Analysis

  • max time kernel
    146s
  • max time network
    93s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11-04-2023 12:13

General

  • Target

    071e796bd4889502ce361eaf381c69fe1edc180e19d985bf4ee5ae17dd53dcc6.exe

  • Size

    992KB

  • MD5

    19e0cf316a839b4c39227a4b112b5a25

  • SHA1

    769735c09e26c6eb598fc322cdd0d41d5ebf0e19

  • SHA256

    071e796bd4889502ce361eaf381c69fe1edc180e19d985bf4ee5ae17dd53dcc6

  • SHA512

    8c488397827a50c36d8606f5c79d80322ddff46715e92eb8754f4c18c7ad50685250d00c24e919cad133764fcaf113aa014f6d6f25a2a9fd9198457a2a9eb6df

  • SSDEEP

    24576:dywbcE5m+6z0lZujycDIItIHDFwstS7TPKOuTFi:4Krm9n2ucDFcfJuTF

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

amadey

Version

3.70

C2

77.91.124.207/plays/chapter/index.php

Extracted

Family

redline

Botnet

maxi

C2

185.161.248.90:4125

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 23 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\071e796bd4889502ce361eaf381c69fe1edc180e19d985bf4ee5ae17dd53dcc6.exe
    "C:\Users\Admin\AppData\Local\Temp\071e796bd4889502ce361eaf381c69fe1edc180e19d985bf4ee5ae17dd53dcc6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3636
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina3955.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina3955.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4440
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina2699.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina2699.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4864
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina3430.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina3430.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2144
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az648780.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az648780.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3516
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu968818.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu968818.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2852
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor6265.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor6265.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1508
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dYT82s10.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dYT82s10.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3928
        • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
          "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4360
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:4368
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
            5⤵
            • Loads dropped DLL
            PID:4876
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge630513.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge630513.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4400
  • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:4972
  • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:5084

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
    Filesize

    229KB

    MD5

    6c07711a17452b855149a95cda6fc830

    SHA1

    5b3252c2567de78f9ae68764d4e30511a509fdcc

    SHA256

    eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

    SHA512

    ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

  • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
    Filesize

    229KB

    MD5

    6c07711a17452b855149a95cda6fc830

    SHA1

    5b3252c2567de78f9ae68764d4e30511a509fdcc

    SHA256

    eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

    SHA512

    ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

  • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
    Filesize

    229KB

    MD5

    6c07711a17452b855149a95cda6fc830

    SHA1

    5b3252c2567de78f9ae68764d4e30511a509fdcc

    SHA256

    eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

    SHA512

    ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

  • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
    Filesize

    229KB

    MD5

    6c07711a17452b855149a95cda6fc830

    SHA1

    5b3252c2567de78f9ae68764d4e30511a509fdcc

    SHA256

    eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

    SHA512

    ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

  • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
    Filesize

    229KB

    MD5

    6c07711a17452b855149a95cda6fc830

    SHA1

    5b3252c2567de78f9ae68764d4e30511a509fdcc

    SHA256

    eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

    SHA512

    ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge630513.exe
    Filesize

    168KB

    MD5

    f3f0110dd728ebd7a2e20609f3b7ff33

    SHA1

    9e846ddfc4e53793c77a8b74395ed1c1c73da027

    SHA256

    f7dbb53256eb8a1896925f31a12ef486afea188abd1ff3b67ae7325e5e756751

    SHA512

    81da25c6e399a6f312473b567541a72cb9a7907dec4a572af2e3b44fe8ff37465a06652b8cf903e152518f518b16a5055c598f34dd96306aa1b620d0b0a0bc4f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge630513.exe
    Filesize

    168KB

    MD5

    f3f0110dd728ebd7a2e20609f3b7ff33

    SHA1

    9e846ddfc4e53793c77a8b74395ed1c1c73da027

    SHA256

    f7dbb53256eb8a1896925f31a12ef486afea188abd1ff3b67ae7325e5e756751

    SHA512

    81da25c6e399a6f312473b567541a72cb9a7907dec4a572af2e3b44fe8ff37465a06652b8cf903e152518f518b16a5055c598f34dd96306aa1b620d0b0a0bc4f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina3955.exe
    Filesize

