Analysis

  • max time kernel
    121s
  • max time network
    103s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12-04-2023 00:25

General

  • Target

    28d6c89070c6f757ef281b321d53f1b84d138200b1103de897d10c671039b705.exe

  • Size

    1.1MB

  • MD5

    4367cc76a5ec705f3b152e7f32d41341

  • SHA1

    369541f415d4746c8f41426e0b1dcc8701a315bc

  • SHA256

    28d6c89070c6f757ef281b321d53f1b84d138200b1103de897d10c671039b705

  • SHA512

    efdb29d8f65708eff10e9cb703a2a9c14558a0249f7393f37a145f2d3870507029787268e51c5e521379563b11ef3aa97294479a2db83840d0ed62e484947a0e

  • SSDEEP

    24576:MyBXkTwuwRjiDgYkv5Lk2MzOKHrM5aa5/26Ie9K:79kTwlRjma5LhOM51/rIe9

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

lore

C2

185.161.248.90:4125

Attributes
  • auth_value

    523d51bd3c39801fa0405f4fb03df3c4

Extracted

Family

amadey

Version

3.70

C2

80.66.79.86/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28d6c89070c6f757ef281b321d53f1b84d138200b1103de897d10c671039b705.exe
    "C:\Users\Admin\AppData\Local\Temp\28d6c89070c6f757ef281b321d53f1b84d138200b1103de897d10c671039b705.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap3371.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap3371.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap5314.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap5314.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2560
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap7969.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap7969.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3172
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz4040.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz4040.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3900
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7495iY.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7495iY.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4668
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w24aH19.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w24aH19.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4784
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1544
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xIDsB74.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xIDsB74.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1768
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y88td00.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y88td00.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4736
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3732
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4756
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:4964
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:1856
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:4984

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    95de8905bfbec3ab00a00d6d6213e2c5

    SHA1

    94782ede1691863afd80c833c67ffc9aecf29ad7

    SHA256

    7d78eaf93743bb0b238636c2ee65fe5ea5bbea2ebe7ebde270a9e76106fd11fa

    SHA512

    18d403613ad8d45dce81c170ce9856226b964c007a87380a72363ff8fecfb3c00a73578147f7c5269c89c346c47e050ab575670117063c0e1e253f0f8f0bd294

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    95de8905bfbec3ab00a00d6d6213e2c5

    SHA1

    94782ede1691863afd80c833c67ffc9aecf29ad7

    SHA256

    7d78eaf93743bb0b238636c2ee65fe5ea5bbea2ebe7ebde270a9e76106fd11fa

    SHA512

    18d403613ad8d45dce81c170ce9856226b964c007a87380a72363ff8fecfb3c00a73578147f7c5269c89c346c47e050ab575670117063c0e1e253f0f8f0bd294

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    95de8905bfbec3ab00a00d6d6213e2c5

    SHA1

    94782ede1691863afd80c833c67ffc9aecf29ad7

    SHA256

    7d78eaf93743bb0b238636c2ee65fe5ea5bbea2ebe7ebde270a9e76106fd11fa

    SHA512

    18d403613ad8d45dce81c170ce9856226b964c007a87380a72363ff8fecfb3c00a73578147f7c5269c89c346c47e050ab575670117063c0e1e253f0f8f0bd294

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    95de8905bfbec3ab00a00d6d6213e2c5

    SHA1

    94782ede1691863afd80c833c67ffc9aecf29ad7

    SHA256

    7d78eaf93743bb0b238636c2ee65fe5ea5bbea2ebe7ebde270a9e76106fd11fa

    SHA512

    18d403613ad8d45dce81c170ce9856226b964c007a87380a72363ff8fecfb3c00a73578147f7c5269c89c346c47e050ab575670117063c0e1e253f0f8f0bd294

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    95de8905bfbec3ab00a00d6d6213e2c5

    SHA1

    94782ede1691863afd80c833c67ffc9aecf29ad7

    SHA256

    7d78eaf93743bb0b238636c2ee65fe5ea5bbea2ebe7ebde270a9e76106fd11fa

    SHA512

    18d403613ad8d45dce81c170ce9856226b964c007a87380a72363ff8fecfb3c00a73578147f7c5269c89c346c47e050ab575670117063c0e1e253f0f8f0bd294

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y88td00.exe

    Filesize

    229KB

    MD5

    95de8905bfbec3ab00a00d6d6213e2c5

    SHA1

    94782ede1691863afd80c833c67ffc9aecf29ad7

    SHA256

    7d78eaf93743bb0b238636c2ee65fe5ea5bbea2ebe7ebde270a9e76106fd11fa

    SHA512

    18d403613ad8d45dce81c170ce9856226b964c007a87380a72363ff8fecfb3c00a73578147f7c5269c89c346c47e050ab575670117063c0e1e253f0f8f0bd294

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y88td00.exe

    Filesize

    229KB

    MD5

    95de8905bfbec3ab00a00d6d6213e2c5

    SHA1

    94782ede1691863afd80c833c67ffc9aecf29ad7

    SHA256

    7d78eaf93743bb0b238636c2ee65fe5ea5bbea2ebe7ebde270a9e76106fd11fa

    SHA512

    18d403613ad8d45dce81c170ce9856226b964c007a87380a72363ff8fecfb3c00a73578147f7c5269c89c346c47e050ab575670117063c0e1e253f0f8f0bd294

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap3371.exe

    Filesize

    953KB

    MD5

    6d58dba0f37bda01162525640f6e6c63

    SHA1

    563df758916a429dbd2eb0a9162882dceb45d12d

    SHA256

    bedd509b339e99890f8eebf2402dd21d35aa94cf170e854176fbb68331650f12

    SHA512

    856fee6f1bd42e16b03ed3bc58f4571382ba42946daeb1657ee97190975c6a7d7f2c9c039a2647fe4b9d17c9848aefc6e0690fa6456c32df610098e084f948a4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap3371.exe

    Filesize

    953KB

    MD5

    6d58dba0f37bda01162525640f6e6c63

    SHA1

    563df758916a429dbd2eb0a9162882dceb45d12d

    SHA256

    bedd509b339e99890f8eebf2402dd21d35aa94cf170e854176fbb68331650f12

    SHA512

    856fee6f1bd42e16b03ed3bc58f4571382ba42946daeb1657ee97190975c6a7d7f2c9c039a2647fe4b9d17c9848aefc6e0690fa6456c32df610098e084f948a4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xIDsB74.exe

    Filesize

    168KB

    MD5

    dd249ea0e1be9cc24e3d3136f7c3a2f0

    SHA1

    189ad849b9e731f4cf2baa5934eb684c9ca0cdc0

    SHA256

    55f562427ff3abf26d989a77cacc3de35728f5321bca581daae3a6fd7d078979

    SHA512

    eaf5bdfed87f9078c671e7722c55555504536fee74c09e426902a7c5a3f67381925b992d8c907a48331c7680eca9c67f780a8effbed34bd2469b5f7511b9402d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xIDsB74.exe

    Filesize

    168KB

    MD5

    dd249ea0e1be9cc24e3d3136f7c3a2f0

    SHA1

    189ad849b9e731f4cf2baa5934eb684c9ca0cdc0

    SHA256

    55f562427ff3abf26d989a77cacc3de35728f5321bca581daae3a6fd7d078979

    SHA512

    eaf5bdfed87f9078c671e7722c55555504536fee74c09e426902a7c5a3f67381925b992d8c907a48331c7680eca9c67f780a8effbed34bd2469b5f7511b9402d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap5314.exe

    Filesize

    799KB

    MD5

    72b31fd1be26b39f3bfd7adc0aa27bff

    SHA1

    e2ccba9eae8dd3d53138ae75652e63d320b01386

    SHA256

    e653e2573774274117628392434b2f98825c455a7b39a8c75e764b8b957314e3

    SHA512

    ed6603bedfbdedad3c46e6f32361e342568921040e422e1180637a8a150edaa3e7bf6a70f988a4051da8719013c5f6507e337493c9022e4416dacd49cdc120a2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap5314.exe

    Filesize

    799KB

    MD5

    72b31fd1be26b39f3bfd7adc0aa27bff

    SHA1

    e2ccba9eae8dd3d53138ae75652e63d320b01386

    SHA256

    e653e2573774274117628392434b2f98825c455a7b39a8c75e764b8b957314e3

    SHA512

    ed6603bedfbdedad3c46e6f32361e342568921040e422e1180637a8a150edaa3e7bf6a70f988a4051da8719013c5f6507e337493c9022e4416dacd49cdc120a2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w24aH19.exe

    Filesize

    438KB

    MD5

    1bb0f1ede76f3c6a017d1269ecb394fe

    SHA1

    6f28db2a0ff9f1e84530cd54d1b0c39889bcb806

    SHA256

    ece104b44f2532f5566ad81c0b2a2b4d0e49ba8397fcff9c22da56c526c8fac4

    SHA512

    6e687b47bc2898976c5e4df834ccc0a9965ce991fcde12ae7bc637ea08dffa197dff9712d37aa1d97da561128a6aa5a7cda315145e8497c5d26e0bb9f7f68927

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w24aH19.exe

    Filesize

    438KB

    MD5

    1bb0f1ede76f3c6a017d1269ecb394fe

    SHA1

    6f28db2a0ff9f1e84530cd54d1b0c39889bcb806

    SHA256

    ece104b44f2532f5566ad81c0b2a2b4d0e49ba8397fcff9c22da56c526c8fac4

    SHA512

    6e687b47bc2898976c5e4df834ccc0a9965ce991fcde12ae7bc637ea08dffa197dff9712d37aa1d97da561128a6aa5a7cda315145e8497c5d26e0bb9f7f68927

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap7969.exe

    Filesize

    333KB

    MD5

    880606733663ffd56664df664b87c80f

    SHA1

    558048e5a2a4052bd628a20e7f049f01f0f4551d

    SHA256

    db64e28905ff5e13f70836469fe01f566b01f858a5d4022ea9474fb65c0e19d0

    SHA512

    9e4d20ea8582dafe946a4d7b637cdf92806227bc22fb3ee7b0e77910a72b900180a8ad93058a34951439a97723590619a09d36cce027a25697889c14fb4b3003

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap7969.exe

    Filesize

    333KB

    MD5

    880606733663ffd56664df664b87c80f

    SHA1

    558048e5a2a4052bd628a20e7f049f01f0f4551d

    SHA256

    db64e28905ff5e13f70836469fe01f566b01f858a5d4022ea9474fb65c0e19d0

    SHA512

    9e4d20ea8582dafe946a4d7b637cdf92806227bc22fb3ee7b0e77910a72b900180a8ad93058a34951439a97723590619a09d36cce027a25697889c14fb4b3003

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz4040.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz4040.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7495iY.exe

    Filesize

    254KB

    MD5

    de9d3a22d039ce08e16b669c2e1131b8

    SHA1

    0703085f35a435c35ca9bcae810caaddd3d74061

    SHA256

    35cfe96486c51d076ab8285dea4a3c6f0983087445cbee9f8455c7218ecb2d7e

    SHA512

    ff51d7bdf17142303eefdb03a7239aac707d6e3c742fbfb0dcd26fa1d64e8eb55f681fdc05c50ed1ac8e1687f009a2c75ef6a2664463d05e6ed0bba951d11822

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7495iY.exe

    Filesize

    254KB

    MD5

    de9d3a22d039ce08e16b669c2e1131b8

    SHA1

    0703085f35a435c35ca9bcae810caaddd3d74061

    SHA256

    35cfe96486c51d076ab8285dea4a3c6f0983087445cbee9f8455c7218ecb2d7e

    SHA512

    ff51d7bdf17142303eefdb03a7239aac707d6e3c742fbfb0dcd26fa1d64e8eb55f681fdc05c50ed1ac8e1687f009a2c75ef6a2664463d05e6ed0bba951d11822

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    dddb7f44df311203facdf9bb248f80ad

    SHA1

    a25e8a78fc5d298c8605180a1296300f4e2827d0

    SHA256

    865d5dd81f34540c2a931aec5a5280571a7c910fb6dde4b174756d4ba3fbd38d

    SHA512

    240f35fbd13c6bb61a1665fe61442f8d8b92e9f00f37ad59992019d3f2e82c0850e56dda6c4e227199ae888666fbdd1e54695cfe07b06d2b7ae623e7eab03bf3

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    dddb7f44df311203facdf9bb248f80ad

    SHA1

    a25e8a78fc5d298c8605180a1296300f4e2827d0

    SHA256

    865d5dd81f34540c2a931aec5a5280571a7c910fb6dde4b174756d4ba3fbd38d

    SHA512

    240f35fbd13c6bb61a1665fe61442f8d8b92e9f00f37ad59992019d3f2e82c0850e56dda6c4e227199ae888666fbdd1e54695cfe07b06d2b7ae623e7eab03bf3

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

    Filesize

    162B

    MD5

    1b7c22a214949975556626d7217e9a39

    SHA1

    d01c97e2944166ed23e47e4a62ff471ab8fa031f

    SHA256

    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

    SHA512

    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    dddb7f44df311203facdf9bb248f80ad

    SHA1

    a25e8a78fc5d298c8605180a1296300f4e2827d0

    SHA256

    865d5dd81f34540c2a931aec5a5280571a7c910fb6dde4b174756d4ba3fbd38d

    SHA512

    240f35fbd13c6bb61a1665fe61442f8d8b92e9f00f37ad59992019d3f2e82c0850e56dda6c4e227199ae888666fbdd1e54695cfe07b06d2b7ae623e7eab03bf3

  • memory/1544-2375-0x0000000002EB0000-0x0000000002EC0000-memory.dmp

    Filesize

    64KB

  • memory/1544-2361-0x0000000005C70000-0x0000000006276000-memory.dmp

    Filesize

    6.0MB

  • memory/1544-2369-0x0000000006280000-0x0000000006312000-memory.dmp

    Filesize

    584KB

  • memory/1544-2354-0x0000000000D90000-0x0000000000DBE000-memory.dmp

    Filesize

    184KB

  • memory/1544-2367-0x0000000005880000-0x00000000058CB000-memory.dmp

    Filesize

    300KB

  • memory/1544-2366-0x0000000002EB0000-0x0000000002EC0000-memory.dmp

    Filesize

    64KB

  • memory/1544-2358-0x0000000002EC0000-0x0000000002EC6000-memory.dmp

    Filesize

    24KB

  • memory/1544-2364-0x0000000005700000-0x000000000573E000-memory.dmp

    Filesize

    248KB

  • memory/1544-2373-0x0000000008F10000-0x000000000943C000-memory.dmp

    Filesize

    5.2MB

  • memory/1544-2370-0x0000000006320000-0x0000000006386000-memory.dmp

    Filesize

    408KB

  • memory/1544-2372-0x0000000007190000-0x0000000007352000-memory.dmp

    Filesize

    1.8MB

  • memory/1544-2362-0x0000000005770000-0x000000000587A000-memory.dmp

    Filesize

    1.0MB

  • memory/1768-2371-0x000000000BC00000-0x000000000BC50000-memory.dmp

    Filesize

    320KB

  • memory/1768-2360-0x00000000010C0000-0x00000000010C6000-memory.dmp

    Filesize

    24KB

  • memory/1768-2359-0x0000000000860000-0x0000000000890000-memory.dmp

    Filesize

    192KB

  • memory/1768-2363-0x000000000A590000-0x000000000A5A2000-memory.dmp

    Filesize

    72KB

  • memory/1768-2365-0x0000000005050000-0x0000000005060000-memory.dmp

    Filesize

    64KB

  • memory/1768-2374-0x0000000005050000-0x0000000005060000-memory.dmp

    Filesize

    64KB

  • memory/1768-2368-0x000000000A910000-0x000000000A986000-memory.dmp

    Filesize

    472KB

  • memory/3900-149-0x0000000000C20000-0x0000000000C2A000-memory.dmp

    Filesize

    40KB

  • memory/4668-175-0x0000000002260000-0x0000000002272000-memory.dmp

    Filesize

    72KB

  • memory/4668-193-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/4668-155-0x00000000021D0000-0x00000000021EA000-memory.dmp

    Filesize

    104KB

  • memory/4668-156-0x0000000004AE0000-0x0000000004FDE000-memory.dmp

    Filesize

    5.0MB

  • memory/4668-157-0x0000000002260000-0x0000000002278000-memory.dmp

    Filesize

    96KB

  • memory/4668-158-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4668-159-0x0000000002660000-0x0000000002670000-memory.dmp

    Filesize

    64KB

  • memory/4668-160-0x0000000002660000-0x0000000002670000-memory.dmp

    Filesize

    64KB

  • memory/4668-161-0x0000000002660000-0x0000000002670000-memory.dmp

    Filesize

    64KB

  • memory/4668-162-0x0000000002260000-0x0000000002272000-memory.dmp

    Filesize

    72KB

  • memory/4668-163-0x0000000002260000-0x0000000002272000-memory.dmp

    Filesize

    72KB

  • memory/4668-165-0x0000000002260000-0x0000000002272000-memory.dmp

    Filesize

    72KB

  • memory/4668-167-0x0000000002260000-0x0000000002272000-memory.dmp

    Filesize

    72KB

  • memory/4668-169-0x0000000002260000-0x0000000002272000-memory.dmp

    Filesize

    72KB

  • memory/4668-171-0x0000000002260000-0x0000000002272000-memory.dmp

    Filesize

    72KB

  • memory/4668-177-0x0000000002260000-0x0000000002272000-memory.dmp

    Filesize

    72KB

  • memory/4668-173-0x0000000002260000-0x0000000002272000-memory.dmp

    Filesize

    72KB

  • memory/4668-179-0x0000000002260000-0x0000000002272000-memory.dmp

    Filesize

    72KB

  • memory/4668-181-0x0000000002260000-0x0000000002272000-memory.dmp

    Filesize

    72KB

  • memory/4668-183-0x0000000002260000-0x0000000002272000-memory.dmp

    Filesize

    72KB

  • memory/4668-185-0x0000000002260000-0x0000000002272000-memory.dmp

    Filesize

    72KB

  • memory/4668-187-0x0000000002260000-0x0000000002272000-memory.dmp

    Filesize

    72KB

  • memory/4668-189-0x0000000002260000-0x0000000002272000-memory.dmp

    Filesize

    72KB

  • memory/4668-190-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/4668-191-0x0000000002660000-0x0000000002670000-memory.dmp

    Filesize

    64KB

  • memory/4784-240-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/4784-215-0x0000000004AD0000-0x0000000004B30000-memory.dmp

    Filesize

    384KB

  • memory/4784-199-0x0000000004AD0000-0x0000000004B36000-memory.dmp

    Filesize

    408KB

  • memory/4784-200-0x0000000004AD0000-0x0000000004B30000-memory.dmp

    Filesize

    384KB

  • memory/4784-201-0x0000000004AD0000-0x0000000004B30000-memory.dmp

    Filesize

    384KB

  • memory/4784-203-0x0000000004AD0000-0x0000000004B30000-memory.dmp

    Filesize

    384KB

  • memory/4784-205-0x0000000004AD0000-0x0000000004B30000-memory.dmp

    Filesize

    384KB

  • memory/4784-207-0x0000000004AD0000-0x0000000004B30000-memory.dmp

    Filesize

    384KB

  • memory/4784-209-0x0000000004AD0000-0x0000000004B30000-memory.dmp

    Filesize

    384KB

  • memory/4784-211-0x0000000004AD0000-0x0000000004B30000-memory.dmp

    Filesize

    384KB

  • memory/4784-213-0x0000000004AD0000-0x0000000004B30000-memory.dmp

    Filesize

    384KB

  • memory/4784-2346-0x00000000052D0000-0x0000000005302000-memory.dmp

    Filesize

    200KB

  • memory/4784-243-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/4784-198-0x00000000022C0000-0x0000000002328000-memory.dmp

    Filesize

    416KB

  • memory/4784-238-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/4784-235-0x00000000005B0000-0x000000000060B000-memory.dmp

    Filesize

    364KB

  • memory/4784-233-0x0000000004AD0000-0x0000000004B30000-memory.dmp

    Filesize

    384KB

  • memory/4784-231-0x0000000004AD0000-0x0000000004B30000-memory.dmp

    Filesize

    384KB

  • memory/4784-229-0x0000000004AD0000-0x0000000004B30000-memory.dmp

    Filesize

    384KB

  • memory/4784-227-0x0000000004AD0000-0x0000000004B30000-memory.dmp

    Filesize

    384KB

  • memory/4784-225-0x0000000004AD0000-0x0000000004B30000-memory.dmp

    Filesize

    384KB

  • memory/4784-223-0x0000000004AD0000-0x0000000004B30000-memory.dmp

    Filesize

    384KB

  • memory/4784-221-0x0000000004AD0000-0x0000000004B30000-memory.dmp

    Filesize

    384KB

  • memory/4784-219-0x0000000004AD0000-0x0000000004B30000-memory.dmp

    Filesize

    384KB

  • memory/4784-217-0x0000000004AD0000-0x0000000004B30000-memory.dmp

    Filesize

    384KB