Analysis

  • max time kernel
    112s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/03/2023, 17:37

General

  • Target

    f7c4a5b390a8a6699d904c932e70882168b6e393d5781a0e5c7b184109b48690.exe

  • Size

    735KB

  • MD5

    bb94afb432d4dcf8cae0869c08468721

  • SHA1

    0dbd2abb1f0887c4f97bd6921209acbab6870aa2

  • SHA256

    f7c4a5b390a8a6699d904c932e70882168b6e393d5781a0e5c7b184109b48690

  • SHA512

    6f99073c4d6563e069805c49d0440f4e4b15e1c5c0ba352c0c63c7de2caf1f5c9e398ae8297390992f29d24ba5765046b57ae80b81ab8bc346f85327208ce0d1

  • SSDEEP

    12288:uMrUy904S7CypHH9x+8ZaDgcMUj10CqFXBWwWCj+Fr75VkBTzWlAu:myGGypHb+8ZAAkwWCjWUV2Au

Malware Config

Extracted

Family

redline

Botnet

stek

C2

melevv.eu:4162

Attributes
  • auth_value

    4205381daf6946b2df5fe3bc7eacc918

Extracted

Family

amadey

Version

3.67

C2

193.233.20.14/BR54nmB3/index.php

Extracted

Family

redline

Botnet

fomich

C2

melevv.eu:4162

Attributes
  • auth_value

    b018e52ac946001794d8b8c23e901859

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7c4a5b390a8a6699d904c932e70882168b6e393d5781a0e5c7b184109b48690.exe
    "C:\Users\Admin\AppData\Local\Temp\f7c4a5b390a8a6699d904c932e70882168b6e393d5781a0e5c7b184109b48690.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1556
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptYt9059Oj.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptYt9059Oj.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptmS8196DQ.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptmS8196DQ.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4220
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\beyr69gS21.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\beyr69gS21.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:312
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fr46OU2093MH.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fr46OU2093MH.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4852
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 2020
            5⤵
            • Program crash
            PID:3008
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk34Cw75uy17.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk34Cw75uy17.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3784
        • C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe
          "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3384
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:2532
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\465af4af92" /P "Admin:N"&&CACLS "..\465af4af92" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2924
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:5000
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "mnolyk.exe" /P "Admin:N"
                6⤵
                  PID:4816
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "mnolyk.exe" /P "Admin:R" /E
                  6⤵
                    PID:4788
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:3912
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\465af4af92" /P "Admin:N"
                      6⤵
                        PID:4820
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\465af4af92" /P "Admin:R" /E
                        6⤵
                          PID:2976
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:2668
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxGx59zM70.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxGx59zM70.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3228
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4852 -ip 4852
                1⤵
                  PID:956
                • C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe
                  C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe
                  1⤵
                  • Executes dropped EXE
                  PID:220
                • C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe
                  C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe
                  1⤵
                  • Executes dropped EXE
                  PID:4684

                Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe

                        Filesize

                        239KB

                        MD5

                        aeb230f4e6383e03ed7a5084db0021be

                        SHA1

                        29aeae7f978793fee989a35642e0dfce87adc04a

                        SHA256

                        e09b2820ea75ae0bcf98a9d15234fe2d44403ad38226646b992fa53b89d7f2e0

                        SHA512

                        6ce13f1c83700303cc7eb1fbbcd108e2098fad9fa1789bccec1ff1549e3bb0d26846dfbf4cbdb916632266889d472d4c087ea3d5339d1717feb55eed94e88399

                      • C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe

                        Filesize

                        239KB

                        MD5

                        aeb230f4e6383e03ed7a5084db0021be

                        SHA1

                        29aeae7f978793fee989a35642e0dfce87adc04a

                        SHA256

                        e09b2820ea75ae0bcf98a9d15234fe2d44403ad38226646b992fa53b89d7f2e0

                        SHA512

                        6ce13f1c83700303cc7eb1fbbcd108e2098fad9fa1789bccec1ff1549e3bb0d26846dfbf4cbdb916632266889d472d4c087ea3d5339d1717feb55eed94e88399

