Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09/02/2023, 11:26

General

  • Target

    8669a71f4b3e2c7efade6ad5c50d1b6ac42de52d560a0731909a9f68bbb303d9.exe

  • Size

    525KB

  • MD5

    d0f97c994f778f5e868004c00dde7585

  • SHA1

    42953fe76cd1afd2b14033dd60e25657550bc733

  • SHA256

    8669a71f4b3e2c7efade6ad5c50d1b6ac42de52d560a0731909a9f68bbb303d9

  • SHA512

    3bc30ccb2ba8de9b6be824cc7cdf5057cc6f9536db0406dc0d13822f947045f2ff7ef0ca08c597aa224051046b6ae9f5336e808d0d54c7858f509b9e9305f937

  • SSDEEP

    12288:PMrey90eTOYHh2Qk0v7zmn0uxlSHb9NZg6seF1:tyVTOYHh2Qr7zm0nZjseF1

Malware Config

Extracted

Family

amadey

Version

3.66

C2

62.204.41.4/Gol478Ns/index.php

Extracted

Family

redline

Botnet

duma

C2

193.233.20.11:4131

Attributes
  • auth_value

    0f22fcdbad589a61a6c973e449218813

Extracted

Family

redline

Botnet

romka

C2

193.233.20.11:4131

Attributes
  • auth_value

    fcbb3247051f5290e8ac5b1a841af67b

Extracted

Family

redline

Botnet

crypt

C2

176.113.115.17:4132

Attributes
  • auth_value

    407e05c9b3a74d99a20f90b091547bd6

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8669a71f4b3e2c7efade6ad5c50d1b6ac42de52d560a0731909a9f68bbb303d9.exe
    "C:\Users\Admin\AppData\Local\Temp\8669a71f4b3e2c7efade6ad5c50d1b6ac42de52d560a0731909a9f68bbb303d9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4208
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bzOg.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bzOg.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\azOl.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\azOl.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4720
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nika.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nika.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4048
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xriv.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xriv.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4820
      • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
        "C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4380
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:872
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4b9a106e76" /P "Admin:N"&&CACLS "..\4b9a106e76" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:756
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:2216
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "mnolyk.exe" /P "Admin:N"
              5⤵
                PID:1176
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "mnolyk.exe" /P "Admin:R" /E
                5⤵
                  PID:4012
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:708
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\4b9a106e76" /P "Admin:N"
                    5⤵
                      PID:636
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\4b9a106e76" /P "Admin:R" /E
                      5⤵
                        PID:3752
                    • C:\Users\Admin\AppData\Local\Temp\1000009051\dubna.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000009051\dubna.exe"
                      4⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3464
                    • C:\Users\Admin\AppData\Local\Temp\1000010051\igla.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000010051\igla.exe"
                      4⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Suspicious use of WriteProcessMemory
                      PID:4028
                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bZkf.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bZkf.exe
                        5⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4648
                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cZkZka.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cZkZka.exe
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious use of WriteProcessMemory
                        PID:2372
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                          6⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3964
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:2688
              • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
                C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
                1⤵
                • Executes dropped EXE
                PID:2624
              • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
                C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
                1⤵
                • Executes dropped EXE
                PID:4372

              Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\1000009051\dubna.exe

                      Filesize

                      175KB

                      MD5

                      9f11bd99bfbcea926407437c9f964868

                      SHA1

                      211eb34b0bac5ebd4a6ceba8c4be1a1b2b8a0950

                      SHA256

                      ade8a43186c386a850ab564c076d80a389ee3be1e0293f1210ebf328e0e72ca1

                      SHA512

                      77b2770ba7c62163cd2e490cbc8efa0bd60fa9c3543399fcad4443746b9ddebfbd1c0b99ce6a6c021d6ca7a781a707ec9f6c9107342832a3e97581363125f05c

                    • C:\Users\Admin\AppData\Local\Temp\1000009051\dubna.exe

                      Filesize

                      175KB

                      MD5

                      9f11bd99bfbcea926407437c9f964868

                      SHA1

                      211eb34b0bac5ebd4a6ceba8c4be1a1b2b8a0950

                      SHA256

                      ade8a43186c386a850ab564c076d80a389ee3be1e0293f1210ebf328e0e72ca1

                      SHA512

                      77b2770ba7c62163cd2e490cbc8efa0bd60fa9c3543399fcad4443746b9ddebfbd1c0b99ce6a6c021d6ca7a781a707ec9f6c9107342832a3e97581363125f05c

                    • C:\Users\Admin\AppData\Local\Temp\1000010051\igla.exe

                      Filesize

                      520KB

                      MD5

                      85b6a7561109ac9bcf86fee6b27852c5

                      SHA1

                      04917ad1b1dfe4e14984eb32080efe008fa536a4

                      SHA256

                      d94f25010a566602fa13689be81c62c4f2a539ed7c9b0db7ad7baba128010c2f

                      SHA512

                      24c435444615c56c65b65b864f2eb9313249d636b2bd17d3abd2ddfffee96e399b125d317cbf7dac1731000a5ffcfa36c631763e1a661e9fb4dd63729f962d90

                    • C:\Users\Admin\AppData\Local\Temp\1000010051\igla.exe

                      Filesize

                      520KB

                      MD5

                      85b6a7561109ac9bcf86fee6b27852c5

                      SHA1

                      04917ad1b1dfe4e14984eb32080efe008fa536a4

                      SHA256

                      d94f25010a566602fa13689be81c62c4f2a539ed7c9b0db7ad7baba128010c2f

                      SHA512

                      24c435444615c56c65b65b864f2eb9313249d636b2bd17d3abd2ddfffee96e399b125d317cbf7dac1731000a5ffcfa36c631763e1a661e9fb4dd63729f962d90

                    • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe

                      Filesize

                      236KB

                      MD5

                      8bb923c4d81284daef7896e5682df6c6

                      SHA1

                      67e34a96b77e44b666c5479f540995bdeacf5de2

                      SHA256

                      9b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21

                      SHA512

                      2daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7

                    • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe

                      Filesize

                      236KB

                      MD5

                      8bb923c4d81284daef7896e5682df6c6

                      SHA1

                      67e34a96b77e44b666c5479f540995bdeacf5de2

                      SHA256

                      9b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21

                      SHA512

                      2daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7

                    • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe

                      Filesize

                      236KB

                      MD5

                      8bb923c4d81284daef7896e5682df6c6

                      SHA1

                      67e34a96b77e44b666c5479f540995bdeacf5de2

                      SHA256

                      9b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21

                      SHA512

                      2daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7

                    • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe

                      Filesize

                      236KB

                      MD5

                      8bb923c4d81284daef7896e5682df6c6

                      SHA1

                      67e34a96b77e44b666c5479f540995bdeacf5de2

                      SHA256

                      9b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21

                      SHA512

                      2daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bZkf.exe

                      Filesize

                      306KB

                      MD5

                      ad54280afd4e818d263cd54b95f94545

                      SHA1

                      27746a84aca46da065e03fb063ca1b1cb26ce03d

                      SHA256

                      aab1460440bee10e2efec9b5c83ea20ed85e7a17d4ed3b4a19341148255d54b1

                      SHA512

                      9218a0450edd29d21a8a6443b80cbbc0803ea2e5187e5f4df383d058769aadacd2a2815985eef8fcc508bc083b22b9db77b8d3f5501d1975815652ac291e8dfe

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bZkf.exe

                      Filesize

                      306KB

                      MD5

                      ad54280afd4e818d263cd54b95f94545

                      SHA1

                      27746a84aca46da065e03fb063ca1b1cb26ce03d

                      SHA256

                      aab1460440bee10e2efec9b5c83ea20ed85e7a17d4ed3b4a19341148255d54b1

                      SHA512

                      9218a0450edd29d21a8a6443b80cbbc0803ea2e5187e5f4df383d058769aadacd2a2815985eef8fcc508bc083b22b9db77b8d3f5501d1975815652ac291e8dfe

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bzOg.exe

                      Filesize

                      339KB

                      MD5

                      a2aef30b034b392deb4a228424d4093e

                      SHA1

                      8bf0063448d21903d2ec035b77846535d3c4619a

                      SHA256

                      0f47f5855cf898d8c0df2bcc9b18a84e9a7573a87caad2238c6c88767b8a99cc

                      SHA512

                      9d3ed02bcb153be45e427d4a3fae5213595af5e2876909cd46089f1c45613ad8e92984810459b0afbb0a06aa87477d44c55a42dbd0a118398b0588d47d443f77

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bzOg.exe

                      Filesize

                      339KB

                      MD5

                      a2aef30b034b392deb4a228424d4093e

                      SHA1

                      8bf0063448d21903d2ec035b77846535d3c4619a

                      SHA256

                      0f47f5855cf898d8c0df2bcc9b18a84e9a7573a87caad2238c6c88767b8a99cc

                      SHA512

                      9d3ed02bcb153be45e427d4a3fae5213595af5e2876909cd46089f1c45613ad8e92984810459b0afbb0a06aa87477d44c55a42dbd0a118398b0588d47d443f77

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cZkZka.exe

                      Filesize

                      283KB

                      MD5

                      457dcca2cfa8e1592521e4bc580d2097

                      SHA1

                      de855fa7934126fd1cde834b752999ebe79e367f

                      SHA256

                      54ce28a037eea87448e65bc25f8d3a38ddd4b4679516cc59899b77150aa46fcc

                      SHA512

                      d15709dd44e184612a86e7201c78887771e7cc062e8b4daf83c5bbf1d6dd74320e8c5058cde295d412d8e5b135f8686f8ed56aa9aa2a439b022319e6723bb752

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cZkZka.exe

                      Filesize

                      283KB

                      MD5

                      457dcca2cfa8e1592521e4bc580d2097

                      SHA1

                      de855fa7934126fd1cde834b752999ebe79e367f

                      SHA256

                      54ce28a037eea87448e65bc25f8d3a38ddd4b4679516cc59899b77150aa46fcc

                      SHA512

                      d15709dd44e184612a86e7201c78887771e7cc062e8b4daf83c5bbf1d6dd74320e8c5058cde295d412d8e5b135f8686f8ed56aa9aa2a439b022319e6723bb752

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xriv.exe

                      Filesize

                      236KB

                      MD5

                      8bb923c4d81284daef7896e5682df6c6

                      SHA1

                      67e34a96b77e44b666c5479f540995bdeacf5de2

                      SHA256

                      9b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21

                      SHA512

                      2daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xriv.exe

                      Filesize

                      236KB

                      MD5

                      8bb923c4d81284daef7896e5682df6c6

                      SHA1

                      67e34a96b77e44b666c5479f540995bdeacf5de2

                      SHA256

                      9b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21

                      SHA512

                      2daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\azOl.exe

                      Filesize

                      248KB

                      MD5

                      ab06d018f78a2f3f50370218ea41e947

                      SHA1

                      c7b6ad896d573af1a9f9c4ba8119fd3b80f91505

                      SHA256

                      2a46d2e5a962e329f580c6b54df66281357c9e47eb9c39d90649105719c3b538

                      SHA512

                      fcc7b3b4c893ad6498852347967d0522bb0f9c3fe884dc2ed8c2cc8f12179e9e814a89b9d9eb8d9c11f91d3c9534b10b613fbda9ffaf42dfe9fbe8909f6554aa

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\azOl.exe

                      Filesize

                      248KB

                      MD5

                      ab06d018f78a2f3f50370218ea41e947

                      SHA1

                      c7b6ad896d573af1a9f9c4ba8119fd3b80f91505

                      SHA256

                      2a46d2e5a962e329f580c6b54df66281357c9e47eb9c39d90649105719c3b538

                      SHA512

                      fcc7b3b4c893ad6498852347967d0522bb0f9c3fe884dc2ed8c2cc8f12179e9e814a89b9d9eb8d9c11f91d3c9534b10b613fbda9ffaf42dfe9fbe8909f6554aa

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nika.exe

                      Filesize

                      11KB

                      MD5

                      7e93bacbbc33e6652e147e7fe07572a0

                      SHA1

                      421a7167da01c8da4dc4d5234ca3dd84e319e762

                      SHA256

                      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                      SHA512

                      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nika.exe

                      Filesize

                      11KB

                      MD5

                      7e93bacbbc33e6652e147e7fe07572a0

                      SHA1

                      421a7167da01c8da4dc4d5234ca3dd84e319e762

                      SHA256

                      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                      SHA512

                      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                    • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                      Filesize

                      89KB

                      MD5

                      c79b74d8fec5e7e2ba2f1789fd582a15

                      SHA1

                      78a1e5d99dbaccc5e07b125e1dfb280112cb3128

                      SHA256

                      b5bd049d32f0faeea6ce65a0f0d326de5bc4427a7c1ad24bfb0ea050c1dec7d3

                      SHA512

                      0debfc54904fd538cfb1fc648d18f90a991337200b3decf74b28ac2f341843fb3bab4f45bc92cfec333b18dfff9cc136854462e79054a39926a7bd8ee2e057ba

                    • \Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                      Filesize

                      89KB

                      MD5

                      c79b74d8fec5e7e2ba2f1789fd582a15

                      SHA1

                      78a1e5d99dbaccc5e07b125e1dfb280112cb3128

                      SHA256

                      b5bd049d32f0faeea6ce65a0f0d326de5bc4427a7c1ad24bfb0ea050c1dec7d3

                      SHA512

                      0debfc54904fd538cfb1fc648d18f90a991337200b3decf74b28ac2f341843fb3bab4f45bc92cfec333b18dfff9cc136854462e79054a39926a7bd8ee2e057ba

                    • memory/2276-174-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2276-176-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2276-182-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2276-181-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2276-180-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2276-179-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2276-178-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2276-177-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2276-175-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2276-173-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2276-172-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2276-171-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2276-169-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2276-168-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2276-167-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2276-166-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2276-165-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2276-164-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3464-740-0x0000000004920000-0x0000000004932000-memory.dmp

                      Filesize

                      72KB

                    • memory/3464-807-0x0000000004CA0000-0x0000000004D06000-memory.dmp

                      Filesize

                      408KB

                    • memory/3464-819-0x0000000006180000-0x0000000006342000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/3464-818-0x0000000005980000-0x00000000059D0000-memory.dmp

                      Filesize

                      320KB

                    • memory/3464-820-0x0000000006880000-0x0000000006DAC000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/3464-815-0x0000000005860000-0x00000000058F2000-memory.dmp

                      Filesize

                      584KB

                    • memory/3464-651-0x00000000000C0000-0x00000000000F2000-memory.dmp

                      Filesize

                      200KB

                    • memory/3464-758-0x0000000004B00000-0x0000000004B4B000-memory.dmp

                      Filesize

                      300KB

                    • memory/3464-733-0x0000000004E70000-0x0000000005476000-memory.dmp

                      Filesize

                      6.0MB

                    • memory/3464-817-0x0000000005900000-0x0000000005976000-memory.dmp

                      Filesize

                      472KB

                    • memory/3464-736-0x00000000049F0000-0x0000000004AFA000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/3464-747-0x00000000049A0000-0x00000000049DE000-memory.dmp

                      Filesize

                      248KB

                    • memory/3964-944-0x0000000000400000-0x0000000000432000-memory.dmp

                      Filesize

                      200KB

                    • memory/3964-960-0x0000000009590000-0x00000000095DB000-memory.dmp

                      Filesize

                      300KB

                    • memory/4048-286-0x0000000000E80000-0x0000000000E8A000-memory.dmp

                      Filesize

                      40KB

                    • memory/4208-122-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-134-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-117-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-136-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-135-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-137-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-118-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-138-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-139-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-116-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-140-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-131-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-119-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-130-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-129-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-128-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-120-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-127-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-132-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-133-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-161-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-160-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-159-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-158-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-157-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-156-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-126-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-125-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-154-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-155-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-153-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-124-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-123-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-141-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-142-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-121-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-152-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-151-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-150-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-149-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-148-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-143-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-144-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-145-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-146-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4208-147-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4648-785-0x0000000000400000-0x000000000057E000-memory.dmp

                      Filesize

                      1.5MB

                    • memory/4648-782-0x0000000004AD0000-0x0000000004B16000-memory.dmp

                      Filesize

                      280KB

                    • memory/4648-783-0x0000000000580000-0x00000000006CA000-memory.dmp

                      Filesize

                      1.3MB

                    • memory/4648-781-0x0000000000852000-0x0000000000880000-memory.dmp

                      Filesize

                      184KB

                    • memory/4648-789-0x0000000004B50000-0x0000000004B94000-memory.dmp

                      Filesize

                      272KB

                    • memory/4648-832-0x0000000000852000-0x0000000000880000-memory.dmp

                      Filesize

                      184KB

                    • memory/4648-834-0x0000000000580000-0x00000000006CA000-memory.dmp

                      Filesize

                      1.3MB

                    • memory/4648-844-0x0000000000852000-0x0000000000880000-memory.dmp

                      Filesize

                      184KB

                    • memory/4648-845-0x0000000000400000-0x000000000057E000-memory.dmp

                      Filesize

                      1.5MB

                    • memory/4720-270-0x0000000000570000-0x000000000061E000-memory.dmp

                      Filesize

                      696KB

                    • memory/4720-268-0x0000000002160000-0x000000000217A000-memory.dmp

                      Filesize

                      104KB

                    • memory/4720-282-0x0000000000400000-0x000000000056F000-memory.dmp

                      Filesize

                      1.4MB

                    • memory/4720-280-0x0000000000570000-0x000000000061E000-memory.dmp

                      Filesize

                      696KB

                    • memory/4720-277-0x00000000023F0000-0x0000000002408000-memory.dmp

                      Filesize

                      96KB

                    • memory/4720-275-0x0000000004D20000-0x000000000521E000-memory.dmp

                      Filesize

                      5.0MB

                    • memory/4720-273-0x0000000000400000-0x000000000056F000-memory.dmp

                      Filesize

                      1.4MB

                    • memory/4720-271-0x00000000001D0000-0x00000000001FD000-memory.dmp

                      Filesize

                      180KB