    838KB

    MD5

    194cac9265aa0d2ede83a9657944fbcd

    SHA1

    f8ed52eeb0b494879a5ed4784fc12e70c5fea2f2

    SHA256

    22ad3fce2657fc49a5d17ad8f6ab5586b4a722d2fa8d5295531ab600801be737

    SHA512

    940b21b3c9d6f7a4f9dc9e203e0f046b9fb210b2a7deeb5362584312454932745f5f2daff97a76f9f74d1f421903116d2ec69d222b683543312a45d3815b03af

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina3955.exe
    Filesize

    838KB

    MD5

    194cac9265aa0d2ede83a9657944fbcd

    SHA1

    f8ed52eeb0b494879a5ed4784fc12e70c5fea2f2

    SHA256

    22ad3fce2657fc49a5d17ad8f6ab5586b4a722d2fa8d5295531ab600801be737

    SHA512

    940b21b3c9d6f7a4f9dc9e203e0f046b9fb210b2a7deeb5362584312454932745f5f2daff97a76f9f74d1f421903116d2ec69d222b683543312a45d3815b03af

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dYT82s10.exe
    Filesize

    229KB

    MD5

    6c07711a17452b855149a95cda6fc830

    SHA1

    5b3252c2567de78f9ae68764d4e30511a509fdcc

    SHA256

    eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

    SHA512

    ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dYT82s10.exe
    Filesize

    229KB

    MD5

    6c07711a17452b855149a95cda6fc830

    SHA1

    5b3252c2567de78f9ae68764d4e30511a509fdcc

    SHA256

    eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

    SHA512

    ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina2699.exe
    Filesize

    656KB

    MD5

    0e4c88d9334badcd5b38d4feb322cb77

    SHA1

    a81994520372dc503bb5ff3b3b55b03b21a2f07b

    SHA256

    92137a008a6ed6e6a29601307505098e05c9f55c4bd218d9fe130791f7724b3d

    SHA512

    0464aa3682257aeaaae55f04dcafbdf5bf2d0428c096c339e49526df90501da3bbfd0902a64acbc67ef163c87587a7030787a42a81d916aea4cfc7500592d40e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina2699.exe
    Filesize

    656KB

    MD5

    0e4c88d9334badcd5b38d4feb322cb77

    SHA1

    a81994520372dc503bb5ff3b3b55b03b21a2f07b

    SHA256

    92137a008a6ed6e6a29601307505098e05c9f55c4bd218d9fe130791f7724b3d

    SHA512

    0464aa3682257aeaaae55f04dcafbdf5bf2d0428c096c339e49526df90501da3bbfd0902a64acbc67ef163c87587a7030787a42a81d916aea4cfc7500592d40e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor6265.exe
    Filesize

    299KB

    MD5

    eb479841c9023a6c21062b8c4acbbc0d

    SHA1

    7edc128d2c895c64e04318eaee33d1c4a92bcee9

    SHA256

    2c2c400f9a32f3cb79db5c46554f9fd2422a7019eb253982468a398e85cb25fc

    SHA512

    5871990317a683b2facfb96ccdf43ca9150a7e3638447a5dadf2a406152de0dbe4cfb43928c9fb31e3fa7824b8b8b7de45a53adc9182b155839064b469ae0883

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor6265.exe
    Filesize

    299KB

    MD5

    eb479841c9023a6c21062b8c4acbbc0d

    SHA1

    7edc128d2c895c64e04318eaee33d1c4a92bcee9

    SHA256

    2c2c400f9a32f3cb79db5c46554f9fd2422a7019eb253982468a398e85cb25fc

    SHA512

    5871990317a683b2facfb96ccdf43ca9150a7e3638447a5dadf2a406152de0dbe4cfb43928c9fb31e3fa7824b8b8b7de45a53adc9182b155839064b469ae0883

