Analysis

  • max time kernel
    148s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-04-2023 12:18

General

  • Target

    7363af7b885b400a48d82ecf748b5917f4a6d5c9f215a1babf493e6bdcecba9c.exe

  • Size

    990KB

  • MD5

    b391b9f06235f45c686fe4969f1c1cce

  • SHA1

    7341362c57a949170b16d378d9597291af1a1c42

  • SHA256

    7363af7b885b400a48d82ecf748b5917f4a6d5c9f215a1babf493e6bdcecba9c

  • SHA512

    4fbbfddfd17c1b17c660cabed366530c4602404bba9596629c366d0d4b55c7091477e794c10344e17e1bf207d8c36d355158949bf04ee629e9dee48ae4e83b8b

  • SSDEEP

    24576:gyPOfLKVaA5Ia2fO6Hz8+mcDB59HUwkOKl8WnKm:n/alff9TvmcDB8wkOKl

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

amadey

Version

3.70

C2

77.91.124.207/plays/chapter/index.php

Extracted

Family

redline

Botnet

maxi

C2

185.161.248.90:4125

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7363af7b885b400a48d82ecf748b5917f4a6d5c9f215a1babf493e6bdcecba9c.exe
    "C:\Users\Admin\AppData\Local\Temp\7363af7b885b400a48d82ecf748b5917f4a6d5c9f215a1babf493e6bdcecba9c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7602.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7602.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2580
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1940.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1940.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1584
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina2057.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina2057.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4640
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az673382.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az673382.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1288
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu689113.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu689113.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4112
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 1080
              6⤵
              • Program crash
              PID:444
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor9951.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor9951.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2212
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 1332
            5⤵
            • Program crash
            PID:3144
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dbh96s93.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dbh96s93.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1872
        • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
          "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4476
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:1040
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
            5⤵
            • Loads dropped DLL
            PID:1756
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge486797.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge486797.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:816
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4112 -ip 4112
    1⤵
      PID:3156
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2212 -ip 2212
      1⤵
        PID:4780
      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:3044
      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:1892

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        Filesize

        229KB

        MD5

        6c07711a17452b855149a95cda6fc830

        SHA1

        5b3252c2567de78f9ae68764d4e30511a509fdcc

        SHA256

        eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

        SHA512

        ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        Filesize

        229KB

        MD5

        6c07711a17452b855149a95cda6fc830

        SHA1

        5b3252c2567de78f9ae68764d4e30511a509fdcc

        SHA256

        eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

        SHA512

        ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        Filesize

        229KB

        MD5

        6c07711a17452b855149a95cda6fc830

        SHA1

        5b3252c2567de78f9ae68764d4e30511a509fdcc

        SHA256

        eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

        SHA512

        ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        Filesize

        229KB

        MD5

        6c07711a17452b855149a95cda6fc830

        SHA1

        5b3252c2567de78f9ae68764d4e30511a509fdcc

        SHA256

        eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

        SHA512

        ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        Filesize

        229KB

        MD5

        6c07711a17452b855149a95cda6fc830

        SHA1

        5b3252c2567de78f9ae68764d4e30511a509fdcc

        SHA256

        eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

        SHA512

        ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge486797.exe
        Filesize

        168KB

        MD5

        f3f0110dd728ebd7a2e20609f3b7ff33

        SHA1

        9e846ddfc4e53793c77a8b74395ed1c1c73da027

        SHA256

        f7dbb53256eb8a1896925f31a12ef486afea188abd1ff3b67ae7325e5e756751

        SHA512

        81da25c6e399a6f312473b567541a72cb9a7907dec4a572af2e3b44fe8ff37465a06652b8cf903e152518f518b16a5055c598f34dd96306aa1b620d0b0a0bc4f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge486797.exe
        Filesize

        168KB

        MD5

        f3f0110dd728ebd7a2e20609f3b7ff33

        SHA1

        9e846ddfc4e53793c77a8b74395ed1c1c73da027

        SHA256

        f7dbb53256eb8a1896925f31a12ef486afea188abd1ff3b67ae7325e5e756751

        SHA512

        81da25c6e399a6f312473b567541a72cb9a7907dec4a572af2e3b44fe8ff37465a06652b8cf903e152518f518b16a5055c598f34dd96306aa1b620d0b0a0bc4f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7602.exe
        Filesize

