Analysis

  • max time kernel
    140s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/03/2023, 08:29

General

  • Target

    8aca2844052ef863d214ba91230fed2925a461018462bc04beb65af29ee04c80.exe

  • Size

    856KB

  • MD5

    6fd6898873eb8557d64a0c91f450ea28

  • SHA1

    6a1b697b3df891f8a472a98d39e54794877ac9ce

  • SHA256

    8aca2844052ef863d214ba91230fed2925a461018462bc04beb65af29ee04c80

  • SHA512

    641f22c63e62acdeeaa7c3647a017bf903a80cc3b29bb0f6a98af35b1072016caf30490d420cca62075136c8d54388fd9f56564398d927859aac21c816f6363c

  • SSDEEP

    12288:fMr8y90SXc/P/9RO9edVaL+28ld+zOAHBnjrMAd6S0wtzzO140Jxbi:by0/vFdVafzrHBjrMAhNzr0Jxbi

Malware Config

Extracted

Family

redline

Botnet

ruzhpe

C2

pepunn.com:4162

Attributes
  • auth_value

    f735ced96ae8d01d0bd1d514240e54e0

Extracted

Family

amadey

Version

3.68

C2

193.233.20.25/buH5N004d/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8aca2844052ef863d214ba91230fed2925a461018462bc04beb65af29ee04c80.exe
    "C:\Users\Admin\AppData\Local\Temp\8aca2844052ef863d214ba91230fed2925a461018462bc04beb65af29ee04c80.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptWd4083ya.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptWd4083ya.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4108
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptod9170XS.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptod9170XS.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4972
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\beJb91Fx93.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\beJb91Fx93.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2292
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 1080
            5⤵
            • Program crash
            PID:696
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ctzq11nz89.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ctzq11nz89.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2204
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk08uh94rA71.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk08uh94rA71.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:560
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 560 -s 896
          4⤵
          • Program crash
          PID:924
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxtB41aM35.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxtB41aM35.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3932
      • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe
        "C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4884
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN ghaaer.exe /TR "C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4112
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "ghaaer.exe" /P "Admin:N"&&CACLS "ghaaer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\46aee2aca4" /P "Admin:N"&&CACLS "..\46aee2aca4" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3216
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:984
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "ghaaer.exe" /P "Admin:N"
              5⤵
                PID:4384
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "ghaaer.exe" /P "Admin:R" /E
                5⤵
                  PID:1244
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:224
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\46aee2aca4" /P "Admin:N"
                    5⤵
                      PID:4080
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\46aee2aca4" /P "Admin:R" /E
                      5⤵
                        PID:1776
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:228
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2292 -ip 2292
                1⤵
                  PID:5052
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 560 -ip 560
                  1⤵
                    PID:3432
                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe
                    C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe
                    1⤵
                    • Executes dropped EXE
                    PID:5040
                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe
                    C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe
                    1⤵
                    • Executes dropped EXE
                    PID:3736

                  Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe

                          Filesize

                          235KB

                          MD5

                          fe8223a2116fd58f763a4866d80dcc16

                          SHA1

                          41d2794d182fe314ba123aecbf2b2cb73d2df900

                          SHA256

                          4986352cf436aa953a73ce2c7f34e7dd9a4bca456cf813a6f339ec74b0728923

                          SHA512

                          5d664b0463e9aeb7f7b9109abe317880adf4a439b531ea264c2abda36663e26882f31ce5ca306e04044f80d617e9f3ab3e45cce24387c50ae68b06d77a63690f

                        • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe

                          Filesize

                          235KB

                          MD5

                          fe8223a2116fd58f763a4866d80dcc16

                          SHA1

                          41d2794d182fe314ba123aecbf2b2cb73d2df900

                          SHA256

                          4986352cf436aa953a73ce2c7f34e7dd9a4bca456cf813a6f339ec74b0728923

                          SHA512

                          5d664b0463e9aeb7f7b9109abe317880adf4a439b531ea264c2abda36663e26882f31ce5ca306e04044f80d617e9f3ab3e45cce24387c50ae68b06d77a63690f