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina3430.exe
    Filesize

    324KB

    MD5

    ce94bfc6127efbc615b94e56b91abadb

    SHA1

    95d08b8b250eb0ed3ad715c5fa5cc263098f17c6

    SHA256

    c815a9a4f2dcea62077dfb3bd7bb370e2f9b7e50b29118ebf4452f3cc4054e13

    SHA512

    cdf8194287908b59b3b9e951510806808f9ce9483d649be147853570012afa4736b672298815b6a54b6057e125197ec4df1d709d1912edbbdccc7e83a6049345

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina3430.exe
    Filesize

    324KB

    MD5

    ce94bfc6127efbc615b94e56b91abadb

    SHA1

    95d08b8b250eb0ed3ad715c5fa5cc263098f17c6

    SHA256

    c815a9a4f2dcea62077dfb3bd7bb370e2f9b7e50b29118ebf4452f3cc4054e13

    SHA512

    cdf8194287908b59b3b9e951510806808f9ce9483d649be147853570012afa4736b672298815b6a54b6057e125197ec4df1d709d1912edbbdccc7e83a6049345

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az648780.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az648780.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu968818.exe
    Filesize

    239KB

    MD5

    fe06176508ecb44ccfcc4f2f6679f775

    SHA1

    a9e593faf85c7f5cf5a7884039ed7bcb64ff825e

    SHA256

    19e2a55a3737da2fa3c3ce9dceb7eadee732db09657ab9c7f49aab563746c778

    SHA512

    c6e2b6520b79447a27c1b477d2a8d7a574aff87bc5fa0c169b75fef455c9289a2ffb7f30b2cdf889e7e24e9166222749cf560ea5068c51c82470178da5628f19

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu968818.exe
    Filesize

    239KB

    MD5

    fe06176508ecb44ccfcc4f2f6679f775

    SHA1

    a9e593faf85c7f5cf5a7884039ed7bcb64ff825e

    SHA256

    19e2a55a3737da2fa3c3ce9dceb7eadee732db09657ab9c7f49aab563746c778

    SHA512

    c6e2b6520b79447a27c1b477d2a8d7a574aff87bc5fa0c169b75fef455c9289a2ffb7f30b2cdf889e7e24e9166222749cf560ea5068c51c82470178da5628f19