                      • C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe

                        Filesize

                        239KB

                        MD5

                        aeb230f4e6383e03ed7a5084db0021be

                        SHA1

                        29aeae7f978793fee989a35642e0dfce87adc04a

                        SHA256

                        e09b2820ea75ae0bcf98a9d15234fe2d44403ad38226646b992fa53b89d7f2e0

                        SHA512

                        6ce13f1c83700303cc7eb1fbbcd108e2098fad9fa1789bccec1ff1549e3bb0d26846dfbf4cbdb916632266889d472d4c087ea3d5339d1717feb55eed94e88399

                      • C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe

                        Filesize

                        239KB

                        MD5

                        aeb230f4e6383e03ed7a5084db0021be

                        SHA1

                        29aeae7f978793fee989a35642e0dfce87adc04a

                        SHA256

                        e09b2820ea75ae0bcf98a9d15234fe2d44403ad38226646b992fa53b89d7f2e0

                        SHA512

                        6ce13f1c83700303cc7eb1fbbcd108e2098fad9fa1789bccec1ff1549e3bb0d26846dfbf4cbdb916632266889d472d4c087ea3d5339d1717feb55eed94e88399

                      • C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe

                        Filesize

                        239KB

                        MD5

                        aeb230f4e6383e03ed7a5084db0021be

                        SHA1

                        29aeae7f978793fee989a35642e0dfce87adc04a

                        SHA256

                        e09b2820ea75ae0bcf98a9d15234fe2d44403ad38226646b992fa53b89d7f2e0

                        SHA512

                        6ce13f1c83700303cc7eb1fbbcd108e2098fad9fa1789bccec1ff1549e3bb0d26846dfbf4cbdb916632266889d472d4c087ea3d5339d1717feb55eed94e88399

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxGx59zM70.exe

                        Filesize

                        175KB

                        MD5

                        e2304e83888ea4cd3118c2806f45f261

                        SHA1

                        dcaf6887e30673a1acc0030f25b84daa1488a3f6

                        SHA256

                        e78f06e9b6b8975cb689b5c63bfc10eaa321b532c89d445b39d88583723c47f0

                        SHA512

                        dd9598ed949431b6799e99fa7f29b2e9c25c7a733be164a957cea478878454d8dc5af5d09e3b588aeaedbba49fb470a6fc21b3806590b9d45caab8f3234c1d4e

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxGx59zM70.exe

                        Filesize

                        175KB

                        MD5

                        e2304e83888ea4cd3118c2806f45f261

                        SHA1

                        dcaf6887e30673a1acc0030f25b84daa1488a3f6

                        SHA256

                        e78f06e9b6b8975cb689b5c63bfc10eaa321b532c89d445b39d88583723c47f0

                        SHA512

                        dd9598ed949431b6799e99fa7f29b2e9c25c7a733be164a957cea478878454d8dc5af5d09e3b588aeaedbba49fb470a6fc21b3806590b9d45caab8f3234c1d4e

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptYt9059Oj.exe

                        Filesize

                        589KB

                        MD5

                        a49ef1eab2a226adcfa2abccd3c566c7

                        SHA1

                        27c8c659424bbe44e32e78993e83384f5aa54313

                        SHA256

                        6960f17269a4ce71ee92c85e3ee0b3e1f00db6631eca6b4a35cc95ab0fae16ce

                        SHA512

                        5ead49a14b10ba989682cb2b6ace76eb408d7c3b070d3fd4595389165ab9e7a6283138e39934e8fbad68da60b40d8674a897987c80095b19b50a8e25e995a1a8

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptYt9059Oj.exe

                        Filesize

                        589KB

                        MD5

                        a49ef1eab2a226adcfa2abccd3c566c7

                        SHA1

                        27c8c659424bbe44e32e78993e83384f5aa54313

                        SHA256

                        6960f17269a4ce71ee92c85e3ee0b3e1f00db6631eca6b4a35cc95ab0fae16ce

                        SHA512

                        5ead49a14b10ba989682cb2b6ace76eb408d7c3b070d3fd4595389165ab9e7a6283138e39934e8fbad68da60b40d8674a897987c80095b19b50a8e25e995a1a8

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk34Cw75uy17.exe

                        Filesize

                        239KB

                        MD5

                        aeb230f4e6383e03ed7a5084db0021be

                        SHA1

                        29aeae7f978793fee989a35642e0dfce87adc04a

                        SHA256

                        e09b2820ea75ae0bcf98a9d15234fe2d44403ad38226646b992fa53b89d7f2e0

                        SHA512

                        6ce13f1c83700303cc7eb1fbbcd108e2098fad9fa1789bccec1ff1549e3bb0d26846dfbf4cbdb916632266889d472d4c087ea3d5339d1717feb55eed94e88399

