Analysis

  • max time kernel
    141s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31-03-2023 05:27

General

  • Target

    48e5bd721fe81ee8bbe3a8158cca398b193afff99aef647cc4ad8b48c51c5133.exe

  • Size

    1.0MB

  • MD5

    28f9c8133c57f32c749f7c0888a9717e

  • SHA1

    7959929ca28807703d5c885aedbe4ebad358e2d3

  • SHA256

    48e5bd721fe81ee8bbe3a8158cca398b193afff99aef647cc4ad8b48c51c5133

  • SHA512

    4cdbb986d24ade3827e8215529e9020e8fbd4f9d01ce61fce93dbc926cf56919c31726761a85084296f91f947238b227b9e2663cb3d6d8bbd1db1fed3f3a5302

  • SSDEEP

    24576:Yy2maJS4W5Xji1r4zz+VEpBCZjoSGN28WMo87e:fwSl5Xu1r4zoyCZTKF

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

liba

C2

176.113.115.145:4125

Attributes
  • auth_value

    1a62e130767ad862d1fb9d7ab0115025

Extracted

Family

amadey

Version

3.69

C2

193.233.20.36/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48e5bd721fe81ee8bbe3a8158cca398b193afff99aef647cc4ad8b48c51c5133.exe
    "C:\Users\Admin\AppData\Local\Temp\48e5bd721fe81ee8bbe3a8158cca398b193afff99aef647cc4ad8b48c51c5133.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4212
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap9050.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap9050.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4260
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap2055.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap2055.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4616
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap4315.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap4315.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3924
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz2571.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz2571.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2492
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3999EO.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3999EO.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4824
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w57Wt26.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w57Wt26.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3552
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xDNHj66.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xDNHj66.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3404
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y23as54.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y23as54.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2100
      • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4780
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:5100
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c5d2db5804" /P "Admin:N"&&CACLS "..\c5d2db5804" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1652
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:656
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:924
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:920
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:764
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c5d2db5804" /P "Admin:N"
                    5⤵
                      PID:768
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c5d2db5804" /P "Admin:R" /E
                      5⤵
                        PID:996
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:1100
              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:1596
              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:360

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y23as54.exe

                Filesize

                236KB

                MD5

                38b5119a90d192a65674c77028dffdfb

                SHA1

                b5f6fa82c6ca15cb60c9f45cf7d4e9ad410a80f5

                SHA256

                8143bddbb2d47d9fc41a184b3f342a40d901ef38ee4f37305d54026461c0b8e0

                SHA512

                cc928ba3bc55bbdab6ead594d133a0f6f016adf4c484c00e9d09b0be66c9ac8f00515af32f72767e2b41b82670f4c85a95ae53e8714aafc797e4c59725ad0c5b

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y23as54.exe

                Filesize

                236KB

                MD5

                38b5119a90d192a65674c77028dffdfb

                SHA1

                b5f6fa82c6ca15cb60c9f45cf7d4e9ad410a80f5

                SHA256

                8143bddbb2d47d9fc41a184b3f342a40d901ef38ee4f37305d54026461c0b8e0

                SHA512

                cc928ba3bc55bbdab6ead594d133a0f6f016adf4c484c00e9d09b0be66c9ac8f00515af32f72767e2b41b82670f4c85a95ae53e8714aafc797e4c59725ad0c5b

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap9050.exe

                Filesize

                843KB

                MD5

                df33b2eadb330d77aee53c7d5d881d96

                SHA1

                5c071180d60044b54c2e63932d2c65afd1750ae3

                SHA256

                c4c8fa2c3451fbaad3e3164c2e8cd3ed58c4a7b6fee9586b89c627669bf26284

                SHA512

                d164478585c38a064f60d32fc5eaeda554102abd603b96fa5f13e644d779139bde106f0da53a741fa2f01a7522a780e7c396c9ee3a12ed965b02ab47900473ea

