Analysis

  • max time kernel
    112s
  • max time network
    92s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11-04-2023 11:32

General

  • Target

    36c212f2cda6dd81c6b09ee9192086b8f52a8f71ae6ea186642d41dddf7add42.exe

  • Size

    844KB

  • MD5

    4905d08fccf6e8ac49c5b354021b0233

  • SHA1

    f7767f8e15657a9c7a08b347177d7614e3f8c58a

  • SHA256

    36c212f2cda6dd81c6b09ee9192086b8f52a8f71ae6ea186642d41dddf7add42

  • SHA512

    3c78a63b5fa53f4904ef7afdf713c2ca60b6c74f821d3c655bbd1ec496c00aa549197b6f1b6aeb941309b5a7447e101ccaf5602fc95c3296efdf719a982dccd7

  • SSDEEP

    12288:3MrLy90qcOTz4sJ898aWSwm/rbCfno3hvvez1Pu7b5zjKpWqbMZ4V:wyDz4XxW1mr9xvvepPu7Vj6MOV

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

nahui

C2

176.113.115.145:4125

Attributes
  • auth_value

    b9ed10946d21e28d58d0c72c535cde6f

Extracted

Family

amadey

Version

3.70

C2

77.91.124.207/plays/chapter/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36c212f2cda6dd81c6b09ee9192086b8f52a8f71ae6ea186642d41dddf7add42.exe
    "C:\Users\Admin\AppData\Local\Temp\36c212f2cda6dd81c6b09ee9192086b8f52a8f71ae6ea186642d41dddf7add42.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4112
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un126423.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un126423.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2480
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un705340.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un705340.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3568
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr532401.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr532401.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4416
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu346873.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu346873.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3936
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk952474.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk952474.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1840
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si536091.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si536091.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3532
      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2968
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3736
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:4360
  • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:4676
  • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:1900

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
    Filesize

    229KB

    MD5

    6c07711a17452b855149a95cda6fc830

    SHA1

    5b3252c2567de78f9ae68764d4e30511a509fdcc

    SHA256

    eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

    SHA512

    ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

  • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
    Filesize

    229KB

    MD5

    6c07711a17452b855149a95cda6fc830

    SHA1

    5b3252c2567de78f9ae68764d4e30511a509fdcc

    SHA256

    eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

    SHA512

    ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

  • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
    Filesize

    229KB

    MD5

    6c07711a17452b855149a95cda6fc830

    SHA1

    5b3252c2567de78f9ae68764d4e30511a509fdcc

    SHA256

    eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

    SHA512

    ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

  • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
    Filesize

    229KB

    MD5

    6c07711a17452b855149a95cda6fc830

    SHA1

    5b3252c2567de78f9ae68764d4e30511a509fdcc

    SHA256

    eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

    SHA512

    ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

  • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
    Filesize

    229KB

    MD5

    6c07711a17452b855149a95cda6fc830

    SHA1

    5b3252c2567de78f9ae68764d4e30511a509fdcc

    SHA256

    eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

    SHA512

    ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si536091.exe
    Filesize

    229KB

    MD5

    6c07711a17452b855149a95cda6fc830

    SHA1

    5b3252c2567de78f9ae68764d4e30511a509fdcc

    SHA256

    eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

    SHA512

    ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si536091.exe
    Filesize

    229KB

    MD5

    6c07711a17452b855149a95cda6fc830

    SHA1

    5b3252c2567de78f9ae68764d4e30511a509fdcc

    SHA256

    eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

    SHA512

    ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un126423.exe
    Filesize

    661KB

    MD5

    eb7e8ffaabd46c8fc53306b82d5780b9

    SHA1

    c0da641603f8e5c438ca890374fc3bfc00a88854

    SHA256

    58d10054897672d1ab1f0b839f42279fce8e37b3009fe47f005fcb6e7c3c3640

    SHA512

    3ecc9b76a5b477d0b25814e79e9a9e7f04272c77123f8af52f8735b6cea620d346740ccf927913d31cdb18547e902a6b7c1f55ccdd7b5e18b23f9e492f4e9773