                        • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe

                          Filesize

                          235KB

                          MD5

                          fe8223a2116fd58f763a4866d80dcc16

                          SHA1

                          41d2794d182fe314ba123aecbf2b2cb73d2df900

                          SHA256

                          4986352cf436aa953a73ce2c7f34e7dd9a4bca456cf813a6f339ec74b0728923

                          SHA512

                          5d664b0463e9aeb7f7b9109abe317880adf4a439b531ea264c2abda36663e26882f31ce5ca306e04044f80d617e9f3ab3e45cce24387c50ae68b06d77a63690f

                        • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe

                          Filesize

                          235KB

                          MD5

                          fe8223a2116fd58f763a4866d80dcc16

                          SHA1

                          41d2794d182fe314ba123aecbf2b2cb73d2df900

                          SHA256

                          4986352cf436aa953a73ce2c7f34e7dd9a4bca456cf813a6f339ec74b0728923

                          SHA512

                          5d664b0463e9aeb7f7b9109abe317880adf4a439b531ea264c2abda36663e26882f31ce5ca306e04044f80d617e9f3ab3e45cce24387c50ae68b06d77a63690f

                        • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe

                          Filesize

                          235KB

                          MD5

                          fe8223a2116fd58f763a4866d80dcc16

                          SHA1

                          41d2794d182fe314ba123aecbf2b2cb73d2df900

                          SHA256

                          4986352cf436aa953a73ce2c7f34e7dd9a4bca456cf813a6f339ec74b0728923

                          SHA512

                          5d664b0463e9aeb7f7b9109abe317880adf4a439b531ea264c2abda36663e26882f31ce5ca306e04044f80d617e9f3ab3e45cce24387c50ae68b06d77a63690f

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxtB41aM35.exe

                          Filesize

                          235KB

                          MD5

                          fe8223a2116fd58f763a4866d80dcc16

                          SHA1

                          41d2794d182fe314ba123aecbf2b2cb73d2df900

                          SHA256

                          4986352cf436aa953a73ce2c7f34e7dd9a4bca456cf813a6f339ec74b0728923

                          SHA512

                          5d664b0463e9aeb7f7b9109abe317880adf4a439b531ea264c2abda36663e26882f31ce5ca306e04044f80d617e9f3ab3e45cce24387c50ae68b06d77a63690f

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxtB41aM35.exe

                          Filesize

                          235KB

                          MD5

                          fe8223a2116fd58f763a4866d80dcc16

                          SHA1

                          41d2794d182fe314ba123aecbf2b2cb73d2df900

                          SHA256

                          4986352cf436aa953a73ce2c7f34e7dd9a4bca456cf813a6f339ec74b0728923

                          SHA512

                          5d664b0463e9aeb7f7b9109abe317880adf4a439b531ea264c2abda36663e26882f31ce5ca306e04044f80d617e9f3ab3e45cce24387c50ae68b06d77a63690f

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptWd4083ya.exe

                          Filesize

                          670KB

                          MD5

                          bb833fd1f6ed578ba37479598d4060a3

                          SHA1

                          c29ab7088a530546b46a0f4e0fe58bd2cbde8f4c

                          SHA256

                          d763fb19daf179bb5c73932462a409441911219ea1460088f4ecfcbd7d446b9d

                          SHA512

                          26b8ffad6bd4fff49b9a10a79a9005fd4ed4861539dfd19358c788841d53206b429272bf060514661da889ca08d51d9ae1109c41b345c3d7cd28ec0c14c80db7

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptWd4083ya.exe

                          Filesize

                          670KB

                          MD5

                          bb833fd1f6ed578ba37479598d4060a3

                          SHA1

                          c29ab7088a530546b46a0f4e0fe58bd2cbde8f4c

                          SHA256

                          d763fb19daf179bb5c73932462a409441911219ea1460088f4ecfcbd7d446b9d

                          SHA512

                          26b8ffad6bd4fff49b9a10a79a9005fd4ed4861539dfd19358c788841d53206b429272bf060514661da889ca08d51d9ae1109c41b345c3d7cd28ec0c14c80db7