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap9050.exe

                Filesize

                843KB

                MD5

                df33b2eadb330d77aee53c7d5d881d96

                SHA1

                5c071180d60044b54c2e63932d2c65afd1750ae3

                SHA256

                c4c8fa2c3451fbaad3e3164c2e8cd3ed58c4a7b6fee9586b89c627669bf26284

                SHA512

                d164478585c38a064f60d32fc5eaeda554102abd603b96fa5f13e644d779139bde106f0da53a741fa2f01a7522a780e7c396c9ee3a12ed965b02ab47900473ea

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xDNHj66.exe

                Filesize

                175KB

                MD5

                8ba810a64f757a4e0d31569d8602c594

                SHA1

                c13580f188da70bb195e782e3f838d14af9d37ed

                SHA256

                ef4c8b889668da8d23960c25f0559f187d403aa2dd06166e98ccbbe77a4e3230

                SHA512

                40e5cc67432a76ea4a8b106cb4dbc05e4cfa946d36de775c4e8f57a10d6156eaa75c6df7c2843eba894a79a460b0ccf35f98dbc597d59048d18048075b3c3ebb

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xDNHj66.exe

                Filesize

                175KB

                MD5

                8ba810a64f757a4e0d31569d8602c594

                SHA1

                c13580f188da70bb195e782e3f838d14af9d37ed

                SHA256

                ef4c8b889668da8d23960c25f0559f187d403aa2dd06166e98ccbbe77a4e3230

                SHA512

                40e5cc67432a76ea4a8b106cb4dbc05e4cfa946d36de775c4e8f57a10d6156eaa75c6df7c2843eba894a79a460b0ccf35f98dbc597d59048d18048075b3c3ebb

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap2055.exe

                Filesize

                701KB

                MD5

                c6203101484bc1378a5d9d40340fc026

                SHA1

                9c061f0f09cd8f160aebaffb75216d895ab2c4eb

                SHA256

                3a2ad952b8464e3c61da7a3f3167eb10220630d07d6fa93812200f431bdc9bf0

                SHA512

                d4ad47d468e4dfb93c891743fddec4980e7a6b490d7f05eedd3f9aa436e2f5656066a68481eb5f94b20613dd2ab7e829a4e2836d429bf3544c826ae375d97824

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap2055.exe

                Filesize

                701KB

                MD5

                c6203101484bc1378a5d9d40340fc026

                SHA1

                9c061f0f09cd8f160aebaffb75216d895ab2c4eb

                SHA256

                3a2ad952b8464e3c61da7a3f3167eb10220630d07d6fa93812200f431bdc9bf0

                SHA512

                d4ad47d468e4dfb93c891743fddec4980e7a6b490d7f05eedd3f9aa436e2f5656066a68481eb5f94b20613dd2ab7e829a4e2836d429bf3544c826ae375d97824

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w57Wt26.exe

                Filesize

                349KB

                MD5

                cec68ab24dafa6bbd27c1fe5431c00ca

                SHA1

                bc97f50a41ad9d0fa78531185913e9a739200435

                SHA256

                b3b6ba9b6427498a93e72f822607d6b5022e9849c7faee47dc782de201c3a1bc

                SHA512

                00cb015642163071b984f9cdaacf9660cbf5f6637d398cbda1f8806767b3f6af32241d4b77f85a4d4e455652f9e7c0a725eef1a8c4c38240f45bdc7ce54004e9

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w57Wt26.exe

                Filesize

                349KB

                MD5

                cec68ab24dafa6bbd27c1fe5431c00ca

                SHA1

                bc97f50a41ad9d0fa78531185913e9a739200435

                SHA256

                b3b6ba9b6427498a93e72f822607d6b5022e9849c7faee47dc782de201c3a1bc

                SHA512

                00cb015642163071b984f9cdaacf9660cbf5f6637d398cbda1f8806767b3f6af32241d4b77f85a4d4e455652f9e7c0a725eef1a8c4c38240f45bdc7ce54004e9

