Analysis

  • max time kernel
    136s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-04-2023 10:46

General

  • Target

    ce0660fda4c9b14e52a913cbeb7bcf1ec0d875caf19c27afab15e3af1f2584e4.exe

  • Size

    983KB

  • MD5

    06b57e3128fc523c5777f7eb802445e2

  • SHA1

    c43c3ebcf884a9d8a64b00949277c687e8bac795

  • SHA256

    ce0660fda4c9b14e52a913cbeb7bcf1ec0d875caf19c27afab15e3af1f2584e4

  • SHA512

    0abddb6eadc12c314cff6534c65af307c0aa438d17eeeaa8acb921458287d15885ea90f41ffc47cea3fac894c8a9daa9ca84e10f819e14a764ac29f59a2530ca

  • SSDEEP

    24576:jyv/P6xRBRTNY00cmLE0+WInioIUr6mFyXmM:2v/4R5KcmCV1JD

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

amadey

Version

3.70

C2

77.91.124.207/plays/chapter/index.php

Extracted

Family

redline

Botnet

nord

C2

176.113.115.145:4125

Attributes
  • auth_value

    ebb7d38cdbd7c83cf6363ef3feb3a530

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce0660fda4c9b14e52a913cbeb7bcf1ec0d875caf19c27afab15e3af1f2584e4.exe
    "C:\Users\Admin\AppData\Local\Temp\ce0660fda4c9b14e52a913cbeb7bcf1ec0d875caf19c27afab15e3af1f2584e4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4928
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina3796.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina3796.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3196
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina3395.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina3395.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4164
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina6466.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina6466.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:364
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az946339.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az946339.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3056
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu562553.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu562553.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1200
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1200 -s 1080
              6⤵
              • Program crash
              PID:4492
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor1211.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor1211.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1080
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1080 -s 1336
            5⤵
            • Program crash
            PID:400
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\drP61s14.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\drP61s14.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:776
        • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
          "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3716
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:1564
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
            5⤵
            • Loads dropped DLL
            PID:1876
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge182971.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge182971.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1888
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1200 -ip 1200
    1⤵
      PID:3888
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1080 -ip 1080
      1⤵
        PID:5044
      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:4820
      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:376

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        Filesize

        229KB

        MD5

        6c07711a17452b855149a95cda6fc830

        SHA1

        5b3252c2567de78f9ae68764d4e30511a509fdcc

        SHA256

        eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

        SHA512

        ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        Filesize

        229KB

        MD5

        6c07711a17452b855149a95cda6fc830

        SHA1

        5b3252c2567de78f9ae68764d4e30511a509fdcc

        SHA256

        eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

        SHA512

        ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        Filesize

        229KB

        MD5

        6c07711a17452b855149a95cda6fc830

        SHA1

        5b3252c2567de78f9ae68764d4e30511a509fdcc

        SHA256

        eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

        SHA512

        ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        Filesize

        229KB

        MD5

        6c07711a17452b855149a95cda6fc830

        SHA1

        5b3252c2567de78f9ae68764d4e30511a509fdcc

        SHA256

        eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

        SHA512

        ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        Filesize

        229KB

        MD5

        6c07711a17452b855149a95cda6fc830

        SHA1

        5b3252c2567de78f9ae68764d4e30511a509fdcc

        SHA256

        eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

        SHA512

        ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge182971.exe
        Filesize

        175KB

        MD5

        47b52e7049909e34f093a814f4d0a4aa

        SHA1

        af61fcd6bba0cba8fd43d5082cadd754a58db5c1

        SHA256

        ab6ea41c93266c2e20a168fdc19f03efb8d2296e268868b2898704023318e02d

        SHA512

        4a6315154352c8b16a2fecc70db4ad5a48e6ed9bbc16d7e030c2bb87a9a7314e6c131fb232066267fcb8122c96b8fbb3c639569438c75fb42268c02a199ded43

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge182971.exe
        Filesize

        175KB

        MD5

        47b52e7049909e34f093a814f4d0a4aa

        SHA1

        af61fcd6bba0cba8fd43d5082cadd754a58db5c1

        SHA256

        ab6ea41c93266c2e20a168fdc19f03efb8d2296e268868b2898704023318e02d

        SHA512

        4a6315154352c8b16a2fecc70db4ad5a48e6ed9bbc16d7e030c2bb87a9a7314e6c131fb232066267fcb8122c96b8fbb3c639569438c75fb42268c02a199ded43

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina3796.exe
        Filesize

        841KB

        MD5

        0d94d45552ada53fad58b2bbb30dbec2

        SHA1

        b38ca8c12e17f88abff725e98858bead4cb77fcc

        SHA256

        5ac3398aef19efc16129288ad1153034826534d811134124793886f36afaf2da

        SHA512

        dbd023d5b251d1d292bce17d9c73941128bdeaad8dc635d5e08d27cc37d4820f2f04dff7d395405de0a354104a67cc4aa6958bc336e7a382358d9aac767a6d80