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk34Cw75uy17.exe

                        Filesize

                        239KB

                        MD5

                        aeb230f4e6383e03ed7a5084db0021be

                        SHA1

                        29aeae7f978793fee989a35642e0dfce87adc04a

                        SHA256

                        e09b2820ea75ae0bcf98a9d15234fe2d44403ad38226646b992fa53b89d7f2e0

                        SHA512

                        6ce13f1c83700303cc7eb1fbbcd108e2098fad9fa1789bccec1ff1549e3bb0d26846dfbf4cbdb916632266889d472d4c087ea3d5339d1717feb55eed94e88399

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptmS8196DQ.exe

                        Filesize

                        401KB

                        MD5

                        00d00f67c1e8889ecbc07216f2a85abc

                        SHA1

                        564a7670e88bcf400e087fcc3e2c025f74744856

                        SHA256

                        84f0a6c2ae572799e1d17a4a6750d94720f4d20687985ef44e5f4cdffcc87627

                        SHA512

                        2e212209eea34a32dde7592ae75aac99b18dcf8d3049712cbcf14454062cefe62572843d1bb8e55617d2ba4efacb070f20a6f1c127ce2a63070e0ab902f13958

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptmS8196DQ.exe

                        Filesize

                        401KB

                        MD5

                        00d00f67c1e8889ecbc07216f2a85abc

                        SHA1

                        564a7670e88bcf400e087fcc3e2c025f74744856

                        SHA256

                        84f0a6c2ae572799e1d17a4a6750d94720f4d20687985ef44e5f4cdffcc87627

                        SHA512

                        2e212209eea34a32dde7592ae75aac99b18dcf8d3049712cbcf14454062cefe62572843d1bb8e55617d2ba4efacb070f20a6f1c127ce2a63070e0ab902f13958

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\beyr69gS21.exe

                        Filesize

                        13KB

                        MD5

                        a0e2a9a32dfe27c6eb89fef5ec1b96a9

                        SHA1

                        f6b2f54b3937aa661e539fa4201957f91f713d8a

                        SHA256

                        f18870d54b843152a5e921dc9e52a1c7e06c838e5698d9400fa82389a4f5cb0f

                        SHA512

                        2534e1e77439b5290f685b5084d2bd06c07228cf2e384c6b3d5a9a9d1007d1ff4401f06c980c5b833d87850ee617313d5d58b1882bf8da66beb75eff206a7aad

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\beyr69gS21.exe

                        Filesize

                        13KB

                        MD5

                        a0e2a9a32dfe27c6eb89fef5ec1b96a9

                        SHA1

                        f6b2f54b3937aa661e539fa4201957f91f713d8a

                        SHA256

                        f18870d54b843152a5e921dc9e52a1c7e06c838e5698d9400fa82389a4f5cb0f

                        SHA512

                        2534e1e77439b5290f685b5084d2bd06c07228cf2e384c6b3d5a9a9d1007d1ff4401f06c980c5b833d87850ee617313d5d58b1882bf8da66beb75eff206a7aad

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fr46OU2093MH.exe

                        Filesize

                        377KB

                        MD5

                        a9bb941524fc5973d45dad1da3e23d17

                        SHA1

                        357a2a768bbec255880067c4a774ca2d4bee0588

                        SHA256

                        e2e687091711d776f73e3877ee7020f8ed6472855af0db8ee6f5ea796fc34659

                        SHA512

                        4beab17e28078481420dfdf5425a6829695cdfdf50c1231c509654bdcaf21d6de21f12ee44b4cbe9c3b555bed3a91542b2dc37b25b2d093e03af9941723d9256

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fr46OU2093MH.exe

                        Filesize

                        377KB

                        MD5

                        a9bb941524fc5973d45dad1da3e23d17

                        SHA1

                        357a2a768bbec255880067c4a774ca2d4bee0588

                        SHA256

                        e2e687091711d776f73e3877ee7020f8ed6472855af0db8ee6f5ea796fc34659

                        SHA512

                        4beab17e28078481420dfdf5425a6829695cdfdf50c1231c509654bdcaf21d6de21f12ee44b4cbe9c3b555bed3a91542b2dc37b25b2d093e03af9941723d9256