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk08uh94rA71.exe

                          Filesize

                          309KB

                          MD5

                          c399447de03079c2f5c1482ddeb1706b

                          SHA1

                          dbeaa79a4b8e1190fc5c054b408948631dac089c

                          SHA256

                          afce08c2456f2f7a0ca5d02fca432a29b387b7f1d6fb1d58c6fc6da96749f7d7

                          SHA512

                          3f7001cfb7e54a471786f96c6788858718b867cdcd9c2caabd19018f74228461bcfa45211c11e5a541fdb4fd6c4ff0c330e6b6c8734304d670fc393072480b3c

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk08uh94rA71.exe

                          Filesize

                          309KB

                          MD5

                          c399447de03079c2f5c1482ddeb1706b

                          SHA1

                          dbeaa79a4b8e1190fc5c054b408948631dac089c

                          SHA256

                          afce08c2456f2f7a0ca5d02fca432a29b387b7f1d6fb1d58c6fc6da96749f7d7

                          SHA512

                          3f7001cfb7e54a471786f96c6788858718b867cdcd9c2caabd19018f74228461bcfa45211c11e5a541fdb4fd6c4ff0c330e6b6c8734304d670fc393072480b3c

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptod9170XS.exe

                          Filesize

                          335KB

                          MD5

                          1b0957f20ad7fa5dfa8210912e431ffd

                          SHA1

                          b4a40a3829bf87c4c156156ddde8e4f320208e1f

                          SHA256

                          e9a8c9b2bef8b5a3aed7c7e5468044cd3970277060f05c5461d17e1b1463de0a

                          SHA512

                          93a5712d31bf3d3fb1bedaa17e23105cf4ff965fd8d78deb077bc7676551733ada7599d46095011db69548ddbd4b986aceea42f434ee14dfcf7f7e77882a0a54

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptod9170XS.exe

                          Filesize

                          335KB

                          MD5

                          1b0957f20ad7fa5dfa8210912e431ffd

                          SHA1

                          b4a40a3829bf87c4c156156ddde8e4f320208e1f

                          SHA256

                          e9a8c9b2bef8b5a3aed7c7e5468044cd3970277060f05c5461d17e1b1463de0a

                          SHA512

                          93a5712d31bf3d3fb1bedaa17e23105cf4ff965fd8d78deb077bc7676551733ada7599d46095011db69548ddbd4b986aceea42f434ee14dfcf7f7e77882a0a54

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\beJb91Fx93.exe

                          Filesize

                          250KB

                          MD5

                          e86d6512a605f1fcd0435b9d980a7473

                          SHA1

                          3c256c47fc1b8d43a2e64ed7463e47301178380d

                          SHA256

                          4d3feae0f76c5b673ad0b420fb396e931e93d9bf08629742e2f1a47716ad4ad3

                          SHA512

                          be1b75490e6a8534eaed0ecb8516ad73e95542787d7123ca205ac52a82637abafe7c44479e2d994e10a221c0b7fe193f3c881d660485a0f415246aa70e7b7d78

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\beJb91Fx93.exe

                          Filesize

                          250KB

                          MD5

                          e86d6512a605f1fcd0435b9d980a7473

                          SHA1

                          3c256c47fc1b8d43a2e64ed7463e47301178380d

                          SHA256

                          4d3feae0f76c5b673ad0b420fb396e931e93d9bf08629742e2f1a47716ad4ad3

                          SHA512

                          be1b75490e6a8534eaed0ecb8516ad73e95542787d7123ca205ac52a82637abafe7c44479e2d994e10a221c0b7fe193f3c881d660485a0f415246aa70e7b7d78

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ctzq11nz89.exe

                          Filesize

                          13KB

                          MD5

                          318b1af7cf33a03a67650c66ee7cd30f

                          SHA1

                          6711c9932864d1a2cf24017f2f1d2278ab8e5443

                          SHA256

                          a5e49f6c89dd460eb10711bad43c32bb70ec2d42374fcf36dc54b7e012e82ba5

                          SHA512

                          a3c51843e4964e52fdc9bab9014dacf405049398c185ff23fdb42e44203b823d759be098423d74a52457c3f856b4837972a02e9e6f9957c3787bbe95bd493cb0

