2157c43917fcc0e13ce

                SHA256

                7061d9d17aaf80ec35460a1d6d62a5138adcb97018b97938e16336ca10d09ec2

                SHA512

                96ab6b6c6f39142f122b2134452bc19fcaf61611ec276656d6b9fc682dfacbf31a5a984862a8935cb2bb808bc61a4eb76ec41009bf7ab0425798c8c1ae9635c2

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1839257.exe

                Filesize

                174KB

                MD5

                cd4fee0b0eca6f6d84678238ec47c029

                SHA1

                15e7f368df7cd5f3c20240a3408b9d0e8a5a2fb1

                SHA256

                8156cb8b4af1486884fb36b55a58711e50e3cd0b044c7ac17937a53257875d2d

                SHA512

                5037166b3fa8aa8d99d2b0fec5e042e7ddf666dbb531b21037d710b617f92a8980c37263726a0f237d6f0e1364f6d93908b544447a1887312537164065341d08

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1839257.exe

                Filesize

                174KB

                MD5

                cd4fee0b0eca6f6d84678238ec47c029

                SHA1

                15e7f368df7cd5f3c20240a3408b9d0e8a5a2fb1

                SHA256

                8156cb8b4af1486884fb36b55a58711e50e3cd0b044c7ac17937a53257875d2d

                SHA512

                5037166b3fa8aa8d99d2b0fec5e042e7ddf666dbb531b21037d710b617f92a8980c37263726a0f237d6f0e1364f6d93908b544447a1887312537164065341d08

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8916665.exe

                Filesize

                550KB

                MD5

                d50ba907bc7a32b20d325da1829f934f

                SHA1

                a500c5cd68c9b92bd2b124e4f0e1e0b14c3c6006

                SHA256

                776dfd40a7d97fc20dc153f5fe8bd51a044c6267cae9bc6432bd775609bbf4a1

                SHA512

                c110f8f3372bbb839f5e0226c6ff34a608463eaf368bca2792b34b44356ac5a7ee38151e3fe098fdaabec298a6bcb66e172cbfd6cc94b454d3d5e8b32c97d514

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8916665.exe

                Filesize

                550KB

                MD5

                d50ba907bc7a32b20d325da1829f934f

                SHA1

                a500c5cd68c9b92bd2b124e4f0e1e0b14c3c6006

                SHA256

                776dfd40a7d97fc20dc153f5fe8bd51a044c6267cae9bc6432bd775609bbf4a1

                SHA512

                c110f8f3372bbb839f5e0226c6ff34a608463eaf368bca2792b34b44356ac5a7ee38151e3fe098fdaabec298a6bcb66e172cbfd6cc94b454d3d5e8b32c97d514

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9196009.exe

                Filesize

                141KB

                MD5

                4270f7448165feb9d8b768381c4d3ff8

                SHA1

                2d8b4c292fcc14761afc85b6ba69d0fc9102c372

                SHA256

                b6ffe87136fee0c811e38ab402f6f7e14bfdc01d65a6b9f079c4f4c9093b4f11

                SHA512

                548f3a809351fc41e3034297b39bcb5bb516cd2f8e169f39730d5ff3f65003a6afa3795757cc22e43740c2bea3de27c2155f23072ca27dea6ad166c4ea121fe4

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9196009.exe

                Filesize

                141KB

                MD5

                4270f7448165feb9d8b768381c4d3ff8

                SHA1

                2d8b4c292fcc14761afc85b6ba69d0fc9102c372

                SHA256

                b6ffe87136fee0c811e38ab402f6f7e14bfdc01d65a6b9f079c4f4c9093b4f11

                SHA512

                548f3a809351fc41e3034297b39bcb5bb516cd2f8e169f39730d5ff3f65003a6afa3795757cc22e43740c2bea3de27c2155f23072ca27dea6ad166c4ea121fe4

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1774369.exe

                Filesize

                384KB

                MD5

                55b65a359f305876d6d4d9cd7ec87058

                SHA1

                5df9d692465ff54b875c28d9569378c7b04c4b52

                SHA256

                936eeb03c7b276907b1a97269b224efa9a713f3e920dd2fde30acadb8e182cc7

                SHA512

                dab925d43f604231da394a0957e7361641a8e15045fe79d0b4c3cb97f03ab3fa57b728c4fed70e0a5d3219476e3a96981344c5ad271f78e575f91819da0aa8c7

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1774369.exe

                Filesize

                384KB

                MD5

                55b65a359f305876d6d4d9cd7ec87058

                SHA1

                5df9d692465ff54b875c28d9569378c7b04c4b52

                SHA256

                936eeb03c7b276907b1a97269b224efa9a713f3e920dd2fde30acadb8e182cc7

                SHA512

                dab925d43f604231da394a0957e7361641a8e15045fe79d0b4c3cb97f03ab3fa57b728c4fed70e0a5d3219476e3a96981344c5ad271f78e575f91819da0aa8c7

