Analysis

  • max time kernel
    99s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/03/2023, 07:59

General

  • Target

    f49cea1f3024ecd4bb9a0cca560dcd0151bd79033dc2a30687aac5cadb08cd28.exe

  • Size

    857KB

  • MD5

    09accbeebf4a20087c4ec024cb68e8bd

  • SHA1

    68a6676040859037e0ccbd6ebd110ae7b39b7202

  • SHA256

    f49cea1f3024ecd4bb9a0cca560dcd0151bd79033dc2a30687aac5cadb08cd28

  • SHA512

    fde9e13c7aed218cccb77d50d95c474ed07bef9d798aa71168bdde2142ea8628959851553e9db1398ab71d5d13d5c2874b46ef15753d05dab66b7e1479e30125

  • SSDEEP

    12288:0Mr9y90ueFd552b6Nz8cUDHXz385k41uhvRhzygCWR7XgsAfOZ3upvyubdgeLS:xy6T55k6ac6z385khPV7r5Z30aCve

Malware Config

Extracted

Family

redline

Botnet

ruzhpe

C2

pepunn.com:4162

Attributes
  • auth_value

    f735ced96ae8d01d0bd1d514240e54e0

Extracted

Family

amadey

Version

3.68

C2

193.233.20.25/buH5N004d/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f49cea1f3024ecd4bb9a0cca560dcd0151bd79033dc2a30687aac5cadb08cd28.exe
    "C:\Users\Admin\AppData\Local\Temp\f49cea1f3024ecd4bb9a0cca560dcd0151bd79033dc2a30687aac5cadb08cd28.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptIx3320oK.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptIx3320oK.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3636
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptzE2222Pp.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptzE2222Pp.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2384
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\betn89aQ03.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\betn89aQ03.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5100
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 1084
            5⤵
            • Program crash
            PID:4544
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ctLj17qF32.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ctLj17qF32.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:632
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk73Dg70pQ19.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk73Dg70pQ19.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5116
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 1396
          4⤵
          • Program crash
          PID:1824
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxuR18tj88.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxuR18tj88.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2248
      • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe
        "C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3740
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN ghaaer.exe /TR "C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4132
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "ghaaer.exe" /P "Admin:N"&&CACLS "ghaaer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\46aee2aca4" /P "Admin:N"&&CACLS "..\46aee2aca4" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:392
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:2552
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "ghaaer.exe" /P "Admin:N"
              5⤵
                PID:2752
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "ghaaer.exe" /P "Admin:R" /E
                5⤵
                  PID:1684
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:3992
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\46aee2aca4" /P "Admin:N"
                    5⤵
                      PID:1284
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\46aee2aca4" /P "Admin:R" /E
                      5⤵
                        PID:2276
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:4844
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5100 -ip 5100
                1⤵
                  PID:3116
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 5116 -ip 5116
                  1⤵
                    PID:2064
                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe
                    C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe
                    1⤵
                    • Executes dropped EXE
                    PID:3676

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe

                    Filesize

                    235KB

                    MD5

                    46cdcdd04723a8a85a2e4e62a7cac2e6

                    SHA1

                    1406f6e846c7e1287801fe70ab63d4051cc39985

                    SHA256

                    bc18ff54bade33347c5ac1995657f434ff31149997ca0b36fbc626f90819c553

                    SHA512

                    cf7e6417682760d34fc1b1a1951d87e61e6c9cb14352f08c1475a495d7bd171319f3b524ea70f01e979cd7fa5785ad185f2498ea910b7bd9f4476684745f35b9

                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe

                    Filesize

                    235KB

                    MD5

                    46cdcdd04723a8a85a2e4e62a7cac2e6

                    SHA1

                    1406f6e846c7e1287801fe70ab63d4051cc39985

                    SHA256

                    bc18ff54bade33347c5ac1995657f434ff31149997ca0b36fbc626f90819c553

                    SHA512

                    cf7e6417682760d34fc1b1a1951d87e61e6c9cb14352f08c1475a495d7bd171319f3b524ea70f01e979cd7fa5785ad185f2498ea910b7bd9f4476684745f35b9

                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe

                    Filesize

                    235KB

                    MD5

                    46cdcdd04723a8a85a2e4e62a7cac2e6

                    SHA1

                    1406f6e846c7e1287801fe70ab63d4051cc39985

                    SHA256

                    bc18ff54bade33347c5ac1995657f434ff31149997ca0b36fbc626f90819c553

                    SHA512

                    cf7e6417682760d34fc1b1a1951d87e61e6c9cb14352f08c1475a495d7bd171319f3b524ea70f01e979cd7fa5785ad185f2498ea910b7bd9f4476684745f35b9