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ctzq11nz89.exe

                          Filesize

                          13KB

                          MD5

                          318b1af7cf33a03a67650c66ee7cd30f

                          SHA1

                          6711c9932864d1a2cf24017f2f1d2278ab8e5443

                          SHA256

                          a5e49f6c89dd460eb10711bad43c32bb70ec2d42374fcf36dc54b7e012e82ba5

                          SHA512

                          a3c51843e4964e52fdc9bab9014dacf405049398c185ff23fdb42e44203b823d759be098423d74a52457c3f856b4837972a02e9e6f9957c3787bbe95bd493cb0

                        • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                          Filesize

                          89KB

                          MD5

                          29b9780bb2992d018ae312ed4180a663

                          SHA1

                          592a993f9518c1ceab3186a8b5007826fa204b60

                          SHA256

                          b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a

                          SHA512

                          988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d

                        • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                          Filesize

                          89KB

                          MD5

                          29b9780bb2992d018ae312ed4180a663

                          SHA1

                          592a993f9518c1ceab3186a8b5007826fa204b60

                          SHA256

                          b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a

                          SHA512

                          988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d

                        • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                          Filesize

                          89KB

                          MD5

                          29b9780bb2992d018ae312ed4180a663

                          SHA1

                          592a993f9518c1ceab3186a8b5007826fa204b60

                          SHA256

                          b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a

                          SHA512

                          988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d

                        • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                          Filesize

                          162B

                          MD5

                          1b7c22a214949975556626d7217e9a39

                          SHA1

                          d01c97e2944166ed23e47e4a62ff471ab8fa031f

                          SHA256

                          340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                          SHA512

                          ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                        • memory/560-1119-0x0000000005CA0000-0x0000000005D32000-memory.dmp

                          Filesize

                          584KB

                        • memory/560-216-0x0000000002430000-0x000000000246E000-memory.dmp

                          Filesize

                          248KB

                        • memory/560-1128-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

                          Filesize

                          64KB

                        • memory/560-1127-0x0000000008030000-0x0000000008080000-memory.dmp

                          Filesize

                          320KB

                        • memory/560-1126-0x00000000025A0000-0x0000000002616000-memory.dmp

                          Filesize

                          472KB

                        • memory/560-1125-0x00000000079E0000-0x0000000007F0C000-memory.dmp

                          Filesize

                          5.2MB

                        • memory/560-1124-0x0000000007800000-0x00000000079C2000-memory.dmp

                          Filesize

                          1.8MB

                        • memory/560-1123-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

                          Filesize

                          64KB

                        • memory/560-1122-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

                          Filesize

                          64KB

                        • memory/560-1121-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

                          Filesize

                          64KB

                        • memory/560-1120-0x0000000005D40000-0x0000000005DA6000-memory.dmp

                          Filesize

                          408KB

                        • memory/560-1117-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

                          Filesize

                          64KB

                        • memory/560-1116-0x00000000059B0000-0x00000000059EC000-memory.dmp

                          Filesize

                          240KB

                        • memory/560-1115-0x0000000005990000-0x00000000059A2000-memory.dmp

                          Filesize

                          72KB

                        • memory/560-1114-0x0000000004C70000-0x0000000004D7A000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/560-204-0x0000000002430000-0x000000000246E000-memory.dmp