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6048138.exe

                Filesize

                185KB

                MD5

                38741f6afa354dcdeea52785382ed876

                SHA1

                63541e539a314a133074adbbcefd02d682b7d9f6

                SHA256

                5635d77d268b67899b88670e3415495890cc260c4960276e7360da90c1897ab9

                SHA512

                e9007c17bc596e73acaadaa8371dd18923c56e7fc71738480b56da69fd22086d32ed26696269e07d375808c96fe12edfba5aa88eaeadbec5946afb5ebffb0a87

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6048138.exe

                Filesize

                185KB

                MD5

                38741f6afa354dcdeea52785382ed876

                SHA1

                63541e539a314a133074adbbcefd02d682b7d9f6

                SHA256

                5635d77d268b67899b88670e3415495890cc260c4960276e7360da90c1897ab9

                SHA512

                e9007c17bc596e73acaadaa8371dd18923c56e7fc71738480b56da69fd22086d32ed26696269e07d375808c96fe12edfba5aa88eaeadbec5946afb5ebffb0a87

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0824104.exe

                Filesize

                335KB

                MD5

                6c2b0118382448a6ceae09ed59a04c6f

                SHA1

                ce1297f10ca5664d65841aabe105903ff54fc016

                SHA256

                a7633d9567229ad1b6f9d579da5782d89e83c5f0a73873ce68201979fba516b2

                SHA512

                63e88dba4c5b79d2b8808543bfe2b4f6035df80633eb21c8b13e6fd02317f36dbdbfecaf81d36adb5ca9bf04ca1ba03185b13121d82948b57a893ce742c3ac59

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0824104.exe

                Filesize

                335KB

                MD5

                6c2b0118382448a6ceae09ed59a04c6f

                SHA1

                ce1297f10ca5664d65841aabe105903ff54fc016

                SHA256

                a7633d9567229ad1b6f9d579da5782d89e83c5f0a73873ce68201979fba516b2

                SHA512

                63e88dba4c5b79d2b8808543bfe2b4f6035df80633eb21c8b13e6fd02317f36dbdbfecaf81d36adb5ca9bf04ca1ba03185b13121d82948b57a893ce742c3ac59

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                335KB

                MD5

                6c2b0118382448a6ceae09ed59a04c6f

                SHA1

                ce1297f10ca5664d65841aabe105903ff54fc016

                SHA256

                a7633d9567229ad1b6f9d579da5782d89e83c5f0a73873ce68201979fba516b2

                SHA512

                63e88dba4c5b79d2b8808543bfe2b4f6035df80633eb21c8b13e6fd02317f36dbdbfecaf81d36adb5ca9bf04ca1ba03185b13121d82948b57a893ce742c3ac59

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                335KB

                MD5

                6c2b0118382448a6ceae09ed59a04c6f

                SHA1

                ce1297f10ca5664d65841aabe105903ff54fc016

                SHA256

                a7633d9567229ad1b6f9d579da5782d89e83c5f0a73873ce68201979fba516b2

                SHA512

                63e88dba4c5b79d2b8808543bfe2b4f6035df80633eb21c8b13e6fd02317f36dbdbfecaf81d36adb5ca9bf04ca1ba03185b13121d82948b57a893ce742c3ac59

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                335KB

                MD5

                6c2b0118382448a6ceae09ed59a04c6f

                SHA1

                ce1297f10ca5664d65841aabe105903ff54fc016

                SHA256

                a7633d9567229ad1b6f9d579da5782d89e83c5f0a73873ce68201979fba516b2

                SHA512

                63e88dba4c5b79d2b8808543bfe2b4f6035df80633eb21c8b13e6fd02317f36dbdbfecaf81d36adb5ca9bf04ca1ba03185b13121d82948b57a893ce742c3ac59

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                335KB

                MD5

                6c2b0118382448a6ceae09ed59a04c6f

                SHA1

                ce1297f10ca5664d65841aabe105903ff54fc016

                SHA256

                a7633d9567229ad1b6f9d579da5782d89e83c5f0a73873ce68201979fba516b2

                SHA512

                63e88dba4c5b79d2b8808543bfe2b4f6035df80633eb21c8b13e6fd02317f36dbdbfecaf81d36adb5ca9bf04ca1ba03185b13121d82948b57a893ce742c3ac59

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                335KB

                MD5

                6c2b0118382448a6ceae09ed59a04c6f

                SHA1

                ce1297f10ca5664d65841aabe105903ff54fc016

                SHA256

                a7633d9567229ad1b6f9d579da5782d89e83c5f0a73873ce68201979fba516b2

                SHA512

                63e88dba4c5b79d2b8808543bfe2b4f6035df80633eb21c8b13e6fd02317f36dbdbfecaf81d36adb5ca9bf04ca1ba03185b13121d82948b57a893ce742c3ac59