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap4315.exe

                Filesize

                347KB

                MD5

                c95b7c5fda7ad56483e1c6eb1873bcce

                SHA1

                e407bee93d64c1e4a3e234feaa549c3f4b5fb170

                SHA256

                e39dc8a104bcc18b6d24485198b8e913c8c5da27aef543b5d7e92e6b143f9896

                SHA512

                791bbff2637a1721fabad42d8647bb1660f82e99a52b7ff64c802aec98096946789a897b4f8722660ab90cb0887c6e05e6ccd836c1c9282bcc197c01e1b8fe2e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap4315.exe

                Filesize

                347KB

                MD5

                c95b7c5fda7ad56483e1c6eb1873bcce

                SHA1

                e407bee93d64c1e4a3e234feaa549c3f4b5fb170

                SHA256

                e39dc8a104bcc18b6d24485198b8e913c8c5da27aef543b5d7e92e6b143f9896

                SHA512

                791bbff2637a1721fabad42d8647bb1660f82e99a52b7ff64c802aec98096946789a897b4f8722660ab90cb0887c6e05e6ccd836c1c9282bcc197c01e1b8fe2e

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz2571.exe

                Filesize

                11KB

                MD5

                8f39a3fbb2f51390399fb117bcb768ff

                SHA1

                0d74c92fdf8de1a3e9896dd249986aca2f30a600

                SHA256

                e37723f401f5f214fc2d90faccb03313b19e9d082d0bb46e8bfe817f20828aad

                SHA512

                c010ec3705c578b2fd68537d77e9d42e192d3ecbcbf09b822116d13621f041e27e4edd5f0a410981c759ce2452a103dfdca6ceb548c3d7cd0822401151be0c0c

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz2571.exe

                Filesize

                11KB

                MD5

                8f39a3fbb2f51390399fb117bcb768ff

                SHA1

                0d74c92fdf8de1a3e9896dd249986aca2f30a600

                SHA256

                e37723f401f5f214fc2d90faccb03313b19e9d082d0bb46e8bfe817f20828aad

                SHA512

                c010ec3705c578b2fd68537d77e9d42e192d3ecbcbf09b822116d13621f041e27e4edd5f0a410981c759ce2452a103dfdca6ceb548c3d7cd0822401151be0c0c

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3999EO.exe

                Filesize

                292KB

                MD5

                fa0ea3971313e9144e37576c499a1f36

                SHA1

                5989ea029b46f50ac1098737a6c3a6c59a5dabea

                SHA256

                42b3850f81be1f87553e33f412bbb4351e4384f2a8eaa949bf1baa7c56977462

                SHA512

                b3ba95e6e0ac4a0362ac646a5da5146eba0a6cc91572769c0e00b1db826442072b952cae801d88acdbf48c10fe891eb619916dae01caca2d52c9e78659f5649d

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3999EO.exe

                Filesize

                292KB

                MD5

                fa0ea3971313e9144e37576c499a1f36

                SHA1

                5989ea029b46f50ac1098737a6c3a6c59a5dabea

                SHA256

                42b3850f81be1f87553e33f412bbb4351e4384f2a8eaa949bf1baa7c56977462

                SHA512

                b3ba95e6e0ac4a0362ac646a5da5146eba0a6cc91572769c0e00b1db826442072b952cae801d88acdbf48c10fe891eb619916dae01caca2d52c9e78659f5649d

              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe

                Filesize

                236KB

                MD5

                38b5119a90d192a65674c77028dffdfb

                SHA1

                b5f6fa82c6ca15cb60c9f45cf7d4e9ad410a80f5

                SHA256

                8143bddbb2d47d9fc41a184b3f342a40d901ef38ee4f37305d54026461c0b8e0

                SHA512

                cc928ba3bc55bbdab6ead594d133a0f6f016adf4c484c00e9d09b0be66c9ac8f00515af32f72767e2b41b82670f4c85a95ae53e8714aafc797e4c59725ad0c5b