                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe

                    Filesize

                    235KB

                    MD5

                    46cdcdd04723a8a85a2e4e62a7cac2e6

                    SHA1

                    1406f6e846c7e1287801fe70ab63d4051cc39985

                    SHA256

                    bc18ff54bade33347c5ac1995657f434ff31149997ca0b36fbc626f90819c553

                    SHA512

                    cf7e6417682760d34fc1b1a1951d87e61e6c9cb14352f08c1475a495d7bd171319f3b524ea70f01e979cd7fa5785ad185f2498ea910b7bd9f4476684745f35b9

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxuR18tj88.exe

                    Filesize

                    235KB

                    MD5

                    46cdcdd04723a8a85a2e4e62a7cac2e6

                    SHA1

                    1406f6e846c7e1287801fe70ab63d4051cc39985

                    SHA256

                    bc18ff54bade33347c5ac1995657f434ff31149997ca0b36fbc626f90819c553

                    SHA512

                    cf7e6417682760d34fc1b1a1951d87e61e6c9cb14352f08c1475a495d7bd171319f3b524ea70f01e979cd7fa5785ad185f2498ea910b7bd9f4476684745f35b9

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxuR18tj88.exe

                    Filesize

                    235KB

                    MD5

                    46cdcdd04723a8a85a2e4e62a7cac2e6

                    SHA1

                    1406f6e846c7e1287801fe70ab63d4051cc39985

                    SHA256

                    bc18ff54bade33347c5ac1995657f434ff31149997ca0b36fbc626f90819c553

                    SHA512

                    cf7e6417682760d34fc1b1a1951d87e61e6c9cb14352f08c1475a495d7bd171319f3b524ea70f01e979cd7fa5785ad185f2498ea910b7bd9f4476684745f35b9

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptIx3320oK.exe

                    Filesize

                    670KB

                    MD5

                    7def25b9961c7273ea1c8f2e2472c647

                    SHA1

                    efb08ec3fd27cbbea75d873dc7d8b969bb238ada

                    SHA256

                    5814ba7e1fd04ca79d24d874fff7672754ab86429091a329467e2679aaf98b68

                    SHA512

                    ff138fddf56677e0dfdd77fb193bac02ed34d526b1ae727b43d0d08a98a70303159b13d3b44dd801b86d9834ea92172bf69aa460ddf80b2c6adaa9de11eb1dcb

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptIx3320oK.exe

                    Filesize

                    670KB

                    MD5

                    7def25b9961c7273ea1c8f2e2472c647

                    SHA1

                    efb08ec3fd27cbbea75d873dc7d8b969bb238ada

                    SHA256

                    5814ba7e1fd04ca79d24d874fff7672754ab86429091a329467e2679aaf98b68

                    SHA512

                    ff138fddf56677e0dfdd77fb193bac02ed34d526b1ae727b43d0d08a98a70303159b13d3b44dd801b86d9834ea92172bf69aa460ddf80b2c6adaa9de11eb1dcb

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk73Dg70pQ19.exe

                    Filesize

                    309KB

                    MD5

                    284f5cacca006d191a474f8c3eada4c1

                    SHA1

                    05ccc7b3be213f8543b80cd95e4cbd1aac6190dd

                    SHA256

                    52e7f367705bf1ad2aed8f9ac8dde3a1c3cd7fc0bd64ae3a3d5a44be416c1341

                    SHA512

                    26887be6f3f12322ca653e2ba5ee592d5dba31c09312c27d5d29b1d9832f84e42f19a4588787894792d26068dc029ab6abca08a02cc2651e3c8dfe75c41fe4ee

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk73Dg70pQ19.exe

                    Filesize

                    309KB

                    MD5

                    284f5cacca006d191a474f8c3eada4c1

                    SHA1

                    05ccc7b3be213f8543b80cd95e4cbd1aac6190dd

                    SHA256

                    52e7f367705bf1ad2aed8f9ac8dde3a1c3cd7fc0bd64ae3a3d5a44be416c1341

                    SHA512

                    26887be6f3f12322ca653e2ba5ee592d5dba31c09312c27d5d29b1d9832f84e42f19a4588787894792d26068dc029ab6abca08a02cc2651e3c8dfe75c41fe4ee