  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
    Filesize

    89KB

    MD5

    4061d8dd5006b99d06fa208c0063dfcf

    SHA1

    38e7df8d8e631f3e9b227df3b9326d187e18cce5

    SHA256

    b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0

    SHA512

    71de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314

  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
    Filesize

    89KB

    MD5

    4061d8dd5006b99d06fa208c0063dfcf

    SHA1

    38e7df8d8e631f3e9b227df3b9326d187e18cce5

    SHA256

    b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0

    SHA512

    71de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314

  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
    Filesize

    162B

    MD5

    1b7c22a214949975556626d7217e9a39

    SHA1

    d01c97e2944166ed23e47e4a62ff471ab8fa031f

    SHA256

    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

    SHA512

    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

  • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
    Filesize

    89KB

    MD5

    4061d8dd5006b99d06fa208c0063dfcf

    SHA1

    38e7df8d8e631f3e9b227df3b9326d187e18cce5

    SHA256

    b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0

    SHA512

    71de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314

  • memory/1508-1115-0x0000000006160000-0x00000000061F2000-memory.dmp
    Filesize

    584KB

  • memory/1508-231-0x00000000023C0000-0x00000000023FF000-memory.dmp
    Filesize

    252KB

  • memory/1508-1124-0x0000000006E90000-0x0000000006EE0000-memory.dmp
    Filesize

    320KB

  • memory/1508-1123-0x0000000006E00000-0x0000000006E76000-memory.dmp
    Filesize

    472KB

  • memory/1508-1122-0x0000000004C30000-0x0000000004C40000-memory.dmp
    Filesize

    64KB

  • memory/1508-1121-0x00000000067B0000-0x0000000006CDC000-memory.dmp
    Filesize

    5.2MB

  • memory/1508-1120-0x00000000065E0000-0x00000000067A2000-memory.dmp
    Filesize

    1.8MB

  • memory/1508-1119-0x0000000004C30000-0x0000000004C40000-memory.dmp
    Filesize

    64KB

  • memory/1508-1118-0x0000000004C30000-0x0000000004C40000-memory.dmp
    Filesize

    64KB

  • memory/1508-1117-0x0000000004C30000-0x0000000004C40000-memory.dmp
    Filesize

    64KB

  • memory/1508-1114-0x0000000005490000-0x00000000054F6000-memory.dmp
    Filesize

    408KB

  • memory/1508-1113-0x0000000004C30000-0x0000000004C40000-memory.dmp
    Filesize

    64KB

  • memory/1508-1112-0x0000000004BE0000-0x0000000004C2B000-memory.dmp
    Filesize

    300KB

  • memory/1508-1111-0x0000000004B90000-0x0000000004BCE000-memory.dmp
    Filesize

    248KB

  • memory/1508-1110-0x0000000004B70000-0x0000000004B82000-memory.dmp
    Filesize

    72KB

  • memory/1508-1109-0x0000000005140000-0x000000000524A000-memory.dmp
    Filesize

    1.0MB

  • memory/1508-196-0x0000000000A60000-0x0000000000AA6000-memory.dmp
    Filesize

    280KB

  • memory/1508-197-0x00000000023C0000-0x0000000002404000-memory.dmp
    Filesize

    272KB

  • memory/1508-199-0x00000000023C0000-0x00000000023FF000-memory.dmp
    Filesize

    252KB

  • memory/1508-198-0x00000000023C0000-0x00000000023FF000-memory.dmp
    Filesize

    252KB

  • memory/1508-201-0x00000000023C0000-0x00000000023FF000-memory.dmp
    Filesize

    252KB

  • memory/1508-203-0x00000000023C0000-0x00000000023FF000-memory.dmp
    Filesize

    252KB

  • memory/1508-205-0x00000000023C0000-0x00000000023FF000-memory.dmp
    Filesize

    252KB

  • memory/1508-207-0x00000000023C0000-0x00000000023FF000-memory.dmp
    Filesize

    252KB

  • memory/1508-210-0x0000000000590000-0x00000000005DB000-memory.dmp
    Filesize

    300KB

  • memory/1508-209-0x00000000023C0000-0x00000000023FF000-memory.dmp
    Filesize

    252KB

  • memory/1508-212-0x0000000004C30000-0x0000000004C40000-memory.dmp
    Filesize

    64KB

  • memory/1508-213-0x00000000023C0000-0x00000000023FF000-memory.dmp
    Filesize

    252KB

  • memory/1508-214-0x0000000004C30000-0x0000000004C40000-memory.dmp
    Filesize

    64KB

  • memory/1508-216-0x0000000004C30000-0x0000000004C40000-memory.dmp