                          Filesize

                          248KB

                        • memory/560-206-0x0000000002430000-0x000000000246E000-memory.dmp

                          Filesize

                          248KB

                        • memory/560-203-0x0000000002430000-0x000000000246E000-memory.dmp

                          Filesize

                          248KB

                        • memory/560-208-0x0000000002430000-0x000000000246E000-memory.dmp

                          Filesize

                          248KB

                        • memory/560-210-0x0000000002430000-0x000000000246E000-memory.dmp

                          Filesize

                          248KB

                        • memory/560-212-0x0000000002430000-0x000000000246E000-memory.dmp

                          Filesize

                          248KB

                        • memory/560-220-0x0000000002430000-0x000000000246E000-memory.dmp

                          Filesize

                          248KB

                        • memory/560-218-0x0000000002430000-0x000000000246E000-memory.dmp

                          Filesize

                          248KB

                        • memory/560-230-0x0000000002430000-0x000000000246E000-memory.dmp

                          Filesize

                          248KB

                        • memory/560-228-0x0000000002430000-0x000000000246E000-memory.dmp

                          Filesize

                          248KB

                        • memory/560-232-0x0000000002430000-0x000000000246E000-memory.dmp

                          Filesize

                          248KB

                        • memory/560-236-0x0000000002430000-0x000000000246E000-memory.dmp

                          Filesize

                          248KB

                        • memory/560-234-0x0000000002430000-0x000000000246E000-memory.dmp

                          Filesize

                          248KB

                        • memory/560-226-0x0000000002430000-0x000000000246E000-memory.dmp

                          Filesize

                          248KB

                        • memory/560-224-0x0000000002430000-0x000000000246E000-memory.dmp

                          Filesize

                          248KB

                        • memory/560-222-0x0000000002430000-0x000000000246E000-memory.dmp

                          Filesize

                          248KB

                        • memory/560-1113-0x0000000005370000-0x0000000005988000-memory.dmp

                          Filesize

                          6.1MB

                        • memory/560-214-0x0000000002430000-0x000000000246E000-memory.dmp

                          Filesize

                          248KB

                        • memory/560-427-0x0000000000740000-0x000000000078B000-memory.dmp

                          Filesize

                          300KB

                        • memory/560-428-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

                          Filesize

                          64KB

                        • memory/560-431-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

                          Filesize

                          64KB

                        • memory/560-433-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

                          Filesize

                          64KB

                        • memory/2204-197-0x00000000007E0000-0x00000000007EA000-memory.dmp

                          Filesize

                          40KB

                        • memory/2292-187-0x00000000028E0000-0x00000000028F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/2292-156-0x00000000028E0000-0x00000000028F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/2292-173-0x00000000028E0000-0x00000000028F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/2292-177-0x00000000028E0000-0x00000000028F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/2292-171-0x00000000028E0000-0x00000000028F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/2292-179-0x00000000028E0000-0x00000000028F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/2292-193-0x0000000000400000-0x0000000000582000-memory.dmp

                          Filesize

                          1.5MB

                        • memory/2292-192-0x0000000004D80000-0x0000000004D90000-memory.dmp

                          Filesize

                          64KB

                        • memory/2292-191-0x0000000004D80000-0x0000000004D90000-memory.dmp

                          Filesize

                          64KB

                        • memory/2292-190-0x0000000004D80000-0x0000000004D90000-memory.dmp

                          Filesize

                          64KB

                        • memory/2292-188-0x0000000000400000-0x0000000000582000-memory.dmp

                          Filesize

                          1.5MB

                        • memory/2292-181-0x00000000028E0000-0x00000000028F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/2292-175-0x00000000028E0000-0x00000000028F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/2292-168-0x0000000004D80000-0x0000000004D90000-memory.dmp

                          Filesize

                          64KB

                        • memory/2292-185-0x00000000028E0000-0x00000000028F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/2292-169-0x00000000028E0000-0x00000000028F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/2292-166-0x0000000004D80000-0x0000000004D90000-memory.dmp

                          Filesize

                          64KB

                        • memory/2292-164-0x0000000004D80000-0x0000000004D90000-memory.dmp

                          Filesize

                          64KB

                        • memory/2292-165-0x00000000028E0000-0x00000000028F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/2292-163-0x0000000000650000-0x000000000067D000-memory.dmp

                          Filesize

                          180KB

                        • memory/2292-161-0x00000000028E0000-0x00000000028F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/2292-183-0x00000000028E0000-0x00000000028F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/2292-159-0x00000000028E0000-0x00000000028F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/2292-157-0x00000000028E0000-0x00000000028F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/2292-155-0x0000000004D90000-0x0000000005334000-memory.dmp

                          Filesize

                          5.6MB