Analysis

  • max time kernel
    102s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-03-2023 21:44

General

  • Target

    6625f4de660a7e86377ebe96df50812e6edaa05ea4a0aab37ca78865869b5cd9.exe

  • Size

    892KB

  • MD5

    30ca1ced82ebd2fa9d8f46a3f71efa92

  • SHA1

    cc76edd5ae4f3021ae5f09872a7e92f0ca588ec9

  • SHA256

    6625f4de660a7e86377ebe96df50812e6edaa05ea4a0aab37ca78865869b5cd9

  • SHA512

    53ba02eea5ae2b1432d2d7f32578769dba0228edd603ed819a44b9fcd841d0b5cafa38f2d87885e31ef4b987a344f6c9cfd7231f5bcd6c9b20f41b737789bef6

  • SSDEEP

    24576:xyGVuB2QnW5eHHh3SAX57CdU6VVcfCsiM4H:kGcEC3SmAUpCsiM

Malware Config

Extracted

Family

redline

Botnet

ruzhpe

C2

pepunn.com:4162

Attributes
  • auth_value

    f735ced96ae8d01d0bd1d514240e54e0

Extracted

Family

amadey

Version

3.68

C2

193.233.20.25/buH5N004d/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6625f4de660a7e86377ebe96df50812e6edaa05ea4a0aab37ca78865869b5cd9.exe
    "C:\Users\Admin\AppData\Local\Temp\6625f4de660a7e86377ebe96df50812e6edaa05ea4a0aab37ca78865869b5cd9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptqR8286oJ.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptqR8286oJ.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptEn4168YU.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptEn4168YU.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3632
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bela07UW43.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bela07UW43.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1328
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1328 -s 1100
            5⤵
            • Program crash
            PID:2764
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ctfR83Ox71.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ctfR83Ox71.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1364
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk47Qx35Yi74.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk47Qx35Yi74.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5060
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 1388
          4⤵
          • Program crash
          PID:4408
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxPS91NR94.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxPS91NR94.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3320
      • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe
        "C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:724
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN ghaaer.exe /TR "C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:2940
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "ghaaer.exe" /P "Admin:N"&&CACLS "ghaaer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\46aee2aca4" /P "Admin:N"&&CACLS "..\46aee2aca4" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4216
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:5092
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "ghaaer.exe" /P "Admin:N"
              5⤵
                PID:1776
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "ghaaer.exe" /P "Admin:R" /E
                5⤵
                  PID:1528
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4316
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\46aee2aca4" /P "Admin:N"
                    5⤵
                      PID:4372
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\46aee2aca4" /P "Admin:R" /E
                      5⤵
                        PID:396
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:1720
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1328 -ip 1328
                1⤵
                  PID:2104
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5060 -ip 5060
                  1⤵
                    PID:3644
                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe
                    C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe
                    1⤵
                    • Executes dropped EXE
                    PID:1744

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe

                    Filesize

                    235KB

                    MD5

                    aac1ec2ba0c705c51bdef8d2216e0749

                    SHA1

                    d04776e0ca15e37b27084b09b5bca1e47b96239b

                    SHA256

                    8c8e7b70b25c312756632b83591e2df0da8ba0f2a1ba30f91f24995f66500bb3

                    SHA512

                    b5ede05e16fd3f0f963566d92557df526aa4d16ccb3c098236acb25867fc3616ff0978f2fec4b62cc667dae70c2c5a4688b1b5df071aed4366ac9429b13e8461

                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe

                    Filesize

                    235KB

                    MD5

                    aac1ec2ba0c705c51bdef8d2216e0749

                    SHA1

                    d04776e0ca15e37b27084b09b5bca1e47b96239b

                    SHA256

                    8c8e7b70b25c312756632b83591e2df0da8ba0f2a1ba30f91f24995f66500bb3

                    SHA512

                    b5ede05e16fd3f0f963566d92557df526aa4d16ccb3c098236acb25867fc3616ff0978f2fec4b62cc667dae70c2c5a4688b1b5df071aed4366ac9429b13e8461

