Analysis

  • max time kernel
    116s
  • max time network
    119s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01-04-2023 10:30

General

  • Target

    839541378afe405f2b13077559d9b3d14e7f2f06d99af86ccbea349be61f1bc5.exe

  • Size

    992KB

  • MD5

    a7cf2ed057599bff8436171443ab772a

  • SHA1

    d19203641bcc122e508abd81767af0be4b60c00f

  • SHA256

    839541378afe405f2b13077559d9b3d14e7f2f06d99af86ccbea349be61f1bc5

  • SHA512

    0095a57613709af086bfc6c1e083356607e55cc0f4e5e2edd01252ab4de74d0d19f087ffc81b4ffac1a7059fac9ab11add24901db3a892cc00dd00ad447220fc

  • SSDEEP

    24576:wyHmI24Vj2dFEBMlQB+4XewEHcTeOYtWmN0TKDAxnDiO:3C4Vc/HJw0RNZDWD

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

lift

C2

176.113.115.145:4125

Attributes
  • auth_value

    94f33c242a83de9dcc729e29ec435dfb

Extracted

Family

amadey

Version

3.69

C2

193.233.20.36/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\839541378afe405f2b13077559d9b3d14e7f2f06d99af86ccbea349be61f1bc5.exe
    "C:\Users\Admin\AppData\Local\Temp\839541378afe405f2b13077559d9b3d14e7f2f06d99af86ccbea349be61f1bc5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap9207.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap9207.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3200
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap0754.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap0754.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4928
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap6029.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap6029.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2772
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz4597.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz4597.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3884
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0509CB.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0509CB.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1572
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w22Ne40.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w22Ne40.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xxRFJ55.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xxRFJ55.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4756
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y18Xo47.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y18Xo47.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3164
      • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4456
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4284
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c5d2db5804" /P "Admin:N"&&CACLS "..\c5d2db5804" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:5040
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4988
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:4964
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:5004
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4908
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c5d2db5804" /P "Admin:N"
                    5⤵
                      PID:5056
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c5d2db5804" /P "Admin:R" /E
                      5⤵
                        PID:3360
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:5104
              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:4976

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Defense Evasion

              Modify Registry

              3
              T1112

              Disabling Security Tools

              2
              T1089

              Credential Access

              Credentials in Files

              2
              T1081

              Discovery

              Query Registry

              1
              T1012

              System Information Discovery

              1
              T1082

              Collection

              Data from Local System

              2
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y18Xo47.exe
                Filesize

                236KB

                MD5

                3b75f24b7da298bfa1a913c5cedb3df3

                SHA1

                a50992f04a48f93670b8b675699c5fffd9a10f30

                SHA256

                3bfc3b19a6c1dcf2f516a1558530d0c6b700c0a6c469a60a5515f84a2ffbeaa9

                SHA512

                8d3770310916d1b2556e10456d0c966000d5a7528d6f0685d469cf79bf7c2b08f035b39a810639dba461f0a97f750604f2dee530142aea0c4ad19c76a9e2222f

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y18Xo47.exe
                Filesize

                236KB

                MD5

                3b75f24b7da298bfa1a913c5cedb3df3

                SHA1

                a50992f04a48f93670b8b675699c5fffd9a10f30

                SHA256

                3bfc3b19a6c1dcf2f516a1558530d0c6b700c0a6c469a60a5515f84a2ffbeaa9

                SHA512

                8d3770310916d1b2556e10456d0c966000d5a7528d6f0685d469cf79bf7c2b08f035b39a810639dba461f0a97f750604f2dee530142aea0c4ad19c76a9e2222f

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap9207.exe
                Filesize

                808KB

                MD5

                eb7939c89aa294af22af6e7d7da5bc3f

                SHA1

                13de601cc8e789931d17072bf395d2254427df85

                SHA256

                55db035ac8f033142d20d7831d806560ab77f6a13c60fb48d18c2c2d9ca15233

                SHA512

                4cb53fff684d0aed8aad98f0b0d492b2f7ec399dbb39f5d1cdc891175348e1b029e3b8f2df5fc73594ee6216f158130a2afdcc93f9dc370e2366c8ab58eb39a5

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap9207.exe
                Filesize

                808KB

                MD5

                eb7939c89aa294af22af6e7d7da5bc3f

                SHA1

                13de601cc8e789931d17072bf395d2254427df85

                SHA256

                55db035ac8f033142d20d7831d806560ab77f6a13c60fb48d18c2c2d9ca15233

                SHA512

                4cb53fff684d0aed8aad98f0b0d492b2f7ec399dbb39f5d1cdc891175348e1b029e3b8f2df5fc73594ee6216f158130a2afdcc93f9dc370e2366c8ab58eb39a5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xxRFJ55.exe
                Filesize