    Filesize

    64KB

  • memory/1508-217-0x00000000023C0000-0x00000000023FF000-memory.dmp
    Filesize

    252KB

  • memory/1508-219-0x00000000023C0000-0x00000000023FF000-memory.dmp
    Filesize

    252KB

  • memory/1508-221-0x00000000023C0000-0x00000000023FF000-memory.dmp
    Filesize

    252KB

  • memory/1508-223-0x00000000023C0000-0x00000000023FF000-memory.dmp
    Filesize

    252KB

  • memory/1508-225-0x00000000023C0000-0x00000000023FF000-memory.dmp
    Filesize

    252KB

  • memory/1508-227-0x00000000023C0000-0x00000000023FF000-memory.dmp
    Filesize

    252KB

  • memory/1508-229-0x00000000023C0000-0x00000000023FF000-memory.dmp
    Filesize

    252KB

  • memory/1508-1108-0x0000000005750000-0x0000000005D56000-memory.dmp
    Filesize

    6.0MB

  • memory/1508-233-0x00000000023C0000-0x00000000023FF000-memory.dmp
    Filesize

    252KB

  • memory/1508-235-0x00000000023C0000-0x00000000023FF000-memory.dmp
    Filesize

    252KB

  • memory/2852-164-0x00000000024E0000-0x00000000024F2000-memory.dmp
    Filesize

    72KB

  • memory/2852-166-0x00000000024E0000-0x00000000024F2000-memory.dmp
    Filesize

    72KB

  • memory/2852-170-0x00000000024E0000-0x00000000024F2000-memory.dmp
    Filesize

    72KB

  • memory/2852-191-0x0000000000400000-0x00000000004AA000-memory.dmp
    Filesize

    680KB

  • memory/2852-168-0x00000000024E0000-0x00000000024F2000-memory.dmp
    Filesize

    72KB

  • memory/2852-188-0x0000000004AD0000-0x0000000004AE0000-memory.dmp
    Filesize

    64KB

  • memory/2852-187-0x0000000004AD0000-0x0000000004AE0000-memory.dmp
    Filesize

    64KB

  • memory/2852-162-0x00000000024E0000-0x00000000024F2000-memory.dmp
    Filesize

    72KB

  • memory/2852-186-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/2852-160-0x00000000024E0000-0x00000000024F2000-memory.dmp
    Filesize

    72KB

  • memory/2852-184-0x00000000024E0000-0x00000000024F2000-memory.dmp
    Filesize

    72KB

  • memory/2852-182-0x00000000024E0000-0x00000000024F2000-memory.dmp
    Filesize

    72KB

  • memory/2852-180-0x00000000024E0000-0x00000000024F2000-memory.dmp
    Filesize

    72KB

  • memory/2852-178-0x00000000024E0000-0x00000000024F2000-memory.dmp
    Filesize

    72KB

  • memory/2852-176-0x00000000024E0000-0x00000000024F2000-memory.dmp
    Filesize

    72KB

  • memory/2852-174-0x00000000024E0000-0x00000000024F2000-memory.dmp
    Filesize

    72KB

  • memory/2852-189-0x0000000004AD0000-0x0000000004AE0000-memory.dmp
    Filesize

    64KB

  • memory/2852-172-0x00000000024E0000-0x00000000024F2000-memory.dmp
    Filesize

    72KB

  • memory/2852-185-0x0000000000400000-0x00000000004AA000-memory.dmp
    Filesize

    680KB

  • memory/2852-158-0x00000000024E0000-0x00000000024F2000-memory.dmp
    Filesize

    72KB

  • memory/2852-157-0x00000000024E0000-0x00000000024F2000-memory.dmp
    Filesize

    72KB

  • memory/2852-156-0x0000000004AD0000-0x0000000004AE0000-memory.dmp
    Filesize

    64KB

  • memory/2852-155-0x0000000004AD0000-0x0000000004AE0000-memory.dmp
    Filesize

    64KB

  • memory/2852-150-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/2852-151-0x0000000002250000-0x000000000226A000-memory.dmp
    Filesize

    104KB

  • memory/2852-152-0x0000000004AE0000-0x0000000004FDE000-memory.dmp
    Filesize

    5.0MB

  • memory/2852-153-0x00000000024E0000-0x00000000024F8000-memory.dmp
    Filesize

    96KB

  • memory/2852-154-0x0000000004AD0000-0x0000000004AE0000-memory.dmp
    Filesize

    64KB

  • memory/3516-144-0x00000000006F0000-0x00000000006FA000-memory.dmp
    Filesize

    40KB

  • memory/4400-1144-0x0000000005110000-0x0000000005120000-memory.dmp
    Filesize

    64KB

  • memory/4400-1143-0x0000000005110000-0x0000000005120000-memory.dmp
    Filesize

    64KB

  • memory/4400-1142-0x000000000A810000-0x000000000A85B000-memory.dmp
    Filesize

    300KB

  • memory/4400-1141-0x0000000002A20000-0x0000000002A26000-memory.dmp
    Filesize

    24KB

  • memory/4400-1140-0x0000000000900000-0x0000000000930000-memory.dmp
    Filesize

    192KB