                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe

                    Filesize

                    235KB

                    MD5

                    aac1ec2ba0c705c51bdef8d2216e0749

                    SHA1

                    d04776e0ca15e37b27084b09b5bca1e47b96239b

                    SHA256

                    8c8e7b70b25c312756632b83591e2df0da8ba0f2a1ba30f91f24995f66500bb3

                    SHA512

                    b5ede05e16fd3f0f963566d92557df526aa4d16ccb3c098236acb25867fc3616ff0978f2fec4b62cc667dae70c2c5a4688b1b5df071aed4366ac9429b13e8461

                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe

                    Filesize

                    235KB

                    MD5

                    aac1ec2ba0c705c51bdef8d2216e0749

                    SHA1

                    d04776e0ca15e37b27084b09b5bca1e47b96239b

                    SHA256

                    8c8e7b70b25c312756632b83591e2df0da8ba0f2a1ba30f91f24995f66500bb3

                    SHA512

                    b5ede05e16fd3f0f963566d92557df526aa4d16ccb3c098236acb25867fc3616ff0978f2fec4b62cc667dae70c2c5a4688b1b5df071aed4366ac9429b13e8461

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxPS91NR94.exe

                    Filesize

                    235KB

                    MD5

                    aac1ec2ba0c705c51bdef8d2216e0749

                    SHA1

                    d04776e0ca15e37b27084b09b5bca1e47b96239b

                    SHA256

                    8c8e7b70b25c312756632b83591e2df0da8ba0f2a1ba30f91f24995f66500bb3

                    SHA512

                    b5ede05e16fd3f0f963566d92557df526aa4d16ccb3c098236acb25867fc3616ff0978f2fec4b62cc667dae70c2c5a4688b1b5df071aed4366ac9429b13e8461

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxPS91NR94.exe

                    Filesize

                    235KB

                    MD5

                    aac1ec2ba0c705c51bdef8d2216e0749

                    SHA1

                    d04776e0ca15e37b27084b09b5bca1e47b96239b

                    SHA256

                    8c8e7b70b25c312756632b83591e2df0da8ba0f2a1ba30f91f24995f66500bb3

                    SHA512

                    b5ede05e16fd3f0f963566d92557df526aa4d16ccb3c098236acb25867fc3616ff0978f2fec4b62cc667dae70c2c5a4688b1b5df071aed4366ac9429b13e8461

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptqR8286oJ.exe

                    Filesize

                    705KB

                    MD5

                    87a47b797275a2d09259dc62788ec0cd

                    SHA1

                    008f2bf50acd508903ccd5a2f2d62bd21929b354

                    SHA256

                    0a338869fdac932b9c82db4c58084daa4788edbb9a01248c357364f2bf16663f

                    SHA512

                    7dc296c7e9acf5c827026d549465cd3be36860d98c6f5f54b3e26e6bc57b7e2acbc39811f5af10e28af400d83da2b7240c157995706b1d5a939dfb556bd60e60

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptqR8286oJ.exe

                    Filesize

                    705KB

                    MD5

                    87a47b797275a2d09259dc62788ec0cd

                    SHA1

                    008f2bf50acd508903ccd5a2f2d62bd21929b354

                    SHA256

                    0a338869fdac932b9c82db4c58084daa4788edbb9a01248c357364f2bf16663f

                    SHA512

                    7dc296c7e9acf5c827026d549465cd3be36860d98c6f5f54b3e26e6bc57b7e2acbc39811f5af10e28af400d83da2b7240c157995706b1d5a939dfb556bd60e60

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk47Qx35Yi74.exe

                    Filesize

                    409KB

                    MD5

                    67530ca401a21e9021983dd91b37c971

                    SHA1

                    059cc53f7d897b6e0b9072274cb964ab547489a9

                    SHA256

                    3b8cd7237a32fdb861ebd4c8243729f969a0355e4554832f73d8ab0ee3871b9a

                    SHA512

                    0b8f93e0d38b8bf6fab4adb7c1ecd05da3c354acd94e9f02c48ef8f822be328d6e2c558806e732a840178ec2d0c32daf718f372a6040403353565196ce231b78