                175KB

                MD5

                ab306c9b46fc61b721e1281837319ad9

                SHA1

                d46312c6dfb1bd2e022361480357d4e359f79d00

                SHA256

                dd08c768b85144178586a05a0112fda8dcca643eb18ab6eff3a04679827ed297

                SHA512

                9417551c63c8a196a037070bfebba731be20da1c78f4b02d1dbf8051a5284c731809c8f318c307470910e91dea1597f87951373c69515e17883dd45d21e1088e

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xxRFJ55.exe
                Filesize

                175KB

                MD5

                ab306c9b46fc61b721e1281837319ad9

                SHA1

                d46312c6dfb1bd2e022361480357d4e359f79d00

                SHA256

                dd08c768b85144178586a05a0112fda8dcca643eb18ab6eff3a04679827ed297

                SHA512

                9417551c63c8a196a037070bfebba731be20da1c78f4b02d1dbf8051a5284c731809c8f318c307470910e91dea1597f87951373c69515e17883dd45d21e1088e

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap0754.exe
                Filesize

                665KB

                MD5

                c42fcd7a77260808a7ee811716722abd

                SHA1

                c7397449416853686b8822d5aa4e834580b11585

                SHA256

                9684c8dc02964ed5979e802443a75847c3963096495332786de18528ab819780

                SHA512

                260a14c66d8ed9ff4be9034485bb0648f3ea4493b82703f72a301f0d95b7028ca526a902840233be79fa1b7e442ff5049630afc03c642dba81876acf400c0795

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap0754.exe
                Filesize

                665KB

                MD5

                c42fcd7a77260808a7ee811716722abd

                SHA1

                c7397449416853686b8822d5aa4e834580b11585

                SHA256

                9684c8dc02964ed5979e802443a75847c3963096495332786de18528ab819780

                SHA512

                260a14c66d8ed9ff4be9034485bb0648f3ea4493b82703f72a301f0d95b7028ca526a902840233be79fa1b7e442ff5049630afc03c642dba81876acf400c0795

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w22Ne40.exe
                Filesize

                342KB

                MD5

                d89538f6fe6d4adcd3614618172e5638

                SHA1

                a052f14038cc4bd217184d7ace0e8d4f6d0f6232

                SHA256

                0b07bd3f821424485aa9f96227bedaaf20228460d7dce4928ea77ee737328bb2

                SHA512

                bfe817837334d6132a52449783c542edd37e95a37d77145f1bfa177c7a5c2d69322d8a24efa50a439415cdeaf31d67cba35d4eeafc6dcd382647f8573174e8fb

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w22Ne40.exe
                Filesize

                342KB

                MD5

                d89538f6fe6d4adcd3614618172e5638

                SHA1

                a052f14038cc4bd217184d7ace0e8d4f6d0f6232

                SHA256

                0b07bd3f821424485aa9f96227bedaaf20228460d7dce4928ea77ee737328bb2

                SHA512

                bfe817837334d6132a52449783c542edd37e95a37d77145f1bfa177c7a5c2d69322d8a24efa50a439415cdeaf31d67cba35d4eeafc6dcd382647f8573174e8fb

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap6029.exe
                Filesize

                329KB

                MD5

                480ab87bcece063554337a6b1d2b7d03

                SHA1

                f5c0e9805b019d29e6e5fbe7c9a0c370e8151343

                SHA256

                4ae7af96b012328e9601b8e018233728a28ada374165fe1f7220020ee9253864

                SHA512

                7a708233ae74128e9a1cce80589cd60ba6c87f5a7113ffae8c270d927b7da5703ed541e893e861a3a691ba2b7ce4f1e0dbd13e1827505bc0ab8b367169d623aa

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap6029.exe
                Filesize

                329KB

                MD5

                480ab87bcece063554337a6b1d2b7d03

                SHA1

                f5c0e9805b019d29e6e5fbe7c9a0c370e8151343

                SHA256

                4ae7af96b012328e9601b8e018233728a28ada374165fe1f7220020ee9253864

                SHA512

                7a708233ae74128e9a1cce80589cd60ba6c87f5a7113ffae8c270d927b7da5703ed541e893e861a3a691ba2b7ce4f1e0dbd13e1827505bc0ab8b367169d623aa

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz4597.exe
                Filesize

                12KB

                MD5

                01b116e6624b75053faf87c98777e74a

                SHA1

                f3dafb0b91ddba859aff85d16d770975743580d2

                SHA256

                95d9d38bbb399a5a2afeaf94e64934f6f117a3c5b9aa6be0daeeaa54c468c410

                SHA512

                502fca3c8ca9edbf50111788ff4d558296f665bfb7cdac01a902737ba5a6f74bf33ecb9421f3bdafc645cc11568978d3d92dd677d61679272bfab32a8075888d

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz4597.exe
                Filesize

                12KB

                MD5

                01b116e6624b75053faf87c98777e74a

                SHA1

                f3dafb0b91ddba859aff85d16d770975743580d2

                SHA256

                95d9d38bbb399a5a2afeaf94e64934f6f117a3c5b9aa6be0daeeaa54c468c410

                SHA512

                502fca3c8ca9edbf50111788ff4d558296f665bfb7cdac01a902737ba5a6f74bf33ecb9421f3bdafc645cc11568978d3d92dd677d61679272bfab32a8075888d

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0509CB.exe
                Filesize

                284KB

                MD5

                ffd6a658507b6409084dca99a169cd79

                SHA1

                bbced7f98d4d9a19d43af99ecd6510a9c5e28f0e

                SHA256

                0fa173b99311df44cd313a722abbd0dd3379940cffe97fc0c691cd720dbc257d

                SHA512

                878ae53819f34da3cd54d164fddec8aa2a03658fdce39568e314f1fb44af62a0e49b19b6a52c65e0b6815b382a51eb264c740acf0fd608a8c463e6577de64ea3

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0509CB.exe
                Filesize

                284KB

                MD5

                ffd6a658507b6409084dca99a169cd79

                SHA1

                bbced7f98d4d9a19d43af99ecd6510a9c5e28f0e

                SHA256

                0fa173b99311df44cd313a722abbd0dd3379940cffe97fc0c691cd720dbc257d

                SHA512

                878ae53819f34da3cd54d164fddec8aa2a03658fdce39568e314f1fb44af62a0e49b19b6a52c65e0b6815b382a51eb264c740acf0fd608a8c463e6577de64ea3

              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
                Filesize

                236KB

                MD5

                3b75f24b7da298bfa1a913c5cedb3df3

                SHA1

                a50992f04a48f93670b8b675699c5fffd9a10f30

                SHA256

                3bfc3b19a6c1dcf2f516a1558530d0c6b700c0a6c469a60a5515f84a2ffbeaa9

                SHA512

                8d3770310916d1b2556e10456d0c966000d5a7528d6f0685d469cf79bf7c2b08f035b39a810639dba461f0a97f750604f2dee530142aea0c4ad19c76a9e2222f

              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
                Filesize

                236KB

                MD5

                3b75f24b7da298bfa1a913c5cedb3df3

                SHA1

                a50992f04a48f93670b8b675699c5fffd9a10f30

                SHA256

                3bfc3b19a6c1dcf2f516a1558530d0c6b700c0a6c469a60a5515f84a2ffbeaa9

                SHA512

                8d3770310916d1b2556e10456d0c966000d5a7528d6f0685d469cf79bf7c2b08f035b39a810639dba461f0a97f750604f2dee530142aea0c4ad19c76a9e2222f

              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
                Filesize

                236KB

                MD5

                3b75f24b7da298bfa1a913c5cedb3df3

                SHA1

                a50992f04a48f93670b8b675699c5fffd9a10f30

                SHA256

                3bfc3b19a6c1dcf2f516a1558530d0c6b700c0a6c469a60a5515f84a2ffbeaa9

                SHA512

                8d3770310916d1b2556e10456d0c966000d5a7528d6f0685d469cf79bf7c2b08f035b39a810639dba461f0a97f750604f2dee530142aea0c4ad19c76a9e2222f

              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
                Filesize

                236KB

                MD5

                3b75f24b7da298bfa1a913c5cedb3df3

                SHA1

                a50992f04a48f93670b8b675699c5fffd9a10f30

                SHA256

                3bfc3b19a6c1dcf2f516a1558530d0c6b700c0a6c469a60a5515f84a2ffbeaa9

                SHA512

                8d3770310916d1b2556e10456d0c966000d5a7528d6f0685d469cf79bf7c2b08f035b39a810639dba461f0a97f750604f2dee530142aea0c4ad19c76a9e2222f

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                Filesize

                89KB

                MD5

                6a4c2f2b6e1bbce94b4d00e91e690d0d

                SHA1

                f61021fd82dabd2ccde8d1e46736b1a9f4e4ce57

                SHA256

                8b6af7cc4fc3bcb4172a2bf4a7727175ba48980bcc808e56ce7744d28af60a8f

                SHA512

                8c9154748e410b71942c5316b1bdcc5590f7f0da33c0139fb4c86087a78b8c16ab76f1fa724524169e0f3d1a3d1f138dfd60979ee3e4b6487a66532879371f01

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                Filesize

                89KB

                MD5

                6a4c2f2b6e1bbce94b4d00e91e690d0d

                SHA1

                f61021fd82dabd2ccde8d1e46736b1a9f4e4ce57

                SHA256

                8b6af7cc4fc3bcb4172a2bf4a7727175ba48980bcc808e56ce7744d28af60a8f

                SHA512

                8c9154748e410b71942c5316b1bdcc5590f7f0da33c0139fb4c86087a78b8c16ab76f1fa724524169e0f3d1a3d1f138dfd60979ee3e4b6487a66532879371f01

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                Filesize

                89KB

                MD5

                6a4c2f2b6e1bbce94b4d00e91e690d0d

                SHA1

                f61021fd82dabd2ccde8d1e46736b1a9f4e4ce57

                SHA256

                8b6af7cc4fc3bcb4172a2bf4a7727175ba48980bcc808e56ce7744d28af60a8f

                SHA512

                8c9154748e410b71942c5316b1bdcc5590f7f0da33c0139fb4c86087a78b8c16ab76f1fa724524169e0f3d1a3d1f138dfd60979ee3e4b6487a66532879371f01

              • memory/1572-175-0x0000000007230000-0x0000000007240000-memory.dmp
                Filesize

                64KB

              • memory/1572-192-0x0000000000400000-0x0000000002B75000-memory.dmp
                Filesize

                39.5MB

              • memory/1572-172-0x00000000070B0000-0x00000000070C2000-memory.dmp
                Filesize

                72KB

              • memory/1572-178-0x00000000070B0000-0x00000000070C2000-memory.dmp
                Filesize

                72KB

              • memory/1572-179-0x0000000007230000-0x0000000007240000-memory.dmp
                Filesize

                64KB

              • memory/1572-181-0x00000000070B0000-0x00000000070C2000-memory.dmp
                Filesize

                72KB

              • memory/1572-174-0x00000000070B0000-0x00000000070C2000-memory.dmp
                Filesize

                72KB

              • memory/1572-183-0x00000000070B0000-0x00000000070C2000-memory.dmp
                Filesize

                72KB

              • memory/1572-185-0x00000000070B0000-0x00000000070C2000-memory.dmp
                Filesize

                72KB

              • memory/1572-187-0x00000000070B0000-0x00000000070C2000-memory.dmp
                Filesize

                72KB

              • memory/1572-189-0x00000000070B0000-0x00000000070C2000-memory.dmp
                Filesize

                72KB

              • memory/1572-190-0x0000000000400000-0x0000000002B75000-memory.dmp
                Filesize

                39.5MB

              • memory/1572-193-0x0000000007230000-0x0000000007240000-memory.dmp
                Filesize

                64KB

              • memory/1572-177-0x0000000007230000-0x0000000007240000-memory.dmp
                Filesize

                64KB

              • memory/1572-194-0x0000000007230000-0x0000000007240000-memory.dmp
                Filesize

                64KB

              • memory/1572-195-0x0000000007230000-0x0000000007240000-memory.dmp
                Filesize

                64KB

              • memory/1572-155-0x0000000002B80000-0x0000000002BAD000-memory.dmp
                Filesize

                180KB

              • memory/1572-170-0x00000000070B0000-0x00000000070C2000-memory.dmp
                Filesize

                72KB

              • memory/1572-168-0x00000000070B0000-0x00000000070C2000-memory.dmp
                Filesize

                72KB

              • memory/1572-166-0x00000000070B0000-0x00000000070C2000-memory.dmp
                Filesize

                72KB

              • memory/1572-164-0x00000000070B0000-0x00000000070C2000-memory.dmp
                Filesize

                72KB

              • memory/1572-162-0x00000000070B0000-0x00000000070C2000-memory.dmp
                Filesize

                72KB

              • memory/1572-160-0x00000000070B0000-0x00000000070C2000-memory.dmp
                Filesize

                72KB

              • memory/1572-159-0x00000000070B0000-0x00000000070C2000-memory.dmp
                Filesize

                72KB

              • memory/1572-158-0x00000000070B0000-0x00000000070C8000-memory.dmp
                Filesize

                96KB

              • memory/1572-157-0x0000000007240000-0x000000000773E000-memory.dmp
                Filesize

                5.0MB

              • memory/1572-156-0x00000000046E0000-0x00000000046FA000-memory.dmp
                Filesize

                104KB

              • memory/3884-149-0x0000000000D40000-0x0000000000D4A000-memory.dmp
                Filesize

                40KB

              • memory/4600-204-0x0000000007130000-0x000000000716F000-memory.dmp
                Filesize

                252KB

              • memory/4600-1119-0x0000000007180000-0x0000000007190000-memory.dmp
                Filesize

                64KB

              • memory/4600-226-0x0000000007130000-0x000000000716F000-memory.dmp
                Filesize

                252KB

              • memory/4600-216-0x0000000007130000-0x000000000716F000-memory.dmp
                Filesize

                252KB

              • memory/4600-210-0x0000000007130000-0x000000000716F000-memory.dmp
                Filesize

                252KB

              • memory/4600-228-0x0000000007130000-0x000000000716F000-memory.dmp
                Filesize

                252KB

              • memory/4600-230-0x0000000007130000-0x000000000716F000-memory.dmp
                Filesize

                252KB

              • memory/4600-234-0x0000000007130000-0x000000000716F000-memory.dmp
                Filesize

                252KB

              • memory/4600-236-0x0000000007130000-0x000000000716F000-memory.dmp
                Filesize

                252KB

              • memory/4600-232-0x0000000007130000-0x000000000716F000-memory.dmp
                Filesize

                252KB

              • memory/4600-1109-0x0000000007CB0000-0x00000000082B6000-memory.dmp
                Filesize

                6.0MB

              • memory/4600-1110-0x0000000007720000-0x000000000782A000-memory.dmp
                Filesize

                1.0MB

              • memory/4600-1111-0x0000000007860000-0x0000000007872000-memory.dmp
                Filesize

                72KB

              • memory/4600-1112-0x0000000007880000-0x00000000078BE000-memory.dmp
                Filesize

                248KB

              • memory/4600-1113-0x0000000007180000-0x0000000007190000-memory.dmp
                Filesize

                64KB

              • memory/4600-1114-0x00000000079D0000-0x0000000007A1B000-memory.dmp
                Filesize

                300KB

              • memory/4600-1116-0x0000000007B60000-0x0000000007BC6000-memory.dmp
                Filesize

                408KB

              • memory/4600-1117-0x0000000008840000-0x00000000088D2000-memory.dmp
                Filesize

                584KB

              • memory/4600-1118-0x0000000008B50000-0x0000000008D12000-memory.dmp
                Filesize

                1.8MB

              • memory/4600-220-0x0000000007130000-0x000000000716F000-memory.dmp
                Filesize

                252KB

              • memory/4600-1120-0x0000000008D40000-0x000000000926C000-memory.dmp
                Filesize

                5.2MB

              • memory/4600-1122-0x0000000009390000-0x0000000009406000-memory.dmp
                Filesize

                472KB

              • memory/4600-222-0x0000000007130000-0x000000000716F000-memory.dmp
                Filesize

                252KB

              • memory/4600-1123-0x0000000009420000-0x0000000009470000-memory.dmp
                Filesize

                320KB

              • memory/4600-200-0x0000000004AB0000-0x0000000004AF6000-memory.dmp
                Filesize

                280KB

              • memory/4600-201-0x0000000002C60000-0x0000000002CAB000-memory.dmp
                Filesize

                300KB

              • memory/4600-202-0x0000000007130000-0x0000000007174000-memory.dmp
                Filesize

                272KB

              • memory/4600-203-0x0000000007130000-0x000000000716F000-memory.dmp
                Filesize

                252KB

              • memory/4600-224-0x0000000007130000-0x000000000716F000-memory.dmp
                Filesize

                252KB

              • memory/4600-218-0x0000000007130000-0x000000000716F000-memory.dmp
                Filesize

                252KB

              • memory/4600-212-0x0000000007130000-0x000000000716F000-memory.dmp
                Filesize

                252KB

              • memory/4600-214-0x0000000007130000-0x000000000716F000-memory.dmp
                Filesize

                252KB

              • memory/4600-208-0x0000000007130000-0x000000000716F000-memory.dmp
                Filesize

                252KB

              • memory/4600-206-0x0000000007130000-0x000000000716F000-memory.dmp
                Filesize

                252KB

              • memory/4756-1132-0x00000000053F0000-0x0000000005400000-memory.dmp
                Filesize

                64KB

              • memory/4756-1131-0x00000000053F0000-0x0000000005400000-memory.dmp
                Filesize

                64KB

              • memory/4756-1130-0x0000000005290000-0x00000000052DB000-memory.dmp
                Filesize

                300KB

              • memory/4756-1129-0x0000000000850000-0x0000000000882000-memory.dmp
                Filesize

                200KB