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptzE2222Pp.exe

                    Filesize

                    335KB

                    MD5

                    bf1a7ae97f3c64ff6540d17a3deb00b9

                    SHA1

                    f3c885dce2c22958658a5a1e4701f09ab3bfe611

                    SHA256

                    9feeb90863cd2434826d9bc3818197a34200e895fcf05ba18f2660896bfaa6e6

                    SHA512

                    88662e1675a94613c7aa8105add48198b52f429dc30f41ce26fd411a5c4263a9acd922fcca6ca7a713d2de80446b5781720e8c4b1565bd03fe6dfb3fcd2d14c2

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptzE2222Pp.exe

                    Filesize

                    335KB

                    MD5

                    bf1a7ae97f3c64ff6540d17a3deb00b9

                    SHA1

                    f3c885dce2c22958658a5a1e4701f09ab3bfe611

                    SHA256

                    9feeb90863cd2434826d9bc3818197a34200e895fcf05ba18f2660896bfaa6e6

                    SHA512

                    88662e1675a94613c7aa8105add48198b52f429dc30f41ce26fd411a5c4263a9acd922fcca6ca7a713d2de80446b5781720e8c4b1565bd03fe6dfb3fcd2d14c2

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\betn89aQ03.exe

                    Filesize

                    250KB

                    MD5

                    452980bfe4732aaef2162c53c88f7ea4

                    SHA1

                    31b4e28e7ffdf36023ea859f0c343036dfb0470e

                    SHA256

                    855df086e7969ec6904fde9c5920ab3c6c364ebbc240aa266f78a3103b59d06d

                    SHA512

                    7ad12f0badc78bb1d42743e8776bece49a55e25244a9b7681c17c345f212bd2d28077e7fe495903de160d43aa7b3d57a419f0895ae3420a3b945d830d1d58707

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\betn89aQ03.exe

                    Filesize

                    250KB

                    MD5

                    452980bfe4732aaef2162c53c88f7ea4

                    SHA1

                    31b4e28e7ffdf36023ea859f0c343036dfb0470e

                    SHA256

                    855df086e7969ec6904fde9c5920ab3c6c364ebbc240aa266f78a3103b59d06d

                    SHA512

                    7ad12f0badc78bb1d42743e8776bece49a55e25244a9b7681c17c345f212bd2d28077e7fe495903de160d43aa7b3d57a419f0895ae3420a3b945d830d1d58707

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ctLj17qF32.exe

                    Filesize

                    13KB

                    MD5

                    c9999b62d0ab17f00d173e9d70ffbe0b

                    SHA1

                    4cb7d0d4b2915adbdbac2bee31e80403848e9507

                    SHA256

                    5a1b787054f93033e62c996cfcb9b84e318a482bcf4b79a95787f517ab21f2e5

                    SHA512

                    3639ff4eea7bb4d629ec2a42dd9b32d0dd68244d96982191c6de41d885d75bb59930ba4d4ccaddfab033abc332f700dc8398363393ba26a0faa0789d3c93bb97

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ctLj17qF32.exe

                    Filesize

                    13KB

                    MD5

                    c9999b62d0ab17f00d173e9d70ffbe0b

                    SHA1

                    4cb7d0d4b2915adbdbac2bee31e80403848e9507

                    SHA256

                    5a1b787054f93033e62c996cfcb9b84e318a482bcf4b79a95787f517ab21f2e5

                    SHA512

                    3639ff4eea7bb4d629ec2a42dd9b32d0dd68244d96982191c6de41d885d75bb59930ba4d4ccaddfab033abc332f700dc8398363393ba26a0faa0789d3c93bb97

                  • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                    Filesize

                    89KB

                    MD5

                    29b9780bb2992d018ae312ed4180a663

                    SHA1

                    592a993f9518c1ceab3186a8b5007826fa204b60

                    SHA256

                    b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a

                    SHA512

                    988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d

                  • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                    Filesize

                    89KB

                    MD5

                    29b9780bb2992d018ae312ed4180a663

                    SHA1

                    592a993f9518c1ceab3186a8b5007826fa204b60

                    SHA256

                    b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a

                    SHA512

                    988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d

                  • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                    Filesize

                    89KB

                    MD5

                    29b9780bb2992d018ae312ed4180a663

                    SHA1

                    592a993f9518c1ceab3186a8b5007826fa204b60

                    SHA256

                    b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a

                    SHA512

                    988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d

                  • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                    Filesize