        838KB

        MD5

        326d67f1f02893c81fe22565cc535d21

        SHA1

        3dc0176b8aa3571c2212eb74aaaad0bf18780cbf

        SHA256

        13968e2a0d1f7db75855c0d59bb684800541b2db5d317284c28dec5b0a406e5b

        SHA512

        58e8c1b317dc14d6407668d6cddbd53f9c205ab22c4129118014bafd1ed47c5f556fd8be20301382cfb11bf30c6ea811f84ee4fe16072ae3c643410747628e3e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7602.exe
        Filesize

        838KB

        MD5

        326d67f1f02893c81fe22565cc535d21

        SHA1

        3dc0176b8aa3571c2212eb74aaaad0bf18780cbf

        SHA256

        13968e2a0d1f7db75855c0d59bb684800541b2db5d317284c28dec5b0a406e5b

        SHA512

        58e8c1b317dc14d6407668d6cddbd53f9c205ab22c4129118014bafd1ed47c5f556fd8be20301382cfb11bf30c6ea811f84ee4fe16072ae3c643410747628e3e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dbh96s93.exe
        Filesize

        229KB

        MD5

        6c07711a17452b855149a95cda6fc830

        SHA1

        5b3252c2567de78f9ae68764d4e30511a509fdcc

        SHA256

        eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

        SHA512

        ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dbh96s93.exe
        Filesize

        229KB

        MD5

        6c07711a17452b855149a95cda6fc830

        SHA1

        5b3252c2567de78f9ae68764d4e30511a509fdcc

        SHA256

        eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

        SHA512

        ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1940.exe
        Filesize

        655KB

        MD5

        146e0f1da757fb3bff0d22e5841c7c96

        SHA1

        1b5ccc46076c51c93dbeb4a34b5b7ef08a76ace2

        SHA256

        ff9ee90ea819c6cc821fe2a579198be3b4bfb75c439c390580bb8bf56db2c70e

        SHA512

        b681d0dea5056ea151c84c866437975390095f1d7bb7cf693616c33fd6987df690d43eb9ccdabed545968cb688ca958e2c0a3b9dbe2ea8b9eed71c1e9e1aeb6b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1940.exe
        Filesize

        655KB

        MD5

        146e0f1da757fb3bff0d22e5841c7c96

        SHA1

        1b5ccc46076c51c93dbeb4a34b5b7ef08a76ace2

        SHA256

        ff9ee90ea819c6cc821fe2a579198be3b4bfb75c439c390580bb8bf56db2c70e

        SHA512

        b681d0dea5056ea151c84c866437975390095f1d7bb7cf693616c33fd6987df690d43eb9ccdabed545968cb688ca958e2c0a3b9dbe2ea8b9eed71c1e9e1aeb6b

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor9951.exe
        Filesize

        299KB

        MD5

        eb1ccf5c0c9c7e6a616021ffaa714818

        SHA1

        b6d1a0838798b36493c4e91031896799c828370f

        SHA256

        bdbaa02a9f0d996c65040f03b43cdf720581e035587acb03f812fd463bd010e2

        SHA512

        95b927b62b0c290993a6606ab34f73bf45c34254ea65a04c1b0b3e76c654c0119647b1d1b88f13c2d49d2394f3616b1fe2a8b6bfa14309af7196f749fcd3f82d

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor9951.exe
        Filesize

        299KB

        MD5

        eb1ccf5c0c9c7e6a616021ffaa714818

        SHA1

        b6d1a0838798b36493c4e91031896799c828370f

        SHA256

        bdbaa02a9f0d996c65040f03b43cdf720581e035587acb03f812fd463bd010e2

        SHA512

        95b927b62b0c290993a6606ab34f73bf45c34254ea65a04c1b0b3e76c654c0119647b1d1b88f13c2d49d2394f3616b1fe2a8b6bfa14309af7196f749fcd3f82d

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina2057.exe
        Filesize

        323KB

        MD5

        1710e2bcf0186340f3adb7e20877c105

        SHA1

        58784f9505ee592731b5db72d9fabaa10dca83f7

        SHA256

        dacdf3bcae46ae9d51d5a82a799c50cf8e1a5898004768d23dbe14cda603e5e7

        SHA512

        3484660f01f8b515b57465851bb59a845497dd921d8059fad45608860a372ffac9dfaf6f20c738962c835475baa88e29b550da7589e3e3d2f1ec141b27ffa13f

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina2057.exe
        Filesize

