Analysis

  • max time kernel
    135s
  • max time network
    143s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/02/2023, 14:27

General

  • Target

    da80256a4f9361f016e5ae6c7f5ec31707e73f0f3673975a48ab327360a60328.exe

  • Size

    739KB

  • MD5

    7844c7ac81d8515310925bbe60102853

  • SHA1

    03f3e3412cd694362e32d7780b7e6a1a81476d00

  • SHA256

    da80256a4f9361f016e5ae6c7f5ec31707e73f0f3673975a48ab327360a60328

  • SHA512

    1b9bbf81ca27e4902b715df7f2c55adc0fc1a27c9fd780d995e9e3be0c8be0fedba0340d461185d9a0399c9d513a92690fe290ff2b2f4047ce50f6dbfb1f7569

  • SSDEEP

    12288:7Mrry90VLSaGDeOknwZWTsEJ04kI3nJVeeJuDOu+L7ZZt+DOH7Nzz7h8nb:wyLDinw4swjJVuDOu+L7ZZtThunb

Malware Config

Extracted

Family

redline

Botnet

dunm

C2

193.233.20.12:4132

Attributes
  • auth_value

    352959e3707029296ec94306d74e2334

Extracted

Family

amadey

Version

3.66

C2

62.204.41.4/Gol478Ns/index.php

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da80256a4f9361f016e5ae6c7f5ec31707e73f0f3673975a48ab327360a60328.exe
    "C:\Users\Admin\AppData\Local\Temp\da80256a4f9361f016e5ae6c7f5ec31707e73f0f3673975a48ab327360a60328.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2796
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gvT61WH.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gvT61WH.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3808
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gtm15NP.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gtm15NP.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1280
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aHs66jt.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aHs66jt.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4556
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bim49Zm.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bim49Zm.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4756
          • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
            "C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4904
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:1844
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4b9a106e76" /P "Admin:N"&&CACLS "..\4b9a106e76" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2472
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:5036
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "mnolyk.exe" /P "Admin:N"
                  7⤵
                    PID:3408
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "mnolyk.exe" /P "Admin:R" /E
                    7⤵
                      PID:1852
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:4604
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\4b9a106e76" /P "Admin:N"
                        7⤵
                          PID:772
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\4b9a106e76" /P "Admin:R" /E
                          7⤵
                            PID:4664
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                          6⤵
                          • Loads dropped DLL
                          PID:32
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dSB5791.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dSB5791.exe
                    3⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1268
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fwk75.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fwk75.exe
                  2⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Executes dropped EXE
                  • Windows security modification
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1432
              • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
                C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
                1⤵
                • Executes dropped EXE
                PID:1672
              • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
                C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
                1⤵
                • Executes dropped EXE
                PID:3840

              Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe

                      Filesize

                      236KB

                      MD5

                      8bb923c4d81284daef7896e5682df6c6

                      SHA1

                      67e34a96b77e44b666c5479f540995bdeacf5de2

                      SHA256

                      9b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21

                      SHA512

                      2daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7

                    • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe

                      Filesize

                      236KB

                      MD5

                      8bb923c4d81284daef7896e5682df6c6

                      SHA1

                      67e34a96b77e44b666c5479f540995bdeacf5de2

                      SHA256

                      9b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21

                      SHA512

                      2daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7

                    • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe

                      Filesize

                      236KB

                      MD5

                      8bb923c4d81284daef7896e5682df6c6

                      SHA1

                      67e34a96b77e44b666c5479f540995bdeacf5de2

                      SHA256

                      9b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21

                      SHA512

                      2daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7

                    • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe

                      Filesize

                      236KB

                      MD5

                      8bb923c4d81284daef7896e5682df6c6

                      SHA1

                      67e34a96b77e44b666c5479f540995bdeacf5de2

                      SHA256

                      9b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21

                      SHA512

                      2daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fwk75.exe

                      Filesize

                      11KB

                      MD5

                      7e93bacbbc33e6652e147e7fe07572a0

                      SHA1

                      421a7167da01c8da4dc4d5234ca3dd84e319e762

                      SHA256

                      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                      SHA512

                      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fwk75.exe

                      Filesize

                      11KB

                      MD5

                      7e93bacbbc33e6652e147e7fe07572a0

                      SHA1

                      421a7167da01c8da4dc4d5234ca3dd84e319e762

                      SHA256

                      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                      SHA512

