Analysis

  • max time kernel
    143s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 11:56

General

  • Target

    setup.exe

  • Size

    976KB

  • MD5

    7ac4f24ee894f6600df3fe460721384d

  • SHA1

    f71a4c3929ee29cbf420e0f6393d6620917c3591

  • SHA256

    9d068ce15d60a71c72e55b7d3cb8963c2733b8aa7c9de4942f971fa08466056b

  • SHA512

    afbeebb85e738e79a27af2b63db790ea29bc36682a52ec13d7e00f27ef92e852875e215f92d1d720d8f1ac83cae301d9cbe3058456ec0b218450ccb58057fb96

  • SSDEEP

    24576:6y0WnvKY4dpzLTRzHX4qlMkYSMteO2iubaoPH6lq:B08KnfSSGeXiubaa

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

link

C2

176.113.115.145:4125

Attributes
  • auth_value

    77e4c7bc6fea5ae755b29e8aea8f7012

Extracted

Family

amadey

Version

3.69

C2

193.233.20.36/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4492
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1596.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1596.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1560
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap2355.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap2355.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1444
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2047.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2047.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1580
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz7727.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz7727.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3892
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1717PU.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1717PU.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3656
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w80Po49.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w80Po49.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4176
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xzPDH55.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xzPDH55.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2296
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y33ec96.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y33ec96.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3808
      • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4092
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:5096
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c5d2db5804" /P "Admin:N"&&CACLS "..\c5d2db5804" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:376
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:5020
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:1492
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:2720
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:5040
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c5d2db5804" /P "Admin:N"
                    5⤵
                      PID:4764
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c5d2db5804" /P "Admin:R" /E
                      5⤵
                        PID:4484
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:4520
              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:3972
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe start wuauserv
                1⤵
                • Launches sc.exe
                PID:2948

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Defense Evasion

              Modify Registry

              3
              T1112

              Disabling Security Tools

              2
              T1089

              Credential Access

              Credentials in Files

              2
              T1081

              Discovery

              Query Registry

              2
              T1012

              System Information Discovery

              2
              T1082

              Collection

              Data from Local System

              2
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y33ec96.exe
                Filesize

                237KB

                MD5

                33637dd06184a26597e470e952136ef4

                SHA1

                06d29b4413d0e4b3dbae2b8751a55a9735507a9a

                SHA256

                7a65704ae1cc7eb06c5314a7e4cf9f3a8bf2d4cab4828277c51dbb820dd2fe0c

                SHA512

                6bae22739c596ff13dd2425b8acce00bd8a8220a62843bc82ff78f5532595f556833104f4180c4c11a9954783392e04bb41a99d7bb8ed136326dc8151e6d49fd

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y33ec96.exe
                Filesize

                237KB

                MD5

                33637dd06184a26597e470e952136ef4

                SHA1

                06d29b4413d0e4b3dbae2b8751a55a9735507a9a

                SHA256

                7a65704ae1cc7eb06c5314a7e4cf9f3a8bf2d4cab4828277c51dbb820dd2fe0c

                SHA512

                6bae22739c596ff13dd2425b8acce00bd8a8220a62843bc82ff78f5532595f556833104f4180c4c11a9954783392e04bb41a99d7bb8ed136326dc8151e6d49fd

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1596.exe
                Filesize

                791KB

                MD5

                8fdeaaa886045289ad3dae32f2365560

                SHA1

                4dbdcb7924ad2ed1943e6b7b676656648065ad45

                SHA256

                046167aa7ef842a4ba36d348bc29da9ee40fd8b75a8e916a810d0fb61ecb737b

                SHA512

                b5c841458fecf39867c079348bc90b6eaef5167fd96247055f09aa50477a82420b13b1f5763718fda6200e6c4cd3643061116cb1a86cb020031509cbb7153941

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1596.exe
                Filesize

                791KB

                MD5

                8fdeaaa886045289ad3dae32f2365560

                SHA1

                4dbdcb7924ad2ed1943e6b7b676656648065ad45

                SHA256

                046167aa7ef842a4ba36d348bc29da9ee40fd8b75a8e916a810d0fb61ecb737b

                SHA512

                b5c841458fecf39867c079348bc90b6eaef5167fd96247055f09aa50477a82420b13b1f5763718fda6200e6c4cd3643061116cb1a86cb020031509cbb7153941

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xzPDH55.exe
                Filesize