        323KB

        MD5

        1710e2bcf0186340f3adb7e20877c105

        SHA1

        58784f9505ee592731b5db72d9fabaa10dca83f7

        SHA256

        dacdf3bcae46ae9d51d5a82a799c50cf8e1a5898004768d23dbe14cda603e5e7

        SHA512

        3484660f01f8b515b57465851bb59a845497dd921d8059fad45608860a372ffac9dfaf6f20c738962c835475baa88e29b550da7589e3e3d2f1ec141b27ffa13f

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az673382.exe
        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az673382.exe
        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu689113.exe
        Filesize

        239KB

        MD5

        5d1f161d492f4609eb790c7ce6dbc7b5

        SHA1

        dd12a066076d1223a4d16566d88519ff10843e01

        SHA256

        5fba2e74eac3f42647b2c710a799cbec60a6cc2f3db6935572ad3617b0a05ceb

        SHA512

        6ddcd10211355279f0d3edf09fb6a6c3f57c2f0338247b2cad7c9ba0a652f9f3628821d2576868511951f30eb1dda689519025d9c97964538226a425078e13aa

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu689113.exe
        Filesize

        239KB

        MD5

        5d1f161d492f4609eb790c7ce6dbc7b5

        SHA1

        dd12a066076d1223a4d16566d88519ff10843e01

        SHA256

        5fba2e74eac3f42647b2c710a799cbec60a6cc2f3db6935572ad3617b0a05ceb

        SHA512

        6ddcd10211355279f0d3edf09fb6a6c3f57c2f0338247b2cad7c9ba0a652f9f3628821d2576868511951f30eb1dda689519025d9c97964538226a425078e13aa

      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
        Filesize

        89KB

        MD5

        4061d8dd5006b99d06fa208c0063dfcf

        SHA1

        38e7df8d8e631f3e9b227df3b9326d187e18cce5

        SHA256

        b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0

        SHA512

        71de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314

      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
        Filesize

        89KB

        MD5

        4061d8dd5006b99d06fa208c0063dfcf

        SHA1

        38e7df8d8e631f3e9b227df3b9326d187e18cce5

        SHA256

        b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0

        SHA512

        71de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314

      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
        Filesize

        89KB

        MD5

        4061d8dd5006b99d06fa208c0063dfcf

        SHA1

        38e7df8d8e631f3e9b227df3b9326d187e18cce5

        SHA256

        b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0

        SHA512

        71de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314

      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
        Filesize

        162B

        MD5

        1b7c22a214949975556626d7217e9a39

        SHA1

        d01c97e2944166ed23e47e4a62ff471ab8fa031f

        SHA256

        340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

        SHA512

        ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

      • memory/816-1153-0x0000000002F40000-0x0000000002F50000-memory.dmp
        Filesize

        64KB

      • memory/816-1152-0x0000000000DF0000-0x0000000000E20000-memory.dmp
        Filesize

        192KB

      • memory/816-1154-0x0000000002F40000-0x0000000002F50000-memory.dmp
        Filesize

        64KB

      • memory/1288-161-0x00000000005D0000-0x00000000005DA000-memory.dmp
        Filesize

        40KB

      • memory/2212-1127-0x0000000004C20000-0x0000000004C30000-memory.dmp
        Filesize

        64KB

      • memory/2212-1118-0x00000000051E0000-0x00000000057F8000-memory.dmp
        Filesize

        6.1MB

      • memory/2212-1133-0x0000000006EA0000-0x0000000006EF0000-memory.dmp
        Filesize

        320KB

      • memory/2212-1132-0x0000000006E20000-0x0000000006E96000-memory.dmp
        Filesize

        472KB

      • memory/2212-1131-0x0000000004C20000-0x0000000004C30000-memory.dmp
        Filesize

        64KB

      • memory/2212-1130-0x0000000006650000-0x0000000006B7C000-memory.dmp
        Filesize

        5.2MB

      • memory/2212-1129-0x0000000006470000-0x0000000006632000-memory.dmp
        Filesize

        1.8MB

      • memory/2212-209-0x0000000002730000-0x000000000276F000-memory.dmp
        Filesize

        252KB

      • memory/2212-211-0x0000000002730000-0x000000000276F000-memory.dmp
        Filesize

        252KB

      • memory/2212-208-0x0000000002730000-0x000000000276F000-memory.dmp
        Filesize

        252KB

      • memory/2212-214-0x0000000002040000-0x000000000208B000-memory.dmp
        Filesize