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un126423.exe
    Filesize

    661KB

    MD5

    eb7e8ffaabd46c8fc53306b82d5780b9

    SHA1

    c0da641603f8e5c438ca890374fc3bfc00a88854

    SHA256

    58d10054897672d1ab1f0b839f42279fce8e37b3009fe47f005fcb6e7c3c3640

    SHA512

    3ecc9b76a5b477d0b25814e79e9a9e7f04272c77123f8af52f8735b6cea620d346740ccf927913d31cdb18547e902a6b7c1f55ccdd7b5e18b23f9e492f4e9773

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk952474.exe
    Filesize

    175KB

    MD5

    b2e599dec0856d70ebb2ab2327ae6442

    SHA1

    300323436b47ddafa78cb7e835deb1ab09f13698

    SHA256

    b1470330cd560723c67ad42eb7e8c8137271c5a729cd08a81d3028e8bb2e1c43

    SHA512

    c5092c0377c8d7aa8a1097d52e2b96df41ce9b1b9a72bf0c3a1f10c7c60ea5831bb2c535e144f1908f39f2b93017d69fd9f24272b0e706bacd5970e84e909065

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk952474.exe
    Filesize

    175KB

    MD5

    b2e599dec0856d70ebb2ab2327ae6442

    SHA1

    300323436b47ddafa78cb7e835deb1ab09f13698

    SHA256

    b1470330cd560723c67ad42eb7e8c8137271c5a729cd08a81d3028e8bb2e1c43

    SHA512

    c5092c0377c8d7aa8a1097d52e2b96df41ce9b1b9a72bf0c3a1f10c7c60ea5831bb2c535e144f1908f39f2b93017d69fd9f24272b0e706bacd5970e84e909065

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un705340.exe
    Filesize

    519KB

    MD5

    1ba67efaf95294574c43e7cc2703c633

    SHA1

    e38ff7eec327b0834cfdd8dffd24748a6324242e

    SHA256

    08c20b9a8c4d4318cc2980ea10a224da6e3bc924b8e9dc2355dd99d48488bca6

    SHA512

    63f0353b0a485c27069f9360dc7c6c391acdee88b453b480d491f10361024f14c9bd83646958964d85ba88ce97609f27478d78b392141bfe7dc644bdb58e299e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un705340.exe
    Filesize

    519KB

    MD5

    1ba67efaf95294574c43e7cc2703c633

    SHA1

    e38ff7eec327b0834cfdd8dffd24748a6324242e

    SHA256

    08c20b9a8c4d4318cc2980ea10a224da6e3bc924b8e9dc2355dd99d48488bca6

    SHA512

    63f0353b0a485c27069f9360dc7c6c391acdee88b453b480d491f10361024f14c9bd83646958964d85ba88ce97609f27478d78b392141bfe7dc644bdb58e299e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr532401.exe
    Filesize

    239KB

    MD5

    ab8a55fdfada5bedeb148c33ee61eec8

    SHA1

    ed00f02b3a73949a8481327cf218eda5edbb711c

    SHA256

    60cc2035c8195b43009dc200465b593f9099a4c83ef26342f90957f09894a868

    SHA512

    c5f573b04d5f9059416117acd9b1377846329f6a82a52b6b46061737fb82b7d7be3f34f87f958574740c0053e9d1c14bc34b3f7bbbe258265a66370f361ba223

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr532401.exe
    Filesize

    239KB

    MD5

    ab8a55fdfada5bedeb148c33ee61eec8

    SHA1

    ed00f02b3a73949a8481327cf218eda5edbb711c

    SHA256

    60cc2035c8195b43009dc200465b593f9099a4c83ef26342f90957f09894a868

    SHA512

    c5f573b04d5f9059416117acd9b1377846329f6a82a52b6b46061737fb82b7d7be3f34f87f958574740c0053e9d1c14bc34b3f7bbbe258265a66370f361ba223