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk47Qx35Yi74.exe

                    Filesize

                    409KB

                    MD5

                    67530ca401a21e9021983dd91b37c971

                    SHA1

                    059cc53f7d897b6e0b9072274cb964ab547489a9

                    SHA256

                    3b8cd7237a32fdb861ebd4c8243729f969a0355e4554832f73d8ab0ee3871b9a

                    SHA512

                    0b8f93e0d38b8bf6fab4adb7c1ecd05da3c354acd94e9f02c48ef8f822be328d6e2c558806e732a840178ec2d0c32daf718f372a6040403353565196ce231b78

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptEn4168YU.exe

                    Filesize

                    352KB

                    MD5

                    8b5052d4dbff01fbc774574b7b390325

                    SHA1

                    b80da4d63e09778d01a67e19da3062a463bd3f72

                    SHA256

                    528cd5ad7c8602e28c44ca3ea311c1e470527b960d0fee054ff3895078fa0e08

                    SHA512

                    18cef035eb2ee4eff31905bab21f9b3404d81c76296c6b6b29c91aacf5908f7a14d1069c26514bb6f26983df2bbc3095347f76140b379619a1dbe1178c7ff2e5

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptEn4168YU.exe

                    Filesize

                    352KB

                    MD5

                    8b5052d4dbff01fbc774574b7b390325

                    SHA1

                    b80da4d63e09778d01a67e19da3062a463bd3f72

                    SHA256

                    528cd5ad7c8602e28c44ca3ea311c1e470527b960d0fee054ff3895078fa0e08

                    SHA512

                    18cef035eb2ee4eff31905bab21f9b3404d81c76296c6b6b29c91aacf5908f7a14d1069c26514bb6f26983df2bbc3095347f76140b379619a1dbe1178c7ff2e5

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bela07UW43.exe

                    Filesize

                    350KB

                    MD5

                    e51e74d094b076776b0169ed1a54d0a3

                    SHA1

                    0e6f8f2fc33bed2e1d0768ae674e0e4b182085b2

                    SHA256

                    6e25bad8749aa05160afd2dfe3a01906f424ca495518c70cebc2d3ef5930521b

                    SHA512

                    d04434571bf1c971c350fb13e54b4a6d6bc96b1443a45ba2a0124c5d903f0f17287fd8ea54c94e1d06ec302242275900819807559318f16fac28c6f6e6a3ff5f

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bela07UW43.exe

                    Filesize

                    350KB

                    MD5

                    e51e74d094b076776b0169ed1a54d0a3

                    SHA1

                    0e6f8f2fc33bed2e1d0768ae674e0e4b182085b2

                    SHA256

                    6e25bad8749aa05160afd2dfe3a01906f424ca495518c70cebc2d3ef5930521b

                    SHA512

                    d04434571bf1c971c350fb13e54b4a6d6bc96b1443a45ba2a0124c5d903f0f17287fd8ea54c94e1d06ec302242275900819807559318f16fac28c6f6e6a3ff5f

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ctfR83Ox71.exe

                    Filesize

                    12KB

                    MD5

                    caa0160bf43f81aa5145351a8536367d

                    SHA1

                    db3c0aa7ab36c205f0c693db28df912a217e0d91

                    SHA256

                    de6ee9d83adf0951ecdac54ea1ac89316729632b06b8d2e8cb972388d73bd4ce

                    SHA512

                    6220e50ed4c45efe1338ac0e636427dda89eb334db5809cea3f21fc263871d2c9d5daad6f4c13364d1b935ec38f090e53e670b9eda32394a88bc8f600a98d4f5

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ctfR83Ox71.exe

                    Filesize

                    12KB

                    MD5

                    caa0160bf43f81aa5145351a8536367d

                    SHA1

                    db3c0aa7ab36c205f0c693db28df912a217e0d91

                    SHA256

                    de6ee9d83adf0951ecdac54ea1ac89316729632b06b8d2e8cb972388d73bd4ce

                    SHA512

                    6220e50ed4c45efe1338ac0e636427dda89eb334db5809cea3f21fc263871d2c9d5daad6f4c13364d1b935ec38f090e53e670b9eda32394a88bc8f600a98d4f5

                  • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                    Filesize

                    89KB

                    MD5

                    29b9780bb2992d018ae312ed4180a663

                    SHA1

                    592a993f9518c1ceab3186a8b5007826fa204b60

                    SHA256

                    b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a

                    SHA512

                    988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d

                  • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                    Filesize