        300KB

      • memory/2212-216-0x0000000004C20000-0x0000000004C30000-memory.dmp
        Filesize

        64KB

      • memory/2212-217-0x0000000004C20000-0x0000000004C30000-memory.dmp
        Filesize

        64KB

      • memory/2212-218-0x0000000002730000-0x000000000276F000-memory.dmp
        Filesize

        252KB

      • memory/2212-213-0x0000000002730000-0x000000000276F000-memory.dmp
        Filesize

        252KB

      • memory/2212-219-0x0000000004C20000-0x0000000004C30000-memory.dmp
        Filesize

        64KB

      • memory/2212-221-0x0000000002730000-0x000000000276F000-memory.dmp
        Filesize

        252KB

      • memory/2212-223-0x0000000002730000-0x000000000276F000-memory.dmp
        Filesize

        252KB

      • memory/2212-225-0x0000000002730000-0x000000000276F000-memory.dmp
        Filesize

        252KB

      • memory/2212-227-0x0000000002730000-0x000000000276F000-memory.dmp
        Filesize

        252KB

      • memory/2212-229-0x0000000002730000-0x000000000276F000-memory.dmp
        Filesize

        252KB

      • memory/2212-231-0x0000000002730000-0x000000000276F000-memory.dmp
        Filesize

        252KB

      • memory/2212-233-0x0000000002730000-0x000000000276F000-memory.dmp
        Filesize

        252KB

      • memory/2212-235-0x0000000002730000-0x000000000276F000-memory.dmp
        Filesize

        252KB

      • memory/2212-237-0x0000000002730000-0x000000000276F000-memory.dmp
        Filesize

        252KB

      • memory/2212-239-0x0000000002730000-0x000000000276F000-memory.dmp
        Filesize

        252KB

      • memory/2212-241-0x0000000002730000-0x000000000276F000-memory.dmp
        Filesize

        252KB

      • memory/2212-243-0x0000000002730000-0x000000000276F000-memory.dmp
        Filesize

        252KB

      • memory/2212-245-0x0000000002730000-0x000000000276F000-memory.dmp
        Filesize

        252KB

      • memory/2212-1128-0x0000000004C20000-0x0000000004C30000-memory.dmp
        Filesize

        64KB

      • memory/2212-1119-0x0000000005800000-0x000000000590A000-memory.dmp
        Filesize

        1.0MB

      • memory/2212-1120-0x0000000004BB0000-0x0000000004BC2000-memory.dmp
        Filesize

        72KB

      • memory/2212-1121-0x0000000004BD0000-0x0000000004C0C000-memory.dmp
        Filesize

        240KB

      • memory/2212-1122-0x0000000004C20000-0x0000000004C30000-memory.dmp
        Filesize

        64KB

      • memory/2212-1123-0x0000000005BB0000-0x0000000005C16000-memory.dmp
        Filesize

        408KB

      • memory/2212-1124-0x0000000006270000-0x0000000006302000-memory.dmp
        Filesize

        584KB

      • memory/2212-1126-0x0000000004C20000-0x0000000004C30000-memory.dmp
        Filesize

        64KB

      • memory/4112-184-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/4112-167-0x0000000004B00000-0x00000000050A4000-memory.dmp
        Filesize

        5.6MB

      • memory/4112-194-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/4112-198-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/4112-203-0x0000000000400000-0x00000000004AA000-memory.dmp
        Filesize

        680KB

      • memory/4112-201-0x0000000004AF0000-0x0000000004B00000-memory.dmp
        Filesize

        64KB

      • memory/4112-200-0x0000000004AF0000-0x0000000004B00000-memory.dmp
        Filesize

        64KB

      • memory/4112-192-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/4112-190-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/4112-182-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/4112-196-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/4112-199-0x0000000000400000-0x00000000004AA000-memory.dmp
        Filesize

        680KB

      • memory/4112-188-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/4112-180-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/4112-178-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/4112-176-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/4112-174-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/4112-172-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/4112-171-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/4112-170-0x0000000004AF0000-0x0000000004B00000-memory.dmp
        Filesize

        64KB

      • memory/4112-169-0x0000000004AF0000-0x0000000004B00000-memory.dmp
        Filesize

        64KB

      • memory/4112-168-0x0000000000600000-0x000000000062D000-memory.dmp
        Filesize

        180KB

      • memory/4112-186-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB