Analysis

  • max time kernel
    99s
  • max time network
    101s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12/04/2023, 05:11

General

  • Target

    813231c2325b129c422bbe29d46aa07bd6a209712df8308b51abf64222e039b1.exe

  • Size

    1.2MB

  • MD5

    770ce4c39789c76b0b9d88dfbd48ccce

  • SHA1

    1ecd87c57dce512677cb163e3ae386cf738a8040

  • SHA256

    813231c2325b129c422bbe29d46aa07bd6a209712df8308b51abf64222e039b1

  • SHA512

    81ccc7cc8444cb9dd58c82615e38b5db8662319304560c63e7e963f62efacbb740694e8e1efe0ec4a920b10c43f5bb2df05f943e4cbfb31e250edcfb6eae347e

  • SSDEEP

    24576:1yAl7oU2WKzq+ZmQ5tuaZlIQ1K2UESDH4p4bS:Qa7oU2ZWmmWtLvI92Up4p

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

lore

C2

185.161.248.90:4125

Attributes
  • auth_value

    523d51bd3c39801fa0405f4fb03df3c4

Extracted

Family

amadey

Version

3.70

C2

80.66.79.86/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\813231c2325b129c422bbe29d46aa07bd6a209712df8308b51abf64222e039b1.exe
    "C:\Users\Admin\AppData\Local\Temp\813231c2325b129c422bbe29d46aa07bd6a209712df8308b51abf64222e039b1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap9268.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap9268.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2256
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap1717.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap1717.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2580
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2934.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2934.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2648
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9634.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9634.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3100
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2906yg.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2906yg.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5080
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w82yW82.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w82yW82.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1252
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4048
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xpmXV39.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xpmXV39.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1336
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y48PJ75.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y48PJ75.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2888
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4144
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4148
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:5080
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:1796

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          95de8905bfbec3ab00a00d6d6213e2c5

          SHA1

          94782ede1691863afd80c833c67ffc9aecf29ad7

          SHA256

          7d78eaf93743bb0b238636c2ee65fe5ea5bbea2ebe7ebde270a9e76106fd11fa

          SHA512

          18d403613ad8d45dce81c170ce9856226b964c007a87380a72363ff8fecfb3c00a73578147f7c5269c89c346c47e050ab575670117063c0e1e253f0f8f0bd294

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          95de8905bfbec3ab00a00d6d6213e2c5

          SHA1

          94782ede1691863afd80c833c67ffc9aecf29ad7

          SHA256

          7d78eaf93743bb0b238636c2ee65fe5ea5bbea2ebe7ebde270a9e76106fd11fa

          SHA512

          18d403613ad8d45dce81c170ce9856226b964c007a87380a72363ff8fecfb3c00a73578147f7c5269c89c346c47e050ab575670117063c0e1e253f0f8f0bd294

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          95de8905bfbec3ab00a00d6d6213e2c5

          SHA1

          94782ede1691863afd80c833c67ffc9aecf29ad7

          SHA256

          7d78eaf93743bb0b238636c2ee65fe5ea5bbea2ebe7ebde270a9e76106fd11fa

          SHA512

          18d403613ad8d45dce81c170ce9856226b964c007a87380a72363ff8fecfb3c00a73578147f7c5269c89c346c47e050ab575670117063c0e1e253f0f8f0bd294

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          95de8905bfbec3ab00a00d6d6213e2c5

          SHA1

          94782ede1691863afd80c833c67ffc9aecf29ad7

          SHA256

          7d78eaf93743bb0b238636c2ee65fe5ea5bbea2ebe7ebde270a9e76106fd11fa

          SHA512

          18d403613ad8d45dce81c170ce9856226b964c007a87380a72363ff8fecfb3c00a73578147f7c5269c89c346c47e050ab575670117063c0e1e253f0f8f0bd294

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y48PJ75.exe

          Filesize

          229KB

          MD5

          95de8905bfbec3ab00a00d6d6213e2c5

          SHA1

          94782ede1691863afd80c833c67ffc9aecf29ad7

          SHA256

          7d78eaf93743bb0b238636c2ee65fe5ea5bbea2ebe7ebde270a9e76106fd11fa

          SHA512

          18d403613ad8d45dce81c170ce9856226b964c007a87380a72363ff8fecfb3c00a73578147f7c5269c89c346c47e050ab575670117063c0e1e253f0f8f0bd294

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y48PJ75.exe

          Filesize

          229KB

          MD5

          95de8905bfbec3ab00a00d6d6213e2c5

          SHA1

          94782ede1691863afd80c833c67ffc9aecf29ad7

          SHA256

          7d78eaf93743bb0b238636c2ee65fe5ea5bbea2ebe7ebde270a9e76106fd11fa

          SHA512

          18d403613ad8d45dce81c170ce9856226b964c007a87380a72363ff8fecfb3c00a73578147f7c5269c89c346c47e050ab575670117063c0e1e253f0f8f0bd294

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap9268.exe

          Filesize

          1.0MB

          MD5

          9f2eba7a5124759271055d7ac9b7ef5c

          SHA1

          66c0269802aaadf990bc95eaffa8b85523f8dff1

          SHA256

          f377dc0842d4ca47a3d609ab46fb32ea3cf3158a9483a4804d6dfd1e80eadacb

          SHA512

          c35bdecf5e0a57f75948475f5aec99fe60fcebcae3cb97a90c187b4e6c1da75ff4781f90dfec85758c29b9484ccab146fc4a4abac4f8ef8f53959869996b0061

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap9268.exe

          Filesize

          1.0MB

          MD5

          9f2eba7a5124759271055d7ac9b7ef5c

          SHA1

          66c0269802aaadf990bc95eaffa8b85523f8dff1

          SHA256

          f377dc0842d4ca47a3d609ab46fb32ea3cf3158a9483a4804d6dfd1e80eadacb

          SHA512

          c35bdecf5e0a57f75948475f5aec99fe60fcebcae3cb97a90c187b4e6c1da75ff4781f90dfec85758c29b9484ccab146fc4a4abac4f8ef8f53959869996b0061

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xpmXV39.exe

          Filesize

          168KB

          MD5

          dd249ea0e1be9cc24e3d3136f7c3a2f0

          SHA1

          189ad849b9e731f4cf2baa5934eb684c9ca0cdc0

          SHA256

          55f562427ff3abf26d989a77cacc3de35728f5321bca581daae3a6fd7d078979

          SHA512

          eaf5bdfed87f9078c671e7722c55555504536fee74c09e426902a7c5a3f67381925b992d8c907a48331c7680eca9c67f780a8effbed34bd2469b5f7511b9402d

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xpmXV39.exe

          Filesize

          168KB

          MD5

          dd249ea0e1be9cc24e3d3136f7c3a2f0

          SHA1

          189ad849b9e731f4cf2baa5934eb684c9ca0cdc0

          SHA256

          55f562427ff3abf26d989a77cacc3de35728f5321bca581daae3a6fd7d078979

          SHA512

          eaf5bdfed87f9078c671e7722c55555504536fee74c09e426902a7c5a3f67381925b992d8c907a48331c7680eca9c67f780a8effbed34bd2469b5f7511b9402d

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap1717.exe

          Filesize

          882KB

          MD5

          fb23c78159f7ff2d35c3406210afb5e2

          SHA1

          6d04b3d154a94b57b733ae49504de03b85bc4d3a

          SHA256

          f95751c9be908cd5542f3060381c3d6247fa4c833b88a865d41e3d6df79396e5

          SHA512

          15069a8d08017894e77a0ffc42c86a4a23b66808ced4568d4aec2a4808d5a008908216459745390d270b3154e8a070412c69e032983f06ae8bfbe661d3abca56

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap1717.exe

          Filesize

          882KB

          MD5

          fb23c78159f7ff2d35c3406210afb5e2

          SHA1

          6d04b3d154a94b57b733ae49504de03b85bc4d3a

          SHA256

          f95751c9be908cd5542f3060381c3d6247fa4c833b88a865d41e3d6df79396e5

          SHA512

          15069a8d08017894e77a0ffc42c86a4a23b66808ced4568d4aec2a4808d5a008908216459745390d270b3154e8a070412c69e032983f06ae8bfbe661d3abca56

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w82yW82.exe

          Filesize

          586KB

          MD5

          bab318a0e6906fc1c3b4b94f6193e311

          SHA1

          da23cfbaa0fa1962d3a442c01f65f9a361cba159

          SHA256

          45915b0b8f8b99e4ce9adf8222fe1d6f9d05d1a580d5ad8788e00aea4639655e

          SHA512

          7eede35fdf1caa320d2b028666aed6f95f2efcddfbe30773d8aa4cdd95f1c69254f223bb86904dac8485d15959bdb9486e201e14d48506d21db162d9223aea4d

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w82yW82.exe

          Filesize

          586KB

          MD5

          bab318a0e6906fc1c3b4b94f6193e311

          SHA1

          da23cfbaa0fa1962d3a442c01f65f9a361cba159

          SHA256

          45915b0b8f8b99e4ce9adf8222fe1d6f9d05d1a580d5ad8788e00aea4639655e

          SHA512

          7eede35fdf1caa320d2b028666aed6f95f2efcddfbe30773d8aa4cdd95f1c69254f223bb86904dac8485d15959bdb9486e201e14d48506d21db162d9223aea4d

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2934.exe

          Filesize

          375KB

          MD5

          aa00b538d6a55811f0d1e7bcf86fc597

          SHA1

          ffc0df2cb70a6e079c90b080b4d9802b39d00698

          SHA256

          c8cf98b283d05251071b926a725fa07d1b894f1c267e33e160c566c7fd5d63d2

          SHA512

          86b4078ccfb7f08cb76b18a202c089d120fc26486c7404e1882dfa83a241986d5e01f767bfbec4942bd18a36e10356b663b42ea0449da7b3a7d8591446b765fe

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2934.exe

          Filesize

          375KB

          MD5

          aa00b538d6a55811f0d1e7bcf86fc597

          SHA1

          ffc0df2cb70a6e079c90b080b4d9802b39d00698

          SHA256

          c8cf98b283d05251071b926a725fa07d1b894f1c267e33e160c566c7fd5d63d2

          SHA512

          86b4078ccfb7f08cb76b18a202c089d120fc26486c7404e1882dfa83a241986d5e01f767bfbec4942bd18a36e10356b663b42ea0449da7b3a7d8591446b765fe

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9634.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9634.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2906yg.exe

          Filesize

          403KB

          MD5

          cc7d8e2ba67f76db573eff2f5b9db99c

          SHA1

          440422647455f79702be6b2ee5c82ee72b4828eb

          SHA256

          b65b7e9831358a6c4899b26109380a3c61d290fd1869ebf7c3de22f6ad39f3ca

          SHA512

          4cf9957d0d5e83c3dca1c3d0e491cddb8977d7800922a132a1c9651e24333be06349d05f388984813f1dda8d9392a98f041503a35a2fcaa9fa83d5597819316b

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2906yg.exe

          Filesize

          403KB

          MD5

          cc7d8e2ba67f76db573eff2f5b9db99c

          SHA1

          440422647455f79702be6b2ee5c82ee72b4828eb

          SHA256

          b65b7e9831358a6c4899b26109380a3c61d290fd1869ebf7c3de22f6ad39f3ca

          SHA512

          4cf9957d0d5e83c3dca1c3d0e491cddb8977d7800922a132a1c9651e24333be06349d05f388984813f1dda8d9392a98f041503a35a2fcaa9fa83d5597819316b

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          dddb7f44df311203facdf9bb248f80ad

          SHA1

          a25e8a78fc5d298c8605180a1296300f4e2827d0

          SHA256

          865d5dd81f34540c2a931aec5a5280571a7c910fb6dde4b174756d4ba3fbd38d

          SHA512

          240f35fbd13c6bb61a1665fe61442f8d8b92e9f00f37ad59992019d3f2e82c0850e56dda6c4e227199ae888666fbdd1e54695cfe07b06d2b7ae623e7eab03bf3

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          dddb7f44df311203facdf9bb248f80ad

          SHA1

          a25e8a78fc5d298c8605180a1296300f4e2827d0

          SHA256

          865d5dd81f34540c2a931aec5a5280571a7c910fb6dde4b174756d4ba3fbd38d

          SHA512

          240f35fbd13c6bb61a1665fe61442f8d8b92e9f00f37ad59992019d3f2e82c0850e56dda6c4e227199ae888666fbdd1e54695cfe07b06d2b7ae623e7eab03bf3

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

          Filesize

          162B

          MD5

          1b7c22a214949975556626d7217e9a39

          SHA1

          d01c97e2944166ed23e47e4a62ff471ab8fa031f

          SHA256

          340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

          SHA512

          ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

        • C:\Windows\Temp\1.exe

          Filesize

          168KB

          MD5

          03728fed675bcde5256342183b1d6f27

          SHA1

          d13eace7d3d92f93756504b274777cc269b222a2

          SHA256

          f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

          SHA512

          6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

        • C:\Windows\Temp\1.exe

          Filesize

          168KB

          MD5

          03728fed675bcde5256342183b1d6f27

          SHA1

          d13eace7d3d92f93756504b274777cc269b222a2

          SHA256

          f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

          SHA512

          6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

        • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          dddb7f44df311203facdf9bb248f80ad

          SHA1

          a25e8a78fc5d298c8605180a1296300f4e2827d0

          SHA256

          865d5dd81f34540c2a931aec5a5280571a7c910fb6dde4b174756d4ba3fbd38d

          SHA512

          240f35fbd13c6bb61a1665fe61442f8d8b92e9f00f37ad59992019d3f2e82c0850e56dda6c4e227199ae888666fbdd1e54695cfe07b06d2b7ae623e7eab03bf3

        • memory/1252-202-0x0000000002650000-0x0000000002660000-memory.dmp

          Filesize

          64KB

        • memory/1252-203-0x0000000002650000-0x0000000002660000-memory.dmp

          Filesize

          64KB

        • memory/1252-230-0x0000000005400000-0x0000000005460000-memory.dmp

          Filesize

          384KB

        • memory/1252-228-0x0000000005400000-0x0000000005460000-memory.dmp

          Filesize

          384KB

        • memory/1252-226-0x0000000005400000-0x0000000005460000-memory.dmp

          Filesize

          384KB

        • memory/1252-224-0x0000000005400000-0x0000000005460000-memory.dmp

          Filesize

          384KB

        • memory/1252-222-0x0000000005400000-0x0000000005460000-memory.dmp

          Filesize

          384KB

        • memory/1252-2347-0x0000000005630000-0x0000000005662000-memory.dmp

          Filesize

          200KB

        • memory/1252-238-0x0000000005400000-0x0000000005460000-memory.dmp

          Filesize

          384KB

        • memory/1252-236-0x0000000005400000-0x0000000005460000-memory.dmp

          Filesize

          384KB

        • memory/1252-234-0x0000000005400000-0x0000000005460000-memory.dmp

          Filesize

          384KB

        • memory/1252-220-0x0000000005400000-0x0000000005460000-memory.dmp

          Filesize

          384KB

        • memory/1252-218-0x0000000005400000-0x0000000005460000-memory.dmp

          Filesize

          384KB

        • memory/1252-199-0x0000000004E50000-0x0000000004EB8000-memory.dmp

          Filesize

          416KB

        • memory/1252-200-0x0000000005400000-0x0000000005466000-memory.dmp

          Filesize

          408KB

        • memory/1252-201-0x0000000002430000-0x000000000248B000-memory.dmp

          Filesize

          364KB

        • memory/1252-232-0x0000000005400000-0x0000000005460000-memory.dmp

          Filesize

          384KB

        • memory/1252-216-0x0000000005400000-0x0000000005460000-memory.dmp

          Filesize

          384KB

        • memory/1252-204-0x0000000002650000-0x0000000002660000-memory.dmp

          Filesize

          64KB

        • memory/1252-205-0x0000000005400000-0x0000000005460000-memory.dmp

          Filesize

          384KB

        • memory/1252-206-0x0000000005400000-0x0000000005460000-memory.dmp

          Filesize

          384KB

        • memory/1252-208-0x0000000005400000-0x0000000005460000-memory.dmp

          Filesize

          384KB

        • memory/1252-210-0x0000000005400000-0x0000000005460000-memory.dmp

          Filesize

          384KB

        • memory/1252-212-0x0000000005400000-0x0000000005460000-memory.dmp

          Filesize

          384KB

        • memory/1252-214-0x0000000005400000-0x0000000005460000-memory.dmp

          Filesize

          384KB

        • memory/1336-2361-0x0000000002540000-0x0000000002546000-memory.dmp

          Filesize

          24KB

        • memory/1336-2375-0x0000000004C20000-0x0000000004C30000-memory.dmp

          Filesize

          64KB

        • memory/1336-2374-0x0000000006FB0000-0x00000000074DC000-memory.dmp

          Filesize

          5.2MB

        • memory/1336-2369-0x0000000004FF0000-0x0000000005066000-memory.dmp

          Filesize

          472KB

        • memory/1336-2366-0x0000000004C20000-0x0000000004C30000-memory.dmp

          Filesize

          64KB

        • memory/1336-2360-0x0000000000360000-0x0000000000390000-memory.dmp

          Filesize

          192KB

        • memory/1336-2364-0x0000000004C70000-0x0000000004C82000-memory.dmp

          Filesize

          72KB

        • memory/3100-149-0x0000000000880000-0x000000000088A000-memory.dmp

          Filesize

          40KB

        • memory/4048-2362-0x00000000056B0000-0x0000000005CB6000-memory.dmp

          Filesize

          6.0MB

        • memory/4048-2368-0x00000000052C0000-0x000000000530B000-memory.dmp

          Filesize

          300KB

        • memory/4048-2376-0x0000000004F90000-0x0000000004FA0000-memory.dmp

          Filesize

          64KB

        • memory/4048-2373-0x00000000064F0000-0x00000000066B2000-memory.dmp

          Filesize

          1.8MB

        • memory/4048-2372-0x00000000062D0000-0x0000000006320000-memory.dmp

          Filesize

          320KB

        • memory/4048-2371-0x0000000005620000-0x0000000005686000-memory.dmp

          Filesize

          408KB

        • memory/4048-2370-0x0000000005580000-0x0000000005612000-memory.dmp

          Filesize

          584KB

        • memory/4048-2355-0x00000000007D0000-0x00000000007FE000-memory.dmp

          Filesize

          184KB

        • memory/4048-2367-0x0000000004F90000-0x0000000004FA0000-memory.dmp

          Filesize

          64KB

        • memory/4048-2365-0x0000000005140000-0x000000000517E000-memory.dmp

          Filesize

          248KB

        • memory/4048-2359-0x0000000004F80000-0x0000000004F86000-memory.dmp

          Filesize

          24KB

        • memory/4048-2363-0x00000000051B0000-0x00000000052BA000-memory.dmp

          Filesize

          1.0MB

        • memory/5080-179-0x00000000027E0000-0x00000000027F2000-memory.dmp

          Filesize

          72KB

        • memory/5080-177-0x00000000027E0000-0x00000000027F2000-memory.dmp

          Filesize

          72KB

        • memory/5080-181-0x00000000027E0000-0x00000000027F2000-memory.dmp

          Filesize

          72KB

        • memory/5080-175-0x00000000027E0000-0x00000000027F2000-memory.dmp

          Filesize

          72KB

        • memory/5080-183-0x00000000027E0000-0x00000000027F2000-memory.dmp

          Filesize

          72KB

        • memory/5080-173-0x00000000027E0000-0x00000000027F2000-memory.dmp

          Filesize

          72KB

        • memory/5080-185-0x00000000027E0000-0x00000000027F2000-memory.dmp

          Filesize

          72KB

        • memory/5080-194-0x0000000000400000-0x0000000000809000-memory.dmp

          Filesize

          4.0MB

        • memory/5080-171-0x00000000027E0000-0x00000000027F2000-memory.dmp

          Filesize

          72KB

        • memory/5080-187-0x00000000027E0000-0x00000000027F2000-memory.dmp

          Filesize

          72KB

        • memory/5080-189-0x00000000027E0000-0x00000000027F2000-memory.dmp

          Filesize

          72KB

        • memory/5080-190-0x0000000000400000-0x0000000000809000-memory.dmp

          Filesize

          4.0MB

        • memory/5080-191-0x0000000004EF0000-0x0000000004F00000-memory.dmp

          Filesize

          64KB

        • memory/5080-169-0x00000000027E0000-0x00000000027F2000-memory.dmp

          Filesize

          72KB

        • memory/5080-167-0x00000000027E0000-0x00000000027F2000-memory.dmp

          Filesize

          72KB

        • memory/5080-192-0x0000000004EF0000-0x0000000004F00000-memory.dmp

          Filesize

          64KB

        • memory/5080-165-0x00000000027E0000-0x00000000027F2000-memory.dmp

          Filesize

          72KB

        • memory/5080-163-0x00000000027E0000-0x00000000027F2000-memory.dmp

          Filesize

          72KB

        • memory/5080-162-0x00000000027E0000-0x00000000027F2000-memory.dmp

          Filesize

          72KB

        • memory/5080-160-0x0000000004EF0000-0x0000000004F00000-memory.dmp

          Filesize

          64KB

        • memory/5080-161-0x00000000027E0000-0x00000000027F8000-memory.dmp

          Filesize

          96KB

        • memory/5080-159-0x0000000004EF0000-0x0000000004F00000-memory.dmp

          Filesize

          64KB

        • memory/5080-156-0x0000000000920000-0x000000000094D000-memory.dmp

          Filesize

          180KB

        • memory/5080-157-0x0000000004EF0000-0x0000000004F00000-memory.dmp

          Filesize

          64KB

        • memory/5080-158-0x0000000004F00000-0x00000000053FE000-memory.dmp

          Filesize

          5.0MB

        • memory/5080-155-0x0000000002780000-0x000000000279A000-memory.dmp

          Filesize

          104KB