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                335KB

                MD5

                6c2b0118382448a6ceae09ed59a04c6f

                SHA1

                ce1297f10ca5664d65841aabe105903ff54fc016

                SHA256

                a7633d9567229ad1b6f9d579da5782d89e83c5f0a73873ce68201979fba516b2

                SHA512

                63e88dba4c5b79d2b8808543bfe2b4f6035df80633eb21c8b13e6fd02317f36dbdbfecaf81d36adb5ca9bf04ca1ba03185b13121d82948b57a893ce742c3ac59

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                374bfdcfcf19f4edfe949022092848d2

                SHA1

                df5ee40497e98efcfba30012452d433373d287d4

                SHA256

                224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                SHA512

                bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

              • memory/2572-89-0x00000000051D0000-0x00000000052DA000-memory.dmp

                Filesize

                1.0MB

              • memory/2572-94-0x0000000002A10000-0x0000000002A20000-memory.dmp

                Filesize

                64KB

              • memory/2572-87-0x0000000072710000-0x0000000072EC0000-memory.dmp

                Filesize

                7.7MB

              • memory/2572-86-0x0000000000780000-0x00000000007B0000-memory.dmp

                Filesize

                192KB

              • memory/2572-88-0x00000000056D0000-0x0000000005CE8000-memory.dmp

                Filesize

                6.1MB

              • memory/2572-93-0x0000000072710000-0x0000000072EC0000-memory.dmp

                Filesize

                7.7MB

              • memory/2572-91-0x0000000002A10000-0x0000000002A20000-memory.dmp

                Filesize

                64KB

              • memory/2572-90-0x0000000005110000-0x0000000005122000-memory.dmp

                Filesize

                72KB

              • memory/2572-92-0x0000000005170000-0x00000000051AC000-memory.dmp

                Filesize

                240KB

              • memory/4320-34-0x0000000004990000-0x00000000049A6000-memory.dmp

                Filesize

                88KB

              • memory/4320-66-0x0000000073D10000-0x00000000744C0000-memory.dmp

                Filesize

                7.7MB

              • memory/4320-64-0x0000000004A80000-0x0000000004A90000-memory.dmp

                Filesize

                64KB

              • memory/4320-63-0x0000000004A80000-0x0000000004A90000-memory.dmp

                Filesize

                64KB

              • memory/4320-62-0x0000000004A80000-0x0000000004A90000-memory.dmp

                Filesize

                64KB

              • memory/4320-61-0x0000000073D10000-0x00000000744C0000-memory.dmp

                Filesize

                7.7MB

              • memory/4320-58-0x0000000004990000-0x00000000049A6000-memory.dmp

                Filesize

                88KB

              • memory/4320-60-0x0000000004990000-0x00000000049A6000-memory.dmp

                Filesize

                88KB

              • memory/4320-56-0x0000000004990000-0x00000000049A6000-memory.dmp

                Filesize

                88KB

              • memory/4320-52-0x0000000004990000-0x00000000049A6000-memory.dmp

                Filesize

                88KB

              • memory/4320-54-0x0000000004990000-0x00000000049A6000-memory.dmp

                Filesize

                88KB

              • memory/4320-50-0x0000000004990000-0x00000000049A6000-memory.dmp

                Filesize

                88KB

              • memory/4320-48-0x0000000004990000-0x00000000049A6000-memory.dmp

                Filesize

                88KB

              • memory/4320-46-0x0000000004990000-0x00000000049A6000-memory.dmp

                Filesize

                88KB

              • memory/4320-44-0x0000000004990000-0x00000000049A6000-memory.dmp

                Filesize

                88KB

              • memory/4320-42-0x0000000004990000-0x00000000049A6000-memory.dmp

                Filesize

                88KB

              • memory/4320-40-0x0000000004990000-0x00000000049A6000-memory.dmp

                Filesize

                88KB

              • memory/4320-38-0x0000000004990000-0x00000000049A6000-memory.dmp

                Filesize

                88KB

              • memory/4320-36-0x0000000004990000-0x00000000049A6000-memory.dmp

                Filesize

                88KB

              • memory/4320-33-0x0000000004990000-0x00000000049A6000-memory.dmp

                Filesize

                88KB

              • memory/4320-32-0x0000000004A90000-0x0000000005034000-memory.dmp

                Filesize

                5.6MB

              • memory/4320-31-0x0000000004A80000-0x0000000004A90000-memory.dmp

                Filesize

                64KB

              • memory/4320-30-0x0000000004A80000-0x0000000004A90000-memory.dmp

                Filesize

                64KB

              • memory/4320-29-0x0000000004A80000-0x0000000004A90000-memory.dmp

                Filesize

                64KB

              • memory/4320-28-0x0000000073D10000-0x00000000744C0000-memory.dmp

                Filesize

                7.7MB