              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe

                Filesize

                236KB

                MD5

                38b5119a90d192a65674c77028dffdfb

                SHA1

                b5f6fa82c6ca15cb60c9f45cf7d4e9ad410a80f5

                SHA256

                8143bddbb2d47d9fc41a184b3f342a40d901ef38ee4f37305d54026461c0b8e0

                SHA512

                cc928ba3bc55bbdab6ead594d133a0f6f016adf4c484c00e9d09b0be66c9ac8f00515af32f72767e2b41b82670f4c85a95ae53e8714aafc797e4c59725ad0c5b

              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe

                Filesize

                236KB

                MD5

                38b5119a90d192a65674c77028dffdfb

                SHA1

                b5f6fa82c6ca15cb60c9f45cf7d4e9ad410a80f5

                SHA256

                8143bddbb2d47d9fc41a184b3f342a40d901ef38ee4f37305d54026461c0b8e0

                SHA512

                cc928ba3bc55bbdab6ead594d133a0f6f016adf4c484c00e9d09b0be66c9ac8f00515af32f72767e2b41b82670f4c85a95ae53e8714aafc797e4c59725ad0c5b

              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe

                Filesize

                236KB

                MD5

                38b5119a90d192a65674c77028dffdfb

                SHA1

                b5f6fa82c6ca15cb60c9f45cf7d4e9ad410a80f5

                SHA256

                8143bddbb2d47d9fc41a184b3f342a40d901ef38ee4f37305d54026461c0b8e0

                SHA512

                cc928ba3bc55bbdab6ead594d133a0f6f016adf4c484c00e9d09b0be66c9ac8f00515af32f72767e2b41b82670f4c85a95ae53e8714aafc797e4c59725ad0c5b

              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe

                Filesize

                236KB

                MD5

                38b5119a90d192a65674c77028dffdfb

                SHA1

                b5f6fa82c6ca15cb60c9f45cf7d4e9ad410a80f5

                SHA256

                8143bddbb2d47d9fc41a184b3f342a40d901ef38ee4f37305d54026461c0b8e0

                SHA512

                cc928ba3bc55bbdab6ead594d133a0f6f016adf4c484c00e9d09b0be66c9ac8f00515af32f72767e2b41b82670f4c85a95ae53e8714aafc797e4c59725ad0c5b

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                6a4c2f2b6e1bbce94b4d00e91e690d0d

                SHA1

                f61021fd82dabd2ccde8d1e46736b1a9f4e4ce57

                SHA256

                8b6af7cc4fc3bcb4172a2bf4a7727175ba48980bcc808e56ce7744d28af60a8f

                SHA512

                8c9154748e410b71942c5316b1bdcc5590f7f0da33c0139fb4c86087a78b8c16ab76f1fa724524169e0f3d1a3d1f138dfd60979ee3e4b6487a66532879371f01

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                6a4c2f2b6e1bbce94b4d00e91e690d0d

                SHA1

                f61021fd82dabd2ccde8d1e46736b1a9f4e4ce57

                SHA256

                8b6af7cc4fc3bcb4172a2bf4a7727175ba48980bcc808e56ce7744d28af60a8f

                SHA512

                8c9154748e410b71942c5316b1bdcc5590f7f0da33c0139fb4c86087a78b8c16ab76f1fa724524169e0f3d1a3d1f138dfd60979ee3e4b6487a66532879371f01

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                6a4c2f2b6e1bbce94b4d00e91e690d0d

                SHA1

                f61021fd82dabd2ccde8d1e46736b1a9f4e4ce57

                SHA256

                8b6af7cc4fc3bcb4172a2bf4a7727175ba48980bcc808e56ce7744d28af60a8f

                SHA512

                8c9154748e410b71942c5316b1bdcc5590f7f0da33c0139fb4c86087a78b8c16ab76f1fa724524169e0f3d1a3d1f138dfd60979ee3e4b6487a66532879371f01