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina3796.exe
        Filesize

        841KB

        MD5

        0d94d45552ada53fad58b2bbb30dbec2

        SHA1

        b38ca8c12e17f88abff725e98858bead4cb77fcc

        SHA256

        5ac3398aef19efc16129288ad1153034826534d811134124793886f36afaf2da

        SHA512

        dbd023d5b251d1d292bce17d9c73941128bdeaad8dc635d5e08d27cc37d4820f2f04dff7d395405de0a354104a67cc4aa6958bc336e7a382358d9aac767a6d80

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\drP61s14.exe
        Filesize

        229KB

        MD5

        6c07711a17452b855149a95cda6fc830

        SHA1

        5b3252c2567de78f9ae68764d4e30511a509fdcc

        SHA256

        eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

        SHA512

        ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\drP61s14.exe
        Filesize

        229KB

        MD5

        6c07711a17452b855149a95cda6fc830

        SHA1

        5b3252c2567de78f9ae68764d4e30511a509fdcc

        SHA256

        eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

        SHA512

        ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina3395.exe
        Filesize

        659KB

        MD5

        eaa6fbca8d3e2b3acca8618a83b0c5ff

        SHA1

        2b0f3320e80a59dfcc26d478580ce251bc110051

        SHA256

        f2c3538fbfdb903142dbc271b2ddfe420c3f0a55cf3a2267156ff9a04764cf84

        SHA512

        0bbf53640b7bbb928cc94884fabaa18ad044ccc723bea9b2f2ef502b18a86e908d876a6d06840d62073247f9a44e687b3bec096b11ce5e02c6a28c25df3e2d15

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina3395.exe
        Filesize

        659KB

        MD5

        eaa6fbca8d3e2b3acca8618a83b0c5ff

        SHA1

        2b0f3320e80a59dfcc26d478580ce251bc110051

        SHA256

        f2c3538fbfdb903142dbc271b2ddfe420c3f0a55cf3a2267156ff9a04764cf84

        SHA512

        0bbf53640b7bbb928cc94884fabaa18ad044ccc723bea9b2f2ef502b18a86e908d876a6d06840d62073247f9a44e687b3bec096b11ce5e02c6a28c25df3e2d15

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor1211.exe
        Filesize

        299KB

        MD5

        5e177d445b6e441b8282fd8a316ed1c2

        SHA1

        61b6489fc121fdcc5e57c468c1ad2a249969201a

        SHA256

        59ad673a91efeee55908cf13c89164f3c65b0af9d7bcd9141935d02d2a271961

        SHA512

        642d6e66ece18aeaef06944b62e233eb10a9419878d1f4b9274f65d50af5f96da9b006656cbc9a984a13a4080b2692b75424b343f8d8b41c98ccc54963172423

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor1211.exe
        Filesize

        299KB

        MD5

        5e177d445b6e441b8282fd8a316ed1c2

        SHA1

        61b6489fc121fdcc5e57c468c1ad2a249969201a

        SHA256

        59ad673a91efeee55908cf13c89164f3c65b0af9d7bcd9141935d02d2a271961

        SHA512

        642d6e66ece18aeaef06944b62e233eb10a9419878d1f4b9274f65d50af5f96da9b006656cbc9a984a13a4080b2692b75424b343f8d8b41c98ccc54963172423

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina6466.exe
        Filesize

        325KB

        MD5

        f835bf7e9d258809cfb88751bf474b71

        SHA1

        fac6d7275f14355de504d7ee8c93aa180e44ccdb

        SHA256

        0bda3d272a2ef9cfb7164a9a8ac0b9677f34e84fb9fbce9b8506119189360d72

        SHA512

        77e115eab3f8912ebfaefa0bdd4f5e228107fa86fc044f041a0e1d15237a9d67a435539daf5fb5062471bcff5acb6e38449c133d41e4cc46b831efd2152da1ac

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina6466.exe
        Filesize

        325KB

        MD5

        f835bf7e9d258809cfb88751bf474b71

        SHA1

        fac6d7275f14355de504d7ee8c93aa180e44ccdb

        SHA256

        0bda3d272a2ef9cfb7164a9a8ac0b9677f34e84fb9fbce9b8506119189360d72

        SHA512

        77e115eab3f8912ebfaefa0bdd4f5e228107fa86fc044f041a0e1d15237a9d67a435539daf5fb5062471bcff5acb6e38449c133d41e4cc46b831efd2152da1ac

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az946339.exe
        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az946339.exe
        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu562553.exe
        Filesize

        239KB

        MD5

        ce446aaa6c19841e26bf4d22484a3fcd

        SHA1

        6d60c476e929687cffa91c64250ec3642d747085

        SHA256

        fec15ea29c676d474433bd0bcd0fa349c1b249ab6f798308c942792ea3588dc6

        SHA512

        d0bbb038170b412a6a29adf9f41fa01b07f5f25251fa7028908970caf8b0c79f11a9a991ea60a4218d18f3f54f9305b87f259bcc6ec5ae1d5120acec919e7d82

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu562553.exe
        Filesize

        239KB

        MD5

        ce446aaa6c19841e26bf4d22484a3fcd

        SHA1

        6d60c476e929687cffa91c64250ec3642d747085

        SHA256

        fec15ea29c676d474433bd0bcd0fa349c1b249ab6f798308c942792ea3588dc6

        SHA512

        d0bbb038170b412a6a29adf9f41fa01b07f5f25251fa7028908970caf8b0c79f11a9a991ea60a4218d18f3f54f9305b87f259bcc6ec5ae1d5120acec919e7d82

      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
        Filesize

        89KB

        MD5

        4061d8dd5006b99d06fa208c0063dfcf

        SHA1

        38e7df8d8e631f3e9b227df3b9326d187e18cce5

        SHA256

        b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0

        SHA512

        71de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314

      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
        Filesize

        89KB

        MD5

        4061d8dd5006b99d06fa208c0063dfcf

        SHA1

        38e7df8d8e631f3e9b227df3b9326d187e18cce5

        SHA256

        b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0

        SHA512

        71de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314

      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
        Filesize

        89KB

        MD5

        4061d8dd5006b99d06fa208c0063dfcf

        SHA1

        38e7df8d8e631f3e9b227df3b9326d187e18cce5

        SHA256

        b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0

        SHA512

        71de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314

      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
        Filesize

        162B

        MD5

        1b7c22a214949975556626d7217e9a39

        SHA1

        d01c97e2944166ed23e47e4a62ff471ab8fa031f

        SHA256

        340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

        SHA512

        ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

      • memory/1080-1127-0x0000000004A80000-0x0000000004A90000-memory.dmp
        Filesize

        64KB

      • memory/1080-502-0x0000000004A80000-0x0000000004A90000-memory.dmp
        Filesize

        64KB

      • memory/1080-1134-0x00000000069B0000-0x0000000006EDC000-memory.dmp
        Filesize

        5.2MB

      • memory/1080-1133-0x00000000067E0000-0x00000000069A2000-memory.dmp
        Filesize

        1.8MB

      • memory/1080-1132-0x0000000004A80000-0x0000000004A90000-memory.dmp
        Filesize

        64KB

      • memory/1080-1131-0x0000000006620000-0x0000000006670000-memory.dmp
        Filesize

        320KB

      • memory/1080-1130-0x0000000006590000-0x0000000006606000-memory.dmp
        Filesize

        472KB

      • memory/1080-1129-0x0000000004A80000-0x0000000004A90000-memory.dmp
        Filesize

        64KB

      • memory/1080-1128-0x0000000004A80000-0x0000000004A90000-memory.dmp
        Filesize

        64KB

      • memory/1080-1125-0x0000000005D90000-0x0000000005DF6000-memory.dmp
        Filesize

        408KB

      • memory/1080-1124-0x0000000005CF0000-0x0000000005D82000-memory.dmp
        Filesize

        584KB

      • memory/1080-1123-0x0000000005A00000-0x0000000005A3C000-memory.dmp
        Filesize

        240KB

      • memory/1080-210-0x0000000005040000-0x000000000507F000-memory.dmp
        Filesize

        252KB

      • memory/1080-209-0x0000000005040000-0x000000000507F000-memory.dmp
        Filesize

        252KB

      • memory/1080-212-0x0000000005040000-0x000000000507F000-memory.dmp
        Filesize

        252KB

      • memory/1080-214-0x0000000005040000-0x000000000507F000-memory.dmp
        Filesize

        252KB

      • memory/1080-216-0x0000000005040000-0x000000000507F000-memory.dmp
        Filesize

        252KB

      • memory/1080-218-0x0000000005040000-0x000000000507F000-memory.dmp
        Filesize

        252KB

      • memory/1080-220-0x0000000005040000-0x000000000507F000-memory.dmp
        Filesize

        252KB

      • memory/1080-222-0x0000000005040000-0x000000000507F000-memory.dmp
        Filesize

        252KB

      • memory/1080-224-0x0000000005040000-0x000000000507F000-memory.dmp
        Filesize

        252KB

      • memory/1080-226-0x0000000005040000-0x000000000507F000-memory.dmp
        Filesize

        252KB

      • memory/1080-228-0x0000000005040000-0x000000000507F000-memory.dmp
        Filesize

        252KB

      • memory/1080-230-0x0000000005040000-0x000000000507F000-memory.dmp
        Filesize