                    89KB

                    MD5

                    29b9780bb2992d018ae312ed4180a663

                    SHA1

                    592a993f9518c1ceab3186a8b5007826fa204b60

                    SHA256

                    b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a

                    SHA512

                    988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d

                  • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                    Filesize

                    89KB

                    MD5

                    29b9780bb2992d018ae312ed4180a663

                    SHA1

                    592a993f9518c1ceab3186a8b5007826fa204b60

                    SHA256

                    b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a

                    SHA512

                    988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d

                  • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                    Filesize

                    162B

                    MD5

                    1b7c22a214949975556626d7217e9a39

                    SHA1

                    d01c97e2944166ed23e47e4a62ff471ab8fa031f

                    SHA256

                    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                    SHA512

                    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                  • memory/1328-173-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1328-190-0x00000000073E0000-0x00000000073F0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1328-171-0x00000000073E0000-0x00000000073F0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1328-166-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1328-175-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1328-177-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1328-179-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1328-181-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1328-183-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1328-185-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1328-187-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1328-188-0x0000000000400000-0x0000000002BC5000-memory.dmp

                    Filesize

                    39.8MB

                  • memory/1328-189-0x00000000073E0000-0x00000000073F0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1328-170-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1328-192-0x00000000073E0000-0x00000000073F0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1328-193-0x0000000000400000-0x0000000002BC5000-memory.dmp

                    Filesize

                    39.8MB

                  • memory/1328-155-0x0000000002CA0000-0x0000000002CCD000-memory.dmp

                    Filesize

                    180KB

                  • memory/1328-167-0x00000000073E0000-0x00000000073F0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1328-169-0x00000000073E0000-0x00000000073F0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1328-164-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1328-162-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1328-160-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1328-158-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1328-157-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1328-156-0x00000000073F0000-0x0000000007994000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/1364-197-0x00000000005F0000-0x00000000005FA000-memory.dmp

                    Filesize

                    40KB

                  • memory/5060-208-0x0000000007180000-0x00000000071BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/5060-222-0x0000000007180000-0x00000000071BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/5060-224-0x0000000007180000-0x00000000071BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/5060-226-0x0000000007180000-0x00000000071BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/5060-228-0x0000000007180000-0x00000000071BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/5060-230-0x0000000007180000-0x00000000071BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/5060-232-0x0000000007180000-0x00000000071BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/5060-234-0x0000000007180000-0x00000000071BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/5060-236-0x0000000007180000-0x00000000071BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/5060-328-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5060-326-0x0000000002D00000-0x0000000002D4B000-memory.dmp

                    Filesize

                    300KB

                  • memory/5060-329-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5060-1112-0x0000000007950000-0x0000000007F68000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/5060-1113-0x0000000007FC0000-0x00000000080CA000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/5060-1114-0x0000000008100000-0x0000000008112000-memory.dmp

                    Filesize

                    72KB

                  • memory/5060-1115-0x0000000008120000-0x000000000815C000-memory.dmp

                    Filesize

                    240KB

                  • memory/5060-1116-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5060-1117-0x0000000008420000-0x0000000008486000-memory.dmp

                    Filesize

                    408KB

                  • memory/5060-1118-0x0000000008AD0000-0x0000000008B62000-memory.dmp

                    Filesize

                    584KB

                  • memory/5060-1120-0x0000000008CB0000-0x0000000008D26000-memory.dmp

                    Filesize

                    472KB

                  • memory/5060-1121-0x0000000008D40000-0x0000000008D90000-memory.dmp

                    Filesize

                    320KB

                  • memory/5060-1122-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5060-1123-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5060-1124-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5060-1125-0x0000000008DC0000-0x0000000008F82000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/5060-1126-0x0000000008FD0000-0x00000000094FC000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/5060-220-0x0000000007180000-0x00000000071BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/5060-218-0x0000000007180000-0x00000000071BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/5060-216-0x0000000007180000-0x00000000071BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/5060-214-0x0000000007180000-0x00000000071BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/5060-212-0x0000000007180000-0x00000000071BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/5060-210-0x0000000007180000-0x00000000071BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/5060-206-0x0000000007180000-0x00000000071BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/5060-204-0x0000000007180000-0x00000000071BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/5060-203-0x0000000007180000-0x00000000071BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/5060-1127-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB