Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16/02/2023, 00:19

General

  • Target

    fbffeb32d22f299ea0acb0c965f03adf2ba382f6688d7a9aa7a228d0cbec59d9.exe

  • Size

    724KB

  • MD5

    9fd95dee50a152083afe8952eec91672

  • SHA1

    4393083222f1f3ce8f489b287fdb172aa427c93f

  • SHA256

    fbffeb32d22f299ea0acb0c965f03adf2ba382f6688d7a9aa7a228d0cbec59d9

  • SHA512

    a5947ff2bcd1dc2167fde0bb92e43bd753a401403ad1aa804fc3892d2fc99d62e5bd53a4e8433f0d10607af977907a4ddb8f6544240c8972dccaa98ff9fabea7

  • SSDEEP

    12288:+Mrcy90fr7pnOUIGnkBbLUhK0mKflt6FjLQHG6khAZWGycAdNy:6yI7pwG0X4K0mQ25V6khAZdyXy

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Extracted

Family

redline

Botnet

ruma

C2

193.233.20.13:4136

Attributes
  • auth_value

    647d00dfaba082a4a30f383bca5d1a2a

Extracted

Family

amadey

Version

3.66

C2

193.233.20.4/t6r48nSa/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbffeb32d22f299ea0acb0c965f03adf2ba382f6688d7a9aa7a228d0cbec59d9.exe
    "C:\Users\Admin\AppData\Local\Temp\fbffeb32d22f299ea0acb0c965f03adf2ba382f6688d7a9aa7a228d0cbec59d9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4556
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sXB21hh.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sXB21hh.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3448
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\smQ94fV.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\smQ94fV.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3304
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fjY24LW.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fjY24LW.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5048
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hpw00GW.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hpw00GW.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3984
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kKY41rs.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kKY41rs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4596
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nnc91wK.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nnc91wK.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe
        "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3804
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:1836
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4956
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3976
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "mnolyk.exe" /P "Admin:N"
              5⤵
                PID:3064
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "mnolyk.exe" /P "Admin:R" /E
                5⤵
                  PID:2880
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4728
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5eb6b96734" /P "Admin:N"
                    5⤵
                      PID:4696
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5eb6b96734" /P "Admin:R" /E
                      5⤵
                        PID:4760
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:1516
              • C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe
                C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe
                1⤵
                • Executes dropped EXE
                PID:416
              • C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe
                C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe
                1⤵
                • Executes dropped EXE
                PID:2200

              Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe

                      Filesize

                      236KB

                      MD5

                      812b8d76e0cf1e825bbfcf787ebdd902

                      SHA1

                      9f981c60bb4195657340519e13f1422e5cc8967b

                      SHA256

                      6513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34

                      SHA512

                      9a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7

                    • C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe

                      Filesize

                      236KB

                      MD5

                      812b8d76e0cf1e825bbfcf787ebdd902

                      SHA1

                      9f981c60bb4195657340519e13f1422e5cc8967b

                      SHA256

                      6513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34

                      SHA512

                      9a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7

                    • C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe

                      Filesize

                      236KB

                      MD5

                      812b8d76e0cf1e825bbfcf787ebdd902

                      SHA1

                      9f981c60bb4195657340519e13f1422e5cc8967b

                      SHA256

                      6513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34

                      SHA512

                      9a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7

                    • C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe

                      Filesize

                      236KB

                      MD5

                      812b8d76e0cf1e825bbfcf787ebdd902

                      SHA1

                      9f981c60bb4195657340519e13f1422e5cc8967b

                      SHA256

                      6513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34

                      SHA512

                      9a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nnc91wK.exe

                      Filesize

                      236KB

                      MD5

                      812b8d76e0cf1e825bbfcf787ebdd902

                      SHA1

                      9f981c60bb4195657340519e13f1422e5cc8967b

                      SHA256

                      6513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34

                      SHA512

                      9a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nnc91wK.exe

                      Filesize

                      236KB

                      MD5

                      812b8d76e0cf1e825bbfcf787ebdd902

                      SHA1

                      9f981c60bb4195657340519e13f1422e5cc8967b

                      SHA256

                      6513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34

                      SHA512

                      9a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sXB21hh.exe

                      Filesize

                      538KB

                      MD5

                      a1e8dd333951840b96e5b8eee17db2bf

                      SHA1

                      873549a1cbf1e23c4954285be2cf180ea296922b

                      SHA256

                      0bbfa55b656b9eba591a795b035c39f2af2694a3bf09668f6c02a0117d935f49

                      SHA512

                      f724a0caa617eae3598da8e4b990294dd4d7a6c860d4993a879c739c3bb718057500c097c98ae1e29ac021d6a136c42e7cad9e7f2d56b1bcfab384d66d35a84e

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sXB21hh.exe

                      Filesize

                      538KB

                      MD5

                      a1e8dd333951840b96e5b8eee17db2bf

                      SHA1

                      873549a1cbf1e23c4954285be2cf180ea296922b

                      SHA256

                      0bbfa55b656b9eba591a795b035c39f2af2694a3bf09668f6c02a0117d935f49

                      SHA512

                      f724a0caa617eae3598da8e4b990294dd4d7a6c860d4993a879c739c3bb718057500c097c98ae1e29ac021d6a136c42e7cad9e7f2d56b1bcfab384d66d35a84e

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kKY41rs.exe

                      Filesize

                      314KB

                      MD5

                      aa47043dbfecab249a25a28c75508b14

                      SHA1

                      4be399fdc0bf61e57d3dfec38d5b5f9cbd88f7d5

                      SHA256

                      26545390a512163f85092f23ba83f9db640ebf342e31deccee46ad2b16f5a54b

                      SHA512

                      027e897a55cdb70d4c4c300fc554c15b801669062de5b66ecd0682dd8ce55aa4d2894042d9d6f084aa90574b7b3f2551c4563a6800e43f07bc11620a6a38de16

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kKY41rs.exe

                      Filesize

                      314KB

                      MD5

                      aa47043dbfecab249a25a28c75508b14

                      SHA1

                      4be399fdc0bf61e57d3dfec38d5b5f9cbd88f7d5

                      SHA256

                      26545390a512163f85092f23ba83f9db640ebf342e31deccee46ad2b16f5a54b

                      SHA512

                      027e897a55cdb70d4c4c300fc554c15b801669062de5b66ecd0682dd8ce55aa4d2894042d9d6f084aa90574b7b3f2551c4563a6800e43f07bc11620a6a38de16

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\smQ94fV.exe

                      Filesize

                      202KB

                      MD5

                      bdec340ce9f49b3ab254cf3de2c57a18

                      SHA1

                      5fc2ca8d411fb7429662259da69e70f893346dc2

                      SHA256

                      c9161b4f1fdd5225dcac57f6ed50aebf14481bf3d4b63929666d6a277aa26bb3

                      SHA512

                      122ebd39829be2ca426ce2d73fa854d345179dc1590ff7b04be1fcdc815281fec679c94890988be1fae43963d6fccb783751b75df0401c9501fcbedf98c511dd

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\smQ94fV.exe

                      Filesize

                      202KB

                      MD5

                      bdec340ce9f49b3ab254cf3de2c57a18

                      SHA1

                      5fc2ca8d411fb7429662259da69e70f893346dc2

                      SHA256

                      c9161b4f1fdd5225dcac57f6ed50aebf14481bf3d4b63929666d6a277aa26bb3

                      SHA512

                      122ebd39829be2ca426ce2d73fa854d345179dc1590ff7b04be1fcdc815281fec679c94890988be1fae43963d6fccb783751b75df0401c9501fcbedf98c511dd

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fjY24LW.exe

                      Filesize

                      11KB

                      MD5

                      7e93bacbbc33e6652e147e7fe07572a0

                      SHA1

                      421a7167da01c8da4dc4d5234ca3dd84e319e762

                      SHA256

                      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                      SHA512

                      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fjY24LW.exe

                      Filesize

                      11KB

                      MD5

                      7e93bacbbc33e6652e147e7fe07572a0

                      SHA1

                      421a7167da01c8da4dc4d5234ca3dd84e319e762

                      SHA256

                      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                      SHA512

                      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hpw00GW.exe

                      Filesize

                      175KB

                      MD5

                      a5f5c5d6291c7ae9e1d1b7ed1e551490

                      SHA1

                      3d06413341893b838549939e15f8f1eec423d71a

                      SHA256

                      1a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e

                      SHA512

                      d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hpw00GW.exe

                      Filesize

                      175KB

                      MD5

                      a5f5c5d6291c7ae9e1d1b7ed1e551490

                      SHA1

                      3d06413341893b838549939e15f8f1eec423d71a

                      SHA256

                      1a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e

                      SHA512

                      d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      4cf63b9a3e4bc0910af4d8baa5939238

                      SHA1

                      361eea9bb65071ebf09d9598fe7a482e487b919f

                      SHA256

                      dd82c0954f9047eb2a601aefa58eec94c79f71cab58f980a663ae3b8a54a63f9

                      SHA512

                      177f101609bbdb7a3e423ecb2914b21d3fb91bf1e6267c4a30313b8ae0b5bc49659fc6ce1f1715649b8ee774022a9b045d886f2ba658ef065eefceedeaf7ee38

                    • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      4cf63b9a3e4bc0910af4d8baa5939238

                      SHA1

                      361eea9bb65071ebf09d9598fe7a482e487b919f

                      SHA256

                      dd82c0954f9047eb2a601aefa58eec94c79f71cab58f980a663ae3b8a54a63f9

                      SHA512

                      177f101609bbdb7a3e423ecb2914b21d3fb91bf1e6267c4a30313b8ae0b5bc49659fc6ce1f1715649b8ee774022a9b045d886f2ba658ef065eefceedeaf7ee38

                    • memory/3448-170-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3448-180-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3448-167-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3448-168-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3448-165-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3448-166-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3448-178-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3448-179-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3448-182-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3448-183-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3448-181-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3448-177-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3448-174-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3448-176-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3448-175-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3448-173-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3448-172-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3448-169-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3984-357-0x0000000006EA0000-0x0000000006EF0000-memory.dmp

                      Filesize

                      320KB

                    • memory/3984-356-0x00000000068F0000-0x0000000006966000-memory.dmp

                      Filesize

                      472KB

                    • memory/3984-352-0x0000000007770000-0x0000000007C9C000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/3984-351-0x0000000007070000-0x0000000007232000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/3984-349-0x0000000006590000-0x0000000006622000-memory.dmp

                      Filesize

                      584KB

                    • memory/3984-348-0x00000000069A0000-0x0000000006E9E000-memory.dmp

                      Filesize

                      5.0MB

                    • memory/3984-340-0x00000000059D0000-0x0000000005A36000-memory.dmp

                      Filesize

                      408KB

                    • memory/3984-335-0x0000000005830000-0x000000000587B000-memory.dmp

                      Filesize

                      300KB

                    • memory/3984-333-0x00000000056B0000-0x00000000056EE000-memory.dmp

                      Filesize

                      248KB

                    • memory/3984-331-0x0000000005650000-0x0000000005662000-memory.dmp

                      Filesize

                      72KB

                    • memory/3984-329-0x0000000005720000-0x000000000582A000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/3984-328-0x0000000005B90000-0x0000000006196000-memory.dmp

                      Filesize

                      6.0MB

                    • memory/3984-315-0x0000000000DF0000-0x0000000000E22000-memory.dmp

                      Filesize

                      200KB

                    • memory/4556-143-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-134-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-147-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-146-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-144-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-161-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-142-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-162-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-141-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-140-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-139-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-138-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-137-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-119-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-118-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-151-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-136-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-135-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-149-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-148-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-145-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-152-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-154-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-153-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-155-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-156-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-157-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-158-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-159-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-160-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-117-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-150-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-120-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-133-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-121-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-122-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-123-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-124-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-125-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-127-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-126-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-129-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-132-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-131-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-128-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4556-130-0x0000000077450000-0x00000000775DE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4596-419-0x0000000002430000-0x0000000002476000-memory.dmp

                      Filesize

                      280KB

                    • memory/4596-455-0x0000000000630000-0x000000000077A000-memory.dmp

                      Filesize

                      1.3MB

                    • memory/4596-441-0x00000000053D0000-0x000000000541B000-memory.dmp

                      Filesize

                      300KB

                    • memory/4596-438-0x0000000000400000-0x0000000000583000-memory.dmp

                      Filesize

                      1.5MB

                    • memory/4596-435-0x0000000000630000-0x000000000077A000-memory.dmp

                      Filesize

                      1.3MB

                    • memory/4596-436-0x00000000005D0000-0x000000000061B000-memory.dmp

                      Filesize

                      300KB

                    • memory/4596-460-0x0000000000400000-0x0000000000583000-memory.dmp

                      Filesize

                      1.5MB

                    • memory/4596-424-0x0000000005010000-0x0000000005054000-memory.dmp

                      Filesize

                      272KB

                    • memory/5048-264-0x0000000000B30000-0x0000000000B3A000-memory.dmp

                      Filesize

                      40KB