                    162B

                    MD5

                    1b7c22a214949975556626d7217e9a39

                    SHA1

                    d01c97e2944166ed23e47e4a62ff471ab8fa031f

                    SHA256

                    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                    SHA512

                    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                  • memory/632-197-0x0000000000A10000-0x0000000000A1A000-memory.dmp

                    Filesize

                    40KB

                  • memory/5100-171-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/5100-191-0x0000000002550000-0x0000000002560000-memory.dmp

                    Filesize

                    64KB

                  • memory/5100-173-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/5100-175-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/5100-177-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/5100-179-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/5100-181-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/5100-183-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/5100-185-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/5100-187-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/5100-188-0x0000000000400000-0x0000000000582000-memory.dmp

                    Filesize

                    1.5MB

                  • memory/5100-189-0x0000000002550000-0x0000000002560000-memory.dmp

                    Filesize

                    64KB

                  • memory/5100-190-0x0000000002550000-0x0000000002560000-memory.dmp

                    Filesize

                    64KB

                  • memory/5100-169-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/5100-193-0x0000000000400000-0x0000000000582000-memory.dmp

                    Filesize

                    1.5MB

                  • memory/5100-167-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/5100-165-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/5100-161-0x0000000002550000-0x0000000002560000-memory.dmp

                    Filesize

                    64KB

                  • memory/5100-162-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/5100-163-0x0000000002550000-0x0000000002560000-memory.dmp

                    Filesize

                    64KB

                  • memory/5100-158-0x0000000000710000-0x000000000073D000-memory.dmp

                    Filesize

                    180KB

                  • memory/5100-159-0x0000000002550000-0x0000000002560000-memory.dmp

                    Filesize

                    64KB

                  • memory/5100-157-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/5100-156-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/5100-155-0x0000000004BF0000-0x0000000005194000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/5116-210-0x0000000004B40000-0x0000000004B7E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5116-224-0x0000000004B40000-0x0000000004B7E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5116-226-0x0000000004B40000-0x0000000004B7E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5116-228-0x0000000004B40000-0x0000000004B7E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5116-230-0x0000000004B40000-0x0000000004B7E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5116-232-0x0000000004B40000-0x0000000004B7E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5116-234-0x0000000004B40000-0x0000000004B7E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5116-236-0x0000000004B40000-0x0000000004B7E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5116-441-0x00000000007F0000-0x000000000083B000-memory.dmp

                    Filesize

                    300KB

                  • memory/5116-442-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5116-444-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5116-1112-0x0000000005360000-0x0000000005978000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/5116-1113-0x0000000005980000-0x0000000005A8A000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/5116-1114-0x0000000005AC0000-0x0000000005AD2000-memory.dmp

                    Filesize

                    72KB

                  • memory/5116-1115-0x0000000005AE0000-0x0000000005B1C000-memory.dmp

                    Filesize

                    240KB

                  • memory/5116-1116-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5116-1117-0x0000000005DE0000-0x0000000005E72000-memory.dmp

                    Filesize

                    584KB

                  • memory/5116-1118-0x0000000005E80000-0x0000000005EE6000-memory.dmp

                    Filesize

                    408KB

                  • memory/5116-1121-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5116-1120-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5116-1122-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5116-1123-0x0000000006930000-0x0000000006AF2000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/5116-1124-0x0000000006B00000-0x000000000702C000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/5116-1125-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5116-1126-0x0000000007360000-0x00000000073D6000-memory.dmp

                    Filesize

                    472KB

                  • memory/5116-1127-0x00000000073F0000-0x0000000007440000-memory.dmp

                    Filesize

                    320KB

                  • memory/5116-222-0x0000000004B40000-0x0000000004B7E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5116-218-0x0000000004B40000-0x0000000004B7E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5116-220-0x0000000004B40000-0x0000000004B7E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5116-216-0x0000000004B40000-0x0000000004B7E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5116-214-0x0000000004B40000-0x0000000004B7E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5116-212-0x0000000004B40000-0x0000000004B7E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5116-208-0x0000000004B40000-0x0000000004B7E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5116-206-0x0000000004B40000-0x0000000004B7E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5116-203-0x0000000004B40000-0x0000000004B7E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5116-204-0x0000000004B40000-0x0000000004B7E000-memory.dmp

                    Filesize

                    248KB