              • memory/2492-148-0x0000000000BE0000-0x0000000000BEA000-memory.dmp

                Filesize

                40KB

              • memory/3404-1132-0x0000000004C60000-0x0000000004CAB000-memory.dmp

                Filesize

                300KB

              • memory/3404-1131-0x00000000003E0000-0x0000000000412000-memory.dmp

                Filesize

                200KB

              • memory/3404-1133-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

                Filesize

                64KB

              • memory/3552-1116-0x0000000005540000-0x00000000055A6000-memory.dmp

                Filesize

                408KB

              • memory/3552-1109-0x00000000055F0000-0x0000000005BF6000-memory.dmp

                Filesize

                6.0MB

              • memory/3552-1125-0x0000000002510000-0x0000000002520000-memory.dmp

                Filesize

                64KB

              • memory/3552-1124-0x0000000006C10000-0x0000000006C60000-memory.dmp

                Filesize

                320KB

              • memory/3552-1123-0x0000000006B90000-0x0000000006C06000-memory.dmp

                Filesize

                472KB

              • memory/3552-1122-0x0000000002510000-0x0000000002520000-memory.dmp

                Filesize

                64KB

              • memory/3552-1120-0x0000000002510000-0x0000000002520000-memory.dmp

                Filesize

                64KB

              • memory/3552-1121-0x0000000002510000-0x0000000002520000-memory.dmp

                Filesize

                64KB

              • memory/3552-1118-0x0000000006530000-0x0000000006A5C000-memory.dmp

                Filesize

                5.2MB

              • memory/3552-197-0x0000000002440000-0x0000000002486000-memory.dmp

                Filesize

                280KB

              • memory/3552-198-0x0000000004F80000-0x0000000004FC4000-memory.dmp

                Filesize

                272KB

              • memory/3552-199-0x0000000004F80000-0x0000000004FBF000-memory.dmp

                Filesize

                252KB

              • memory/3552-200-0x0000000004F80000-0x0000000004FBF000-memory.dmp

                Filesize

                252KB

              • memory/3552-202-0x0000000004F80000-0x0000000004FBF000-memory.dmp

                Filesize

                252KB

              • memory/3552-204-0x0000000004F80000-0x0000000004FBF000-memory.dmp

                Filesize

                252KB

              • memory/3552-206-0x0000000004F80000-0x0000000004FBF000-memory.dmp

                Filesize

                252KB

              • memory/3552-208-0x0000000000640000-0x000000000068B000-memory.dmp

                Filesize

                300KB

              • memory/3552-210-0x0000000002510000-0x0000000002520000-memory.dmp

                Filesize

                64KB

              • memory/3552-211-0x0000000002510000-0x0000000002520000-memory.dmp

                Filesize

                64KB

              • memory/3552-209-0x0000000004F80000-0x0000000004FBF000-memory.dmp

                Filesize

                252KB

              • memory/3552-214-0x0000000004F80000-0x0000000004FBF000-memory.dmp

                Filesize

                252KB

              • memory/3552-213-0x0000000002510000-0x0000000002520000-memory.dmp

                Filesize

                64KB

              • memory/3552-216-0x0000000004F80000-0x0000000004FBF000-memory.dmp

                Filesize

                252KB

              • memory/3552-218-0x0000000004F80000-0x0000000004FBF000-memory.dmp

                Filesize

                252KB

              • memory/3552-220-0x0000000004F80000-0x0000000004FBF000-memory.dmp

                Filesize

                252KB

              • memory/3552-222-0x0000000004F80000-0x0000000004FBF000-memory.dmp

                Filesize

                252KB

              • memory/3552-224-0x0000000004F80000-0x0000000004FBF000-memory.dmp

                Filesize

                252KB

              • memory/3552-226-0x0000000004F80000-0x0000000004FBF000-memory.dmp

                Filesize

                252KB

              • memory/3552-228-0x0000000004F80000-0x0000000004FBF000-memory.dmp

                Filesize

                252KB

              • memory/3552-230-0x0000000004F80000-0x0000000004FBF000-memory.dmp

                Filesize

                252KB

              • memory/3552-232-0x0000000004F80000-0x0000000004FBF000-memory.dmp