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu346873.exe
    Filesize

    299KB

    MD5

    7b6eac5022d7b28ab603da225db9f831

    SHA1

    6b54526a97822fbb79790cf1089bd962feca264a

    SHA256

    ceac74204f7fa6068f67b986770e66f708b9f43ae6dfaa0d8e6db806bb0e77ba

    SHA512

    26428d45900878411b2850b9624fd8cb6eb3c4ac6c3f4f70f128eefb69bc00c79a2d66d46fc584d2a72fb1ad5da48b49afeff84047a6b6dd96f8cd4777068b42

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu346873.exe
    Filesize

    299KB

    MD5

    7b6eac5022d7b28ab603da225db9f831

    SHA1

    6b54526a97822fbb79790cf1089bd962feca264a

    SHA256

    ceac74204f7fa6068f67b986770e66f708b9f43ae6dfaa0d8e6db806bb0e77ba

    SHA512

    26428d45900878411b2850b9624fd8cb6eb3c4ac6c3f4f70f128eefb69bc00c79a2d66d46fc584d2a72fb1ad5da48b49afeff84047a6b6dd96f8cd4777068b42

  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
    Filesize

    89KB

    MD5

    4061d8dd5006b99d06fa208c0063dfcf

    SHA1

    38e7df8d8e631f3e9b227df3b9326d187e18cce5

    SHA256

    b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0

    SHA512

    71de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314

  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
    Filesize

    89KB

    MD5

    4061d8dd5006b99d06fa208c0063dfcf

    SHA1

    38e7df8d8e631f3e9b227df3b9326d187e18cce5

    SHA256

    b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0

    SHA512

    71de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314

  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
    Filesize

    162B

    MD5

    1b7c22a214949975556626d7217e9a39

    SHA1

    d01c97e2944166ed23e47e4a62ff471ab8fa031f

    SHA256

    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

    SHA512

    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

  • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
    Filesize

    89KB

    MD5

    4061d8dd5006b99d06fa208c0063dfcf

    SHA1

    38e7df8d8e631f3e9b227df3b9326d187e18cce5

    SHA256

    b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0

    SHA512

    71de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314

  • memory/1840-1119-0x0000000004DC0000-0x0000000004E0B000-memory.dmp
    Filesize

    300KB

  • memory/1840-1118-0x0000000000380000-0x00000000003B2000-memory.dmp
    Filesize

    200KB

  • memory/1840-1120-0x0000000004C10000-0x0000000004C20000-memory.dmp
    Filesize

    64KB

  • memory/3936-1105-0x00000000062B0000-0x0000000006300000-memory.dmp
    Filesize

    320KB

  • memory/3936-1096-0x00000000056E0000-0x0000000005CE6000-memory.dmp
    Filesize

    6.0MB

  • memory/3936-1112-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
    Filesize

    64KB

  • memory/3936-1111-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
    Filesize

    64KB

  • memory/3936-1110-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
    Filesize

    64KB

  • memory/3936-1109-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
    Filesize

    64KB

  • memory/3936-1108-0x0000000006610000-0x0000000006B3C000-memory.dmp
    Filesize

    5.2MB

  • memory/3936-1107-0x0000000006430000-0x00000000065F2000-memory.dmp
    Filesize

    1.8MB

  • memory/3936-1104-0x0000000006230000-0x00000000062A6000-memory.dmp
    Filesize

    472KB

  • memory/3936-184-0x00000000020F0000-0x0000000002136000-memory.dmp
    Filesize

    280KB

  • memory/3936-185-0x00000000024E0000-0x0000000002524000-memory.dmp
    Filesize

    272KB

  • memory/3936-187-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/3936-189-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/3936-186-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/3936-191-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/3936-193-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/3936-195-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/3936-197-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/3936-199-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/3936-201-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/3936-203-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/3936-205-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/3936-207-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/3936-209-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/3936-211-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/3936-213-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/3936-215-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/3936-217-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/3936-219-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/3936-241-0x00000000004C0000-0x000000000050B000-memory.dmp
    Filesize

    300KB

  • memory/3936-243-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
    Filesize

    64KB

  • memory/3936-247-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
    Filesize

    64KB

  • memory/3936-245-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
    Filesize

    64KB

  • memory/3936-1103-0x0000000005530000-0x0000000005596000-memory.dmp
    Filesize

    408KB

  • memory/3936-1097-0x00000000050D0000-0x00000000051DA000-memory.dmp
    Filesize

    1.0MB

  • memory/3936-1098-0x0000000004A70000-0x0000000004A82000-memory.dmp
    Filesize

    72KB

  • memory/3936-1099-0x00000000051E0000-0x000000000521E000-memory.dmp
    Filesize

    248KB

  • memory/3936-1100-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
    Filesize

    64KB

  • memory/3936-1101-0x0000000005320000-0x000000000536B000-memory.dmp
    Filesize

    300KB

  • memory/3936-1102-0x0000000005490000-0x0000000005522000-memory.dmp
    Filesize

    584KB

  • memory/4416-159-0x00000000049E0000-0x00000000049F2000-memory.dmp
    Filesize

    72KB

  • memory/4416-179-0x0000000000400000-0x00000000004AA000-memory.dmp
    Filesize

    680KB

  • memory/4416-173-0x00000000049E0000-0x00000000049F2000-memory.dmp
    Filesize

    72KB

  • memory/4416-171-0x00000000049E0000-0x00000000049F2000-memory.dmp
    Filesize

    72KB

  • memory/4416-157-0x00000000049E0000-0x00000000049F2000-memory.dmp
    Filesize

    72KB

  • memory/4416-177-0x0000000004BC0000-0x0000000004BD0000-memory.dmp
    Filesize

    64KB

  • memory/4416-176-0x0000000000400000-0x00000000004AA000-memory.dmp
    Filesize

    680KB

  • memory/4416-155-0x00000000049E0000-0x00000000049F2000-memory.dmp
    Filesize

    72KB

  • memory/4416-174-0x0000000004BC0000-0x0000000004BD0000-memory.dmp
    Filesize

    64KB

  • memory/4416-165-0x00000000049E0000-0x00000000049F2000-memory.dmp
    Filesize

    72KB

  • memory/4416-163-0x00000000049E0000-0x00000000049F2000-memory.dmp
    Filesize

    72KB

  • memory/4416-161-0x00000000049E0000-0x00000000049F2000-memory.dmp
    Filesize

    72KB

  • memory/4416-167-0x00000000049E0000-0x00000000049F2000-memory.dmp
    Filesize

    72KB

  • memory/4416-169-0x00000000049E0000-0x00000000049F2000-memory.dmp
    Filesize

    72KB

  • memory/4416-175-0x0000000004BC0000-0x0000000004BD0000-memory.dmp
    Filesize

    64KB

  • memory/4416-153-0x00000000049E0000-0x00000000049F2000-memory.dmp
    Filesize

    72KB

  • memory/4416-151-0x00000000049E0000-0x00000000049F2000-memory.dmp
    Filesize

    72KB

  • memory/4416-147-0x00000000049E0000-0x00000000049F2000-memory.dmp
    Filesize

    72KB

  • memory/4416-149-0x00000000049E0000-0x00000000049F2000-memory.dmp
    Filesize

    72KB

  • memory/4416-146-0x00000000049E0000-0x00000000049F2000-memory.dmp
    Filesize

    72KB

  • memory/4416-145-0x00000000049E0000-0x00000000049F8000-memory.dmp
    Filesize

    96KB

  • memory/4416-144-0x0000000004BD0000-0x00000000050CE000-memory.dmp
    Filesize

    5.0MB

  • memory/4416-143-0x0000000004BC0000-0x0000000004BD0000-memory.dmp
    Filesize

    64KB

  • memory/4416-142-0x0000000000580000-0x00000000005AD000-memory.dmp
    Filesize

    180KB

  • memory/4416-141-0x0000000002240000-0x000000000225A000-memory.dmp
    Filesize

    104KB