                      • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                        Filesize

                        89KB

                        MD5

                        eff1ce4e3c7459a8061b91c5b55e0504

                        SHA1

                        b790e43dae923d673aadf9e11a4f904a4c44a3f4

                        SHA256

                        bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a

                        SHA512

                        d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78

                      • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                        Filesize

                        89KB

                        MD5

                        eff1ce4e3c7459a8061b91c5b55e0504

                        SHA1

                        b790e43dae923d673aadf9e11a4f904a4c44a3f4

                        SHA256

                        bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a

                        SHA512

                        d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78

                      • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                        Filesize

                        89KB

                        MD5

                        eff1ce4e3c7459a8061b91c5b55e0504

                        SHA1

                        b790e43dae923d673aadf9e11a4f904a4c44a3f4

                        SHA256

                        bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a

                        SHA512

                        d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78

                      • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                        Filesize

                        162B

                        MD5

                        1b7c22a214949975556626d7217e9a39

                        SHA1

                        d01c97e2944166ed23e47e4a62ff471ab8fa031f

                        SHA256

                        340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                        SHA512

                        ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                      • memory/312-154-0x0000000000560000-0x000000000056A000-memory.dmp

                        Filesize

                        40KB

                      • memory/3228-1105-0x0000000004E70000-0x0000000004E80000-memory.dmp

                        Filesize

                        64KB

                      • memory/3228-1104-0x00000000002C0000-0x00000000002F2000-memory.dmp

                        Filesize

                        200KB

                      • memory/4852-206-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-1072-0x0000000007F30000-0x000000000803A000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/4852-182-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-184-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-186-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-188-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-190-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-192-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-194-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-196-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-198-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-200-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-202-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-204-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-178-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-208-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-210-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-212-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-214-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-216-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-218-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-220-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-222-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-224-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-226-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-228-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-1071-0x0000000007910000-0x0000000007F28000-memory.dmp

                        Filesize

                        6.1MB

                      • memory/4852-180-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-1073-0x0000000004E90000-0x0000000004EA2000-memory.dmp

                        Filesize

                        72KB

                      • memory/4852-1074-0x0000000004EB0000-0x0000000004EEC000-memory.dmp

                        Filesize

                        240KB

                      • memory/4852-1075-0x0000000003000000-0x0000000003010000-memory.dmp

                        Filesize

                        64KB

                      • memory/4852-1077-0x0000000003000000-0x0000000003010000-memory.dmp

                        Filesize

                        64KB

                      • memory/4852-1078-0x0000000003000000-0x0000000003010000-memory.dmp

                        Filesize

                        64KB

                      • memory/4852-1079-0x0000000003000000-0x0000000003010000-memory.dmp

                        Filesize

                        64KB

                      • memory/4852-1080-0x00000000082D0000-0x0000000008336000-memory.dmp

                        Filesize

                        408KB

                      • memory/4852-1081-0x0000000008980000-0x0000000008A12000-memory.dmp

                        Filesize

                        584KB

                      • memory/4852-1082-0x0000000008B60000-0x0000000008BD6000-memory.dmp

                        Filesize

                        472KB

                      • memory/4852-1083-0x0000000008BF0000-0x0000000008C40000-memory.dmp

                        Filesize

                        320KB

                      • memory/4852-176-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-174-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-172-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-170-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-168-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-166-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-165-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4852-164-0x0000000007360000-0x0000000007904000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/4852-163-0x0000000003000000-0x0000000003010000-memory.dmp

                        Filesize

                        64KB

                      • memory/4852-162-0x0000000003000000-0x0000000003010000-memory.dmp

                        Filesize

                        64KB

                      • memory/4852-161-0x0000000003000000-0x0000000003010000-memory.dmp

                        Filesize

                        64KB

                      • memory/4852-160-0x0000000002D20000-0x0000000002D6B000-memory.dmp

                        Filesize

                        300KB

                      • memory/4852-1084-0x0000000008C70000-0x0000000008E32000-memory.dmp

                        Filesize

                        1.8MB

                      • memory/4852-1085-0x0000000008E80000-0x00000000093AC000-memory.dmp

                        Filesize

                        5.2MB

                      • memory/4852-1086-0x0000000003000000-0x0000000003010000-memory.dmp

                        Filesize

                        64KB