                      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gvT61WH.exe

                      Filesize

                      635KB

                      MD5

                      5f741e3ff7482576d39137e1184ac626

                      SHA1

                      ee9a858ca951020d99c6af4b53806fff4639b60a

                      SHA256

                      fa766e8919978b8ed1008f337c75d6226e79eb51e40e2208ed0a7d1dc56205ec

                      SHA512

                      1e97d9ca889471a09433155c0a65682de04e5a0f0d93f720363b627e9d7aab6135cf45af31d5955c25320f5b96527f7d06a175e92d3367d706c8cb6369f9d38a

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gvT61WH.exe

                      Filesize

                      635KB

                      MD5

                      5f741e3ff7482576d39137e1184ac626

                      SHA1

                      ee9a858ca951020d99c6af4b53806fff4639b60a

                      SHA256

                      fa766e8919978b8ed1008f337c75d6226e79eb51e40e2208ed0a7d1dc56205ec

                      SHA512

                      1e97d9ca889471a09433155c0a65682de04e5a0f0d93f720363b627e9d7aab6135cf45af31d5955c25320f5b96527f7d06a175e92d3367d706c8cb6369f9d38a

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dSB5791.exe

                      Filesize

                      338KB

                      MD5

                      cb2d93db92499f0d807e5de936216415

                      SHA1

                      6599f128b4914dfa7085a114f765f28ab2383366

                      SHA256

                      8b784da006ef6549b3db738ed63352e81be6cf5941330388e02b72ec188c41f6

                      SHA512

                      af7c64d82e6d728cbbaf73e39f3f5203a6a575e06dd8e847f937460df83aeadc1599d45e6edc1af35bef60ac899e369f96b181932e25bce850fe179a05e6ba66

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dSB5791.exe

                      Filesize

                      338KB

                      MD5

                      cb2d93db92499f0d807e5de936216415

                      SHA1

                      6599f128b4914dfa7085a114f765f28ab2383366

                      SHA256

                      8b784da006ef6549b3db738ed63352e81be6cf5941330388e02b72ec188c41f6

                      SHA512

                      af7c64d82e6d728cbbaf73e39f3f5203a6a575e06dd8e847f937460df83aeadc1599d45e6edc1af35bef60ac899e369f96b181932e25bce850fe179a05e6ba66

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gtm15NP.exe

                      Filesize

                      286KB

                      MD5

                      bd73320949e3cc6a2882fe62f5d478dd

                      SHA1

                      cd6e91791db3e5a70a91689dd846f59df09e770e

                      SHA256

                      fa21660bc44ee48578a84da66f7068cab68e5886dde8409971a7fc056a90aba3

                      SHA512

                      c444b90abdb85f7f650e341535b57c6c79d6ed73cfd55b83d39d8f7d0e217f4c95b54326f4a249bbbe3c9c9562392cf0d925c7483a538688a6dedce936b15a9b

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gtm15NP.exe

                      Filesize

                      286KB

                      MD5

                      bd73320949e3cc6a2882fe62f5d478dd

                      SHA1

                      cd6e91791db3e5a70a91689dd846f59df09e770e

                      SHA256

                      fa21660bc44ee48578a84da66f7068cab68e5886dde8409971a7fc056a90aba3

                      SHA512

                      c444b90abdb85f7f650e341535b57c6c79d6ed73cfd55b83d39d8f7d0e217f4c95b54326f4a249bbbe3c9c9562392cf0d925c7483a538688a6dedce936b15a9b

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aHs66jt.exe

                      Filesize

                      175KB

                      MD5

                      69f79e05d0c83aee310d9adfe5aa7f2b

                      SHA1

                      485c490180380051a14316564fbda07723be11b1

                      SHA256

                      c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2

                      SHA512

                      f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aHs66jt.exe

                      Filesize

                      175KB

                      MD5

                      69f79e05d0c83aee310d9adfe5aa7f2b

                      SHA1

                      485c490180380051a14316564fbda07723be11b1

                      SHA256

                      c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2

                      SHA512

                      f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bim49Zm.exe

                      Filesize

                      236KB

                      MD5

                      8bb923c4d81284daef7896e5682df6c6

                      SHA1

                      67e34a96b77e44b666c5479f540995bdeacf5de2

                      SHA256

                      9b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21

                      SHA512

                      2daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bim49Zm.exe

                      Filesize

                      236KB

                      MD5

                      8bb923c4d81284daef7896e5682df6c6

                      SHA1

                      67e34a96b77e44b666c5479f540995bdeacf5de2

                      SHA256

                      9b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21

                      SHA512

                      2daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7

                    • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                      Filesize