                Filesize

                252KB

              • memory/3552-234-0x0000000004F80000-0x0000000004FBF000-memory.dmp

                Filesize

                252KB

              • memory/3552-236-0x0000000004F80000-0x0000000004FBF000-memory.dmp

                Filesize

                252KB

              • memory/3552-1117-0x0000000006350000-0x0000000006512000-memory.dmp

                Filesize

                1.8MB

              • memory/3552-1110-0x0000000005060000-0x000000000516A000-memory.dmp

                Filesize

                1.0MB

              • memory/3552-1111-0x00000000051A0000-0x00000000051B2000-memory.dmp

                Filesize

                72KB

              • memory/3552-1112-0x00000000051C0000-0x00000000051FE000-memory.dmp

                Filesize

                248KB

              • memory/3552-1113-0x0000000005310000-0x000000000535B000-memory.dmp

                Filesize

                300KB

              • memory/3552-1114-0x0000000002510000-0x0000000002520000-memory.dmp

                Filesize

                64KB

              • memory/3552-1115-0x00000000054A0000-0x0000000005532000-memory.dmp

                Filesize

                584KB

              • memory/4824-171-0x00000000026D0000-0x00000000026E2000-memory.dmp

                Filesize

                72KB

              • memory/4824-192-0x0000000000400000-0x00000000004B9000-memory.dmp

                Filesize

                740KB

              • memory/4824-179-0x00000000026D0000-0x00000000026E2000-memory.dmp

                Filesize

                72KB

              • memory/4824-183-0x00000000026D0000-0x00000000026E2000-memory.dmp

                Filesize

                72KB

              • memory/4824-169-0x00000000026D0000-0x00000000026E2000-memory.dmp

                Filesize

                72KB

              • memory/4824-190-0x0000000002180000-0x0000000002190000-memory.dmp

                Filesize

                64KB

              • memory/4824-189-0x0000000002180000-0x0000000002190000-memory.dmp

                Filesize

                64KB

              • memory/4824-167-0x00000000026D0000-0x00000000026E2000-memory.dmp

                Filesize

                72KB

              • memory/4824-187-0x00000000026D0000-0x00000000026E2000-memory.dmp

                Filesize

                72KB

              • memory/4824-177-0x00000000026D0000-0x00000000026E2000-memory.dmp

                Filesize

                72KB

              • memory/4824-175-0x00000000026D0000-0x00000000026E2000-memory.dmp

                Filesize

                72KB

              • memory/4824-173-0x00000000026D0000-0x00000000026E2000-memory.dmp

                Filesize

                72KB

              • memory/4824-181-0x00000000026D0000-0x00000000026E2000-memory.dmp

                Filesize

                72KB

              • memory/4824-185-0x00000000026D0000-0x00000000026E2000-memory.dmp

                Filesize

                72KB

              • memory/4824-188-0x0000000000400000-0x00000000004B9000-memory.dmp

                Filesize

                740KB

              • memory/4824-165-0x00000000026D0000-0x00000000026E2000-memory.dmp

                Filesize

                72KB

              • memory/4824-163-0x00000000026D0000-0x00000000026E2000-memory.dmp

                Filesize

                72KB

              • memory/4824-161-0x00000000026D0000-0x00000000026E2000-memory.dmp

                Filesize

                72KB

              • memory/4824-160-0x00000000026D0000-0x00000000026E2000-memory.dmp

                Filesize

                72KB

              • memory/4824-159-0x0000000002180000-0x0000000002190000-memory.dmp

                Filesize

                64KB

              • memory/4824-158-0x0000000002180000-0x0000000002190000-memory.dmp

                Filesize

                64KB

              • memory/4824-157-0x00000000001D0000-0x00000000001FD000-memory.dmp

                Filesize

                180KB

              • memory/4824-156-0x00000000026D0000-0x00000000026E8000-memory.dmp

                Filesize

                96KB

              • memory/4824-155-0x0000000004C60000-0x000000000515E000-memory.dmp

                Filesize

                5.0MB

              • memory/4824-154-0x0000000002160000-0x000000000217A000-memory.dmp

                Filesize

                104KB