                176KB

                MD5

                84e0896b47ee8b68f13b2497354d239c

                SHA1

                7707ced682e8756fe532e99cef8982b42f9c0371

                SHA256

                731f7fa3d9e24f40720f7233832a31bad4cfa3e86a8d3536608c16e913470173

                SHA512

                415d284c94692492a1ea2d2586b020e529f28c3fd33cc521fdd7e480de00fac8230dfe4f58580487ccac9bc6f5cd385f2c67db7b83d2d8afe3f20c056a566fe1

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xzPDH55.exe
                Filesize

                176KB

                MD5

                84e0896b47ee8b68f13b2497354d239c

                SHA1

                7707ced682e8756fe532e99cef8982b42f9c0371

                SHA256

                731f7fa3d9e24f40720f7233832a31bad4cfa3e86a8d3536608c16e913470173

                SHA512

                415d284c94692492a1ea2d2586b020e529f28c3fd33cc521fdd7e480de00fac8230dfe4f58580487ccac9bc6f5cd385f2c67db7b83d2d8afe3f20c056a566fe1

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap2355.exe
                Filesize

                649KB

                MD5

                e93992c51363abdedbc783814891494a

                SHA1

                24d1a3c3f73064646a9dca740afebc51202c9f90

                SHA256

                753d6f7f87c97acabe0c1bdbebeacd53cd12ef1e809cc77b4e004b8aa42fc8f1

                SHA512

                6b8190d1de2ab549677addcd87df1f2afd2e302220413f312a48e4865f4293fd745e227840b78111a94604deead4dd5b85b6da6e9b40bca207af2b8ca354ec1e

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap2355.exe
                Filesize

                649KB

                MD5

                e93992c51363abdedbc783814891494a

                SHA1

                24d1a3c3f73064646a9dca740afebc51202c9f90

                SHA256

                753d6f7f87c97acabe0c1bdbebeacd53cd12ef1e809cc77b4e004b8aa42fc8f1

                SHA512

                6b8190d1de2ab549677addcd87df1f2afd2e302220413f312a48e4865f4293fd745e227840b78111a94604deead4dd5b85b6da6e9b40bca207af2b8ca354ec1e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w80Po49.exe
                Filesize

                295KB

                MD5

                0dd1da4efbc88c5b9da039e55d761484

                SHA1

                865620a1211ae5130106097f3779fceb5ec79d5c

                SHA256

                404f3b4b356b236eda0e77ddf1b7101884b2d0e50f946bf53976364212c26c0f

                SHA512

                799764f07cc603316323b283da890436c57969dd11196805943c7d28c665dbe78718641cb772c51d080ed0a38df44382f23b0497575be514ab4e0a26fd2b9a7e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w80Po49.exe
                Filesize

                295KB

                MD5

                0dd1da4efbc88c5b9da039e55d761484

                SHA1

                865620a1211ae5130106097f3779fceb5ec79d5c

                SHA256

                404f3b4b356b236eda0e77ddf1b7101884b2d0e50f946bf53976364212c26c0f

                SHA512

                799764f07cc603316323b283da890436c57969dd11196805943c7d28c665dbe78718641cb772c51d080ed0a38df44382f23b0497575be514ab4e0a26fd2b9a7e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2047.exe
                Filesize

                321KB

                MD5

                27adda2a96e8a7299a5ff11461599534

                SHA1

                f563ba00cff9572e1eb9d6aa7d331ecde1d1d606

                SHA256

                f158b716ee0c650ddad219c817d98e438e478aa535e050e3b40145d29afd2a5b

                SHA512

                6a1b1071e327f26d93f1aa8fad78ed887c0112ef03ba8cd0632505eea8d9dbf7ada7d1bb26b241075e347ec559c56521cfc30af90d765e8dfbebae109190bf70

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2047.exe
                Filesize

                321KB

                MD5

                27adda2a96e8a7299a5ff11461599534

                SHA1

                f563ba00cff9572e1eb9d6aa7d331ecde1d1d606

                SHA256

                f158b716ee0c650ddad219c817d98e438e478aa535e050e3b40145d29afd2a5b

                SHA512

                6a1b1071e327f26d93f1aa8fad78ed887c0112ef03ba8cd0632505eea8d9dbf7ada7d1bb26b241075e347ec559c56521cfc30af90d765e8dfbebae109190bf70

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz7727.exe
                Filesize

                14KB

                MD5

                b705ff51f29be31ce07f174f377afb00

                SHA1

                48e79c455cdad7e8d5ef3ae7d424a0f960e47271

                SHA256

                5cde1dd8ebfb436ce9a7602b1cf2b659f37d4601df703dc78153e51754e38ed7

                SHA512

                c488c0ac223b53a4dca6bc9b1446ae91d5f1ac76fd525e869db348a58db3112068c348d65e168d3e7e751c2ca348eaf3b5596e2fd13efd0b2d2b55d4eb159747

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz7727.exe
                Filesize

                14KB

                MD5

                b705ff51f29be31ce07f174f377afb00

                SHA1

                48e79c455cdad7e8d5ef3ae7d424a0f960e47271

                SHA256

                5cde1dd8ebfb436ce9a7602b1cf2b659f37d4601df703dc78153e51754e38ed7

                SHA512

                c488c0ac223b53a4dca6bc9b1446ae91d5f1ac76fd525e869db348a58db3112068c348d65e168d3e7e751c2ca348eaf3b5596e2fd13efd0b2d2b55d4eb159747

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1717PU.exe
                Filesize

                236KB

                MD5

                ff9ed7a2a5cb5defc88e001e96869cfa

                SHA1

                e0feaf5bd2cbfa657541cb66e6d031d602ec8ce4

                SHA256

                32fed381504bee547905cccb2b70bc4db0797fb552aad35c55567057aebd3db4

                SHA512

                d1f0ade9d13cf1a6797f0019a754fe57c73078ae695806b0246f0dd9a84bd829d7776202b027ffb51cb6c55639ed6ce4e74ed58728d313a1045b63d8b3b16edd

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1717PU.exe
                Filesize

                236KB

                MD5

                ff9ed7a2a5cb5defc88e001e96869cfa

                SHA1

                e0feaf5bd2cbfa657541cb66e6d031d602ec8ce4

                SHA256

                32fed381504bee547905cccb2b70bc4db0797fb552aad35c55567057aebd3db4

                SHA512

                d1f0ade9d13cf1a6797f0019a754fe57c73078ae695806b0246f0dd9a84bd829d7776202b027ffb51cb6c55639ed6ce4e74ed58728d313a1045b63d8b3b16edd

              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
                Filesize

                237KB

                MD5

                33637dd06184a26597e470e952136ef4

                SHA1

                06d29b4413d0e4b3dbae2b8751a55a9735507a9a

                SHA256

                7a65704ae1cc7eb06c5314a7e4cf9f3a8bf2d4cab4828277c51dbb820dd2fe0c

                SHA512

                6bae22739c596ff13dd2425b8acce00bd8a8220a62843bc82ff78f5532595f556833104f4180c4c11a9954783392e04bb41a99d7bb8ed136326dc8151e6d49fd

              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
                Filesize

                237KB

                MD5

                33637dd06184a26597e470e952136ef4

                SHA1

                06d29b4413d0e4b3dbae2b8751a55a9735507a9a

                SHA256

                7a65704ae1cc7eb06c5314a7e4cf9f3a8bf2d4cab4828277c51dbb820dd2fe0c

                SHA512

                6bae22739c596ff13dd2425b8acce00bd8a8220a62843bc82ff78f5532595f556833104f4180c4c11a9954783392e04bb41a99d7bb8ed136326dc8151e6d49fd

              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
                Filesize

                237KB

                MD5

                33637dd06184a26597e470e952136ef4

                SHA1

                06d29b4413d0e4b3dbae2b8751a55a9735507a9a

                SHA256

                7a65704ae1cc7eb06c5314a7e4cf9f3a8bf2d4cab4828277c51dbb820dd2fe0c

                SHA512

                6bae22739c596ff13dd2425b8acce00bd8a8220a62843bc82ff78f5532595f556833104f4180c4c11a9954783392e04bb41a99d7bb8ed136326dc8151e6d49fd

              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
                Filesize

                237KB

                MD5

                33637dd06184a26597e470e952136ef4

                SHA1

                06d29b4413d0e4b3dbae2b8751a55a9735507a9a

                SHA256

                7a65704ae1cc7eb06c5314a7e4cf9f3a8bf2d4cab4828277c51dbb820dd2fe0c

                SHA512

                6bae22739c596ff13dd2425b8acce00bd8a8220a62843bc82ff78f5532595f556833104f4180c4c11a9954783392e04bb41a99d7bb8ed136326dc8151e6d49fd

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                Filesize

                89KB

                MD5

                6a4c2f2b6e1bbce94b4d00e91e690d0d

                SHA1

                f61021fd82dabd2ccde8d1e46736b1a9f4e4ce57

                SHA256

                8b6af7cc4fc3bcb4172a2bf4a7727175ba48980bcc808e56ce7744d28af60a8f

                SHA512

                8c9154748e410b71942c5316b1bdcc5590f7f0da33c0139fb4c86087a78b8c16ab76f1fa724524169e0f3d1a3d1f138dfd60979ee3e4b6487a66532879371f01

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                Filesize

                89KB

                MD5

                6a4c2f2b6e1bbce94b4d00e91e690d0d

                SHA1

                f61021fd82dabd2ccde8d1e46736b1a9f4e4ce57

                SHA256

                8b6af7cc4fc3bcb4172a2bf4a7727175ba48980bcc808e56ce7744d28af60a8f

                SHA512

                8c9154748e410b71942c5316b1bdcc5590f7f0da33c0139fb4c86087a78b8c16ab76f1fa724524169e0f3d1a3d1f138dfd60979ee3e4b6487a66532879371f01

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                Filesize

                89KB

                MD5

                6a4c2f2b6e1bbce94b4d00e91e690d0d

                SHA1

                f61021fd82dabd2ccde8d1e46736b1a9f4e4ce57

                SHA256

                8b6af7cc4fc3bcb4172a2bf4a7727175ba48980bcc808e56ce7744d28af60a8f

                SHA512

                8c9154748e410b71942c5316b1bdcc5590f7f0da33c0139fb4c86087a78b8c16ab76f1fa724524169e0f3d1a3d1f138dfd60979ee3e4b6487a66532879371f01

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/2296-1141-0x0000000005060000-0x0000000005070000-memory.dmp
                Filesize

                64KB

              • memory/2296-1140-0x0000000000750000-0x0000000000782000-memory.dmp
                Filesize

                200KB

              • memory/3656-183-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
                Filesize

                72KB

              • memory/3656-185-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
                Filesize

                72KB

              • memory/3656-191-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
                Filesize

                72KB

              • memory/3656-193-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
                Filesize

                72KB

              • memory/3656-195-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
                Filesize

                72KB

              • memory/3656-197-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
                Filesize

                72KB

              • memory/3656-199-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
                Filesize

                72KB

              • memory/3656-200-0x0000000000400000-0x00000000004AA000-memory.dmp
                Filesize

                680KB

              • memory/3656-201-0x0000000002210000-0x0000000002220000-memory.dmp
                Filesize

                64KB

              • memory/3656-202-0x0000000002210000-0x0000000002220000-memory.dmp
                Filesize

                64KB

              • memory/3656-204-0x0000000000400000-0x00000000004AA000-memory.dmp
                Filesize

                680KB

              • memory/3656-167-0x00000000049E0000-0x0000000004F84000-memory.dmp
                Filesize

                5.6MB

              • memory/3656-187-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
                Filesize

                72KB

              • memory/3656-189-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
                Filesize

                72KB

              • memory/3656-181-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
                Filesize

                72KB

              • memory/3656-179-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
                Filesize

                72KB

              • memory/3656-177-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
                Filesize

                72KB

              • memory/3656-175-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
                Filesize

                72KB

              • memory/3656-173-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
                Filesize

                72KB

              • memory/3656-172-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
                Filesize

                72KB

              • memory/3656-169-0x0000000002210000-0x0000000002220000-memory.dmp
                Filesize

                64KB

              • memory/3656-171-0x0000000002210000-0x0000000002220000-memory.dmp
                Filesize

                64KB

              • memory/3656-170-0x0000000002210000-0x0000000002220000-memory.dmp
                Filesize

                64KB

              • memory/3656-168-0x00000000005C0000-0x00000000005ED000-memory.dmp
                Filesize

                180KB

              • memory/3892-161-0x0000000000BC0000-0x0000000000BCA000-memory.dmp
                Filesize

                40KB

              • memory/4176-220-0x0000000004AD0000-0x0000000004B0F000-memory.dmp
                Filesize

                252KB

              • memory/4176-236-0x0000000004AD0000-0x0000000004B0F000-memory.dmp
                Filesize

                252KB

              • memory/4176-238-0x0000000004AD0000-0x0000000004B0F000-memory.dmp
                Filesize

                252KB

              • memory/4176-240-0x0000000004AD0000-0x0000000004B0F000-memory.dmp
                Filesize

                252KB

              • memory/4176-242-0x0000000004AD0000-0x0000000004B0F000-memory.dmp
                Filesize

                252KB

              • memory/4176-634-0x0000000000760000-0x00000000007AB000-memory.dmp
                Filesize

                300KB

              • memory/4176-639-0x0000000004BE0000-0x0000000004BF0000-memory.dmp
                Filesize

                64KB

              • memory/4176-641-0x0000000004BE0000-0x0000000004BF0000-memory.dmp
                Filesize

                64KB

              • memory/4176-637-0x0000000004BE0000-0x0000000004BF0000-memory.dmp
                Filesize

                64KB

              • memory/4176-1119-0x00000000051A0000-0x00000000057B8000-memory.dmp
                Filesize

                6.1MB

              • memory/4176-1120-0x00000000057C0000-0x00000000058CA000-memory.dmp
                Filesize

                1.0MB

              • memory/4176-1121-0x0000000004BB0000-0x0000000004BC2000-memory.dmp
                Filesize

                72KB

              • memory/4176-1122-0x00000000058D0000-0x000000000590C000-memory.dmp
                Filesize

                240KB

              • memory/4176-1123-0x0000000004BE0000-0x0000000004BF0000-memory.dmp
                Filesize

                64KB

              • memory/4176-1124-0x0000000005BB0000-0x0000000005C42000-memory.dmp
                Filesize

                584KB

              • memory/4176-1125-0x0000000005C50000-0x0000000005CB6000-memory.dmp
                Filesize

                408KB

              • memory/4176-1126-0x0000000006370000-0x0000000006532000-memory.dmp
                Filesize

                1.8MB

              • memory/4176-1127-0x0000000006550000-0x0000000006A7C000-memory.dmp
                Filesize

                5.2MB

              • memory/4176-1129-0x0000000004BE0000-0x0000000004BF0000-memory.dmp
                Filesize

                64KB

              • memory/4176-1130-0x0000000004BE0000-0x0000000004BF0000-memory.dmp
                Filesize

                64KB

              • memory/4176-1131-0x0000000004BE0000-0x0000000004BF0000-memory.dmp
                Filesize

                64KB

              • memory/4176-1132-0x0000000006E20000-0x0000000006E96000-memory.dmp
                Filesize

                472KB

              • memory/4176-1133-0x0000000006EA0000-0x0000000006EF0000-memory.dmp
                Filesize

                320KB

              • memory/4176-234-0x0000000004AD0000-0x0000000004B0F000-memory.dmp
                Filesize

                252KB

              • memory/4176-232-0x0000000004AD0000-0x0000000004B0F000-memory.dmp
                Filesize

                252KB

              • memory/4176-230-0x0000000004AD0000-0x0000000004B0F000-memory.dmp
                Filesize

                252KB

              • memory/4176-228-0x0000000004AD0000-0x0000000004B0F000-memory.dmp
                Filesize

                252KB

              • memory/4176-226-0x0000000004AD0000-0x0000000004B0F000-memory.dmp
                Filesize

                252KB

              • memory/4176-224-0x0000000004AD0000-0x0000000004B0F000-memory.dmp
                Filesize

                252KB

              • memory/4176-222-0x0000000004AD0000-0x0000000004B0F000-memory.dmp
                Filesize

                252KB

              • memory/4176-218-0x0000000004AD0000-0x0000000004B0F000-memory.dmp
                Filesize

                252KB

              • memory/4176-216-0x0000000004AD0000-0x0000000004B0F000-memory.dmp
                Filesize

                252KB

              • memory/4176-214-0x0000000004AD0000-0x0000000004B0F000-memory.dmp
                Filesize

                252KB

              • memory/4176-212-0x0000000004AD0000-0x0000000004B0F000-memory.dmp
                Filesize

                252KB

              • memory/4176-209-0x0000000004AD0000-0x0000000004B0F000-memory.dmp
                Filesize

                252KB

              • memory/4176-210-0x0000000004AD0000-0x0000000004B0F000-memory.dmp
                Filesize

                252KB

              • memory/4176-1134-0x0000000004BE0000-0x0000000004BF0000-memory.dmp
                Filesize

                64KB