                      89KB

                      MD5

                      c79b74d8fec5e7e2ba2f1789fd582a15

                      SHA1

                      78a1e5d99dbaccc5e07b125e1dfb280112cb3128

                      SHA256

                      b5bd049d32f0faeea6ce65a0f0d326de5bc4427a7c1ad24bfb0ea050c1dec7d3

                      SHA512

                      0debfc54904fd538cfb1fc648d18f90a991337200b3decf74b28ac2f341843fb3bab4f45bc92cfec333b18dfff9cc136854462e79054a39926a7bd8ee2e057ba

                    • \Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                      Filesize

                      89KB

                      MD5

                      c79b74d8fec5e7e2ba2f1789fd582a15

                      SHA1

                      78a1e5d99dbaccc5e07b125e1dfb280112cb3128

                      SHA256

                      b5bd049d32f0faeea6ce65a0f0d326de5bc4427a7c1ad24bfb0ea050c1dec7d3

                      SHA512

                      0debfc54904fd538cfb1fc648d18f90a991337200b3decf74b28ac2f341843fb3bab4f45bc92cfec333b18dfff9cc136854462e79054a39926a7bd8ee2e057ba

                    • memory/1268-746-0x0000000005C30000-0x0000000005C7B000-memory.dmp

                      Filesize

                      300KB

                    • memory/1268-705-0x0000000000400000-0x00000000007B1000-memory.dmp

                      Filesize

                      3.7MB

                    • memory/1268-775-0x0000000000400000-0x00000000007B1000-memory.dmp

                      Filesize

                      3.7MB

                    • memory/1268-768-0x00000000008A0000-0x00000000009EA000-memory.dmp

                      Filesize

                      1.3MB

                    • memory/1268-696-0x00000000008A0000-0x00000000009EA000-memory.dmp

                      Filesize

                      1.3MB

                    • memory/1268-700-0x00000000023F0000-0x000000000243B000-memory.dmp

                      Filesize

                      300KB

                    • memory/1268-721-0x00000000028D0000-0x0000000002914000-memory.dmp

                      Filesize

                      272KB

                    • memory/1268-710-0x0000000002690000-0x00000000026D6000-memory.dmp

                      Filesize

                      280KB

                    • memory/1432-779-0x0000000000E70000-0x0000000000E7A000-memory.dmp

                      Filesize

                      40KB

                    • memory/2796-151-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-130-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-157-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-159-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-160-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-158-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-162-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-161-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-163-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-164-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-165-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-121-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-122-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-123-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-124-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-125-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-155-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-126-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-128-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-154-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-127-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-129-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-156-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-148-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-131-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-132-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-133-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-134-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-135-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-136-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-137-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-138-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-153-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-152-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-150-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-120-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-139-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-149-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-147-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-141-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-140-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-143-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-142-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-144-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-145-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2796-146-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3808-179-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3808-178-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3808-168-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3808-170-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3808-171-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3808-172-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3808-169-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3808-175-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3808-173-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3808-177-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3808-180-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3808-181-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3808-176-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3808-184-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3808-182-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3808-185-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3808-183-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3808-186-0x0000000077570000-0x00000000776FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-332-0x0000000005800000-0x000000000583E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4556-334-0x0000000005980000-0x00000000059CB000-memory.dmp

                      Filesize

                      300KB

                    • memory/4556-314-0x0000000000F40000-0x0000000000F72000-memory.dmp

                      Filesize

                      200KB

                    • memory/4556-351-0x0000000006880000-0x00000000068D0000-memory.dmp

                      Filesize

                      320KB

                    • memory/4556-327-0x0000000005CF0000-0x00000000062F6000-memory.dmp

                      Filesize

                      6.0MB

                    • memory/4556-328-0x0000000005870000-0x000000000597A000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/4556-352-0x00000000070D0000-0x0000000007292000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/4556-330-0x00000000057A0000-0x00000000057B2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4556-353-0x00000000077D0000-0x0000000007CFC000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/4556-350-0x0000000006800000-0x0000000006876000-memory.dmp

                      Filesize

                      472KB

                    • memory/4556-339-0x0000000005B70000-0x0000000005BD6000-memory.dmp

                      Filesize

                      408KB

                    • memory/4556-347-0x0000000006A00000-0x0000000006EFE000-memory.dmp

                      Filesize

                      5.0MB

                    • memory/4556-348-0x00000000066E0000-0x0000000006772000-memory.dmp

                      Filesize

                      584KB