        252KB

      • memory/1080-232-0x0000000005040000-0x000000000507F000-memory.dmp
        Filesize

        252KB

      • memory/1080-234-0x0000000005040000-0x000000000507F000-memory.dmp
        Filesize

        252KB

      • memory/1080-236-0x0000000005040000-0x000000000507F000-memory.dmp
        Filesize

        252KB

      • memory/1080-238-0x0000000005040000-0x000000000507F000-memory.dmp
        Filesize

        252KB

      • memory/1080-240-0x0000000005040000-0x000000000507F000-memory.dmp
        Filesize

        252KB

      • memory/1080-242-0x0000000005040000-0x000000000507F000-memory.dmp
        Filesize

        252KB

      • memory/1080-501-0x0000000002020000-0x000000000206B000-memory.dmp
        Filesize

        300KB

      • memory/1080-1122-0x0000000004A80000-0x0000000004A90000-memory.dmp
        Filesize

        64KB

      • memory/1080-505-0x0000000004A80000-0x0000000004A90000-memory.dmp
        Filesize

        64KB

      • memory/1080-506-0x0000000004A80000-0x0000000004A90000-memory.dmp
        Filesize

        64KB

      • memory/1080-1119-0x0000000005200000-0x0000000005818000-memory.dmp
        Filesize

        6.1MB

      • memory/1080-1120-0x00000000058A0000-0x00000000059AA000-memory.dmp
        Filesize

        1.0MB

      • memory/1080-1121-0x00000000059E0000-0x00000000059F2000-memory.dmp
        Filesize

        72KB

      • memory/1200-184-0x0000000002320000-0x0000000002332000-memory.dmp
        Filesize

        72KB

      • memory/1200-194-0x0000000002320000-0x0000000002332000-memory.dmp
        Filesize

        72KB

      • memory/1200-192-0x0000000002320000-0x0000000002332000-memory.dmp
        Filesize

        72KB

      • memory/1200-204-0x0000000000400000-0x00000000004AA000-memory.dmp
        Filesize

        680KB

      • memory/1200-186-0x0000000002320000-0x0000000002332000-memory.dmp
        Filesize

        72KB

      • memory/1200-202-0x0000000004DD0000-0x0000000004DE0000-memory.dmp
        Filesize

        64KB

      • memory/1200-201-0x0000000004DD0000-0x0000000004DE0000-memory.dmp
        Filesize

        64KB

      • memory/1200-200-0x0000000004DD0000-0x0000000004DE0000-memory.dmp
        Filesize

        64KB

      • memory/1200-199-0x0000000000400000-0x00000000004AA000-memory.dmp
        Filesize

        680KB

      • memory/1200-198-0x0000000002320000-0x0000000002332000-memory.dmp
        Filesize

        72KB

      • memory/1200-196-0x0000000002320000-0x0000000002332000-memory.dmp
        Filesize

        72KB

      • memory/1200-168-0x0000000004DE0000-0x0000000005384000-memory.dmp
        Filesize

        5.6MB

      • memory/1200-190-0x0000000002320000-0x0000000002332000-memory.dmp
        Filesize

        72KB

      • memory/1200-182-0x0000000002320000-0x0000000002332000-memory.dmp
        Filesize

        72KB

      • memory/1200-171-0x0000000002320000-0x0000000002332000-memory.dmp
        Filesize

        72KB

      • memory/1200-178-0x0000000002320000-0x0000000002332000-memory.dmp
        Filesize

        72KB

      • memory/1200-176-0x0000000002320000-0x0000000002332000-memory.dmp
        Filesize

        72KB

      • memory/1200-174-0x0000000002320000-0x0000000002332000-memory.dmp
        Filesize

        72KB

      • memory/1200-172-0x0000000002320000-0x0000000002332000-memory.dmp
        Filesize

        72KB

      • memory/1200-188-0x0000000002320000-0x0000000002332000-memory.dmp
        Filesize

        72KB

      • memory/1200-167-0x0000000000610000-0x000000000063D000-memory.dmp
        Filesize

        180KB

      • memory/1200-180-0x0000000002320000-0x0000000002332000-memory.dmp
        Filesize

        72KB

      • memory/1200-170-0x0000000004DD0000-0x0000000004DE0000-memory.dmp
        Filesize

        64KB

      • memory/1200-169-0x0000000004DD0000-0x0000000004DE0000-memory.dmp
        Filesize

        64KB

      • memory/1888-1153-0x0000000000410000-0x0000000000442000-memory.dmp
        Filesize

        200KB

      • memory/1888-1154-0x0000000005040000-0x0000000005050000-memory.dmp
        Filesize

        64KB

      • memory/3056-161-0x0000000000DB0000-0x0000000000DBA000-memory.dmp
        Filesize

        40KB