Analysis

  • max time kernel
    148s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-05-2023 16:55

General

  • Target

    6cc5378dff0f03719e4fe00b1f909a1d34656bb74ca5613421d220ebcb69535f.exe

  • Size

    1.2MB

  • MD5

    d8e095d60f3a0b360d268b10541a9a1e

  • SHA1

    b2e1614b68d9913bf9fe0676e2faf1a33e960cc2

  • SHA256

    6cc5378dff0f03719e4fe00b1f909a1d34656bb74ca5613421d220ebcb69535f

  • SHA512

    06096876d9c276938cf2221d1f0ea16fe01233bbadf1a86a63ab5d8b5fc19ef479f8f4f425d4d9f78b9ff62ae904546c41a712e26dba63f1e5e45e0579e01143

  • SSDEEP

    24576:nySzpXrI4BFjTIHJYoO96hTGbA/Gidmj3FjRS8MIasWT:yu9TDjm3XMbaOj3Fj1

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Redline Stealer samples 3 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6cc5378dff0f03719e4fe00b1f909a1d34656bb74ca5613421d220ebcb69535f.exe
    "C:\Users\Admin\AppData\Local\Temp\6cc5378dff0f03719e4fe00b1f909a1d34656bb74ca5613421d220ebcb69535f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4548
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z78518765.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z78518765.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3368
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z61336572.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z61336572.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3252
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z44928995.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z44928995.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2352
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s35399472.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s35399472.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1948
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2672
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 1188
              6⤵
              • Program crash
              PID:4068
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t53285970.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t53285970.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3380
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\u08641175.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\u08641175.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1100
          • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4556
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:4076
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v06914360.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v06914360.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3940
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3940 -s 1088
          4⤵
          • Program crash
          PID:1708
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w34387275.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w34387275.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2748
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1948 -ip 1948
    1⤵
      PID:4364
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3940 -ip 3940
      1⤵
        PID:5076
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:3988

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        Filesize

        230KB

        MD5

        80c30a8c7c7983bdf93ba8a1a0162080

        SHA1

        bcf9acd86385c7314c19452af24011e37cf26585

        SHA256

        8c39d5530cf92f0df09f164ba9344e395462c69e11484c1b1c1b733eb1fd66a4

        SHA512

        37c68dc6f16e2c46c07dd4acb59fe38b00aa96de02b518ed3aef3a0aa0cbdfb5018cb5f42ecacdfee37b10ce86a2140441baf77ee7e1c3d653e38c4e516e4c81

      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        Filesize

        230KB

        MD5

        80c30a8c7c7983bdf93ba8a1a0162080

        SHA1

        bcf9acd86385c7314c19452af24011e37cf26585

        SHA256

        8c39d5530cf92f0df09f164ba9344e395462c69e11484c1b1c1b733eb1fd66a4

        SHA512

        37c68dc6f16e2c46c07dd4acb59fe38b00aa96de02b518ed3aef3a0aa0cbdfb5018cb5f42ecacdfee37b10ce86a2140441baf77ee7e1c3d653e38c4e516e4c81

      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        Filesize

        230KB

        MD5

        80c30a8c7c7983bdf93ba8a1a0162080

        SHA1

        bcf9acd86385c7314c19452af24011e37cf26585

        SHA256

        8c39d5530cf92f0df09f164ba9344e395462c69e11484c1b1c1b733eb1fd66a4

        SHA512

        37c68dc6f16e2c46c07dd4acb59fe38b00aa96de02b518ed3aef3a0aa0cbdfb5018cb5f42ecacdfee37b10ce86a2140441baf77ee7e1c3d653e38c4e516e4c81

      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        Filesize

        230KB

        MD5

        80c30a8c7c7983bdf93ba8a1a0162080

        SHA1

        bcf9acd86385c7314c19452af24011e37cf26585

        SHA256

        8c39d5530cf92f0df09f164ba9344e395462c69e11484c1b1c1b733eb1fd66a4

        SHA512

        37c68dc6f16e2c46c07dd4acb59fe38b00aa96de02b518ed3aef3a0aa0cbdfb5018cb5f42ecacdfee37b10ce86a2140441baf77ee7e1c3d653e38c4e516e4c81

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w34387275.exe
        Filesize

        176KB

        MD5

        6c3dd984397c3fbc8b186e6b1944acbe

        SHA1

        0b30008aa1dc0a466d61643c1276cbdc88e3bc63

        SHA256

        fd3e1a412fd6d9fe5dde92e96a2bda2b655941ebea1f085a143876e187634166

        SHA512

        937a73c9080478f9824a81217d208e6c58a8814d87c4268be3e9570e4b56052555a8a0c14ac3401dad6d5715dbf795435c1973d0b8fd0f29322d7324c9cdb685

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w34387275.exe
        Filesize

        176KB

        MD5

        6c3dd984397c3fbc8b186e6b1944acbe

        SHA1

        0b30008aa1dc0a466d61643c1276cbdc88e3bc63

        SHA256

        fd3e1a412fd6d9fe5dde92e96a2bda2b655941ebea1f085a143876e187634166

        SHA512

        937a73c9080478f9824a81217d208e6c58a8814d87c4268be3e9570e4b56052555a8a0c14ac3401dad6d5715dbf795435c1973d0b8fd0f29322d7324c9cdb685

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z78518765.exe
        Filesize

        1.0MB

        MD5

        53957acd7f0581fa4a150992e25ecc92

        SHA1

        5f12d16ac8059bb090e726daaca31fc97c45dd12

        SHA256

        7f489294a8d14be1930d097ee7a4e17030ecbe5e48f4d6c57f9532c13e22a661

        SHA512

        37ac4ffdb7b9f29400ce3e2b12d43e7871811e5a20ba4d2c127f0bcf18da2e89472e7c0107592f3b9f980c6be73b302d5f1480f16d67593c9b0607ddf0ce1b28

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z78518765.exe
        Filesize

        1.0MB

        MD5

        53957acd7f0581fa4a150992e25ecc92

        SHA1

        5f12d16ac8059bb090e726daaca31fc97c45dd12

        SHA256

        7f489294a8d14be1930d097ee7a4e17030ecbe5e48f4d6c57f9532c13e22a661

        SHA512

        37ac4ffdb7b9f29400ce3e2b12d43e7871811e5a20ba4d2c127f0bcf18da2e89472e7c0107592f3b9f980c6be73b302d5f1480f16d67593c9b0607ddf0ce1b28

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v06914360.exe
        Filesize

        395KB

        MD5

        4f6f7aed1d2eaba175cd1680512283d7

        SHA1

        8951ff26b50a39cbc2e552c2853152e212e5a4e0

        SHA256

        8d2b92dba4feb4487fd65ad2ffeac4a45296e82ba4dfdf94a845626c648e0190

        SHA512

        eba3e59c4b106276b81fa2f809d114abc17ac685685a00b6452ab459b5b949155ed1f6177e4e0877208cc78d8bda1416041572fd831ccfb6cf8c302776c0b3ad

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v06914360.exe
        Filesize

        395KB

        MD5

        4f6f7aed1d2eaba175cd1680512283d7

        SHA1

        8951ff26b50a39cbc2e552c2853152e212e5a4e0

        SHA256

        8d2b92dba4feb4487fd65ad2ffeac4a45296e82ba4dfdf94a845626c648e0190

        SHA512

        eba3e59c4b106276b81fa2f809d114abc17ac685685a00b6452ab459b5b949155ed1f6177e4e0877208cc78d8bda1416041572fd831ccfb6cf8c302776c0b3ad

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z61336572.exe
        Filesize

        760KB

        MD5

        53c6932bb7229029820e17c146533c49

        SHA1

        691fcce33266ea5ab9b8ba1c2714e9f8499fa653

        SHA256

        6e9275a4e3d9a0862930dc688efe865fc7a1e864ff39532999b25075c9ea4f97

        SHA512

        03c959b16a21ce876801c8c730ae3917407621178730d9648754ae37659bf1f7636623b657f8fc0a89dcbf91f63f398ba8c26a3e4b2426ffd8fdf7f4a69a0efe

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z61336572.exe
        Filesize

        760KB

        MD5

        53c6932bb7229029820e17c146533c49

        SHA1

        691fcce33266ea5ab9b8ba1c2714e9f8499fa653

        SHA256

        6e9275a4e3d9a0862930dc688efe865fc7a1e864ff39532999b25075c9ea4f97

        SHA512

        03c959b16a21ce876801c8c730ae3917407621178730d9648754ae37659bf1f7636623b657f8fc0a89dcbf91f63f398ba8c26a3e4b2426ffd8fdf7f4a69a0efe

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\u08641175.exe
        Filesize

        230KB

        MD5

        80c30a8c7c7983bdf93ba8a1a0162080

        SHA1

        bcf9acd86385c7314c19452af24011e37cf26585

        SHA256

        8c39d5530cf92f0df09f164ba9344e395462c69e11484c1b1c1b733eb1fd66a4

        SHA512

        37c68dc6f16e2c46c07dd4acb59fe38b00aa96de02b518ed3aef3a0aa0cbdfb5018cb5f42ecacdfee37b10ce86a2140441baf77ee7e1c3d653e38c4e516e4c81

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\u08641175.exe
        Filesize

        230KB

        MD5

        80c30a8c7c7983bdf93ba8a1a0162080

        SHA1

        bcf9acd86385c7314c19452af24011e37cf26585

        SHA256

        8c39d5530cf92f0df09f164ba9344e395462c69e11484c1b1c1b733eb1fd66a4

        SHA512

        37c68dc6f16e2c46c07dd4acb59fe38b00aa96de02b518ed3aef3a0aa0cbdfb5018cb5f42ecacdfee37b10ce86a2140441baf77ee7e1c3d653e38c4e516e4c81

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z44928995.exe
        Filesize

        577KB

        MD5

        28db93e3e8e25b764f42968c4617b87e

        SHA1

        712e9897361d4564a0bb9c6b7a0f985c85c95f2a

        SHA256

        cca2b9172326792bb1c985211ad7851c334454a5e90be8b771ff1e7cf39d7579

        SHA512

        668110f369fffa4b0bc3496279b6e2ba9045e44a73f5f70708f4648f6d0af1ae3e50dbb15fa9a12268cecfc8c47de241a84c1a0194e8b2310773399a6a301fe0

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z44928995.exe
        Filesize

        577KB

        MD5

        28db93e3e8e25b764f42968c4617b87e

        SHA1

        712e9897361d4564a0bb9c6b7a0f985c85c95f2a

        SHA256

        cca2b9172326792bb1c985211ad7851c334454a5e90be8b771ff1e7cf39d7579

        SHA512

        668110f369fffa4b0bc3496279b6e2ba9045e44a73f5f70708f4648f6d0af1ae3e50dbb15fa9a12268cecfc8c47de241a84c1a0194e8b2310773399a6a301fe0

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s35399472.exe
        Filesize

        574KB

        MD5

        cfc1dfe55b2649a168caf47bb97d41d5

        SHA1

        7dd9bf83806d9457445eeeb9f62745e6caae3014

        SHA256

        3ec112b0982e63b72d5cf37a7493b9a19fa2b98d52f53d25d3970b39a1d7c668

        SHA512

        198702e53e4d25dfe1678b4c74d95024c00966b6b3e010640186d750f3618bf67380396e8a3e457d4d6cfcfe7ea8bacb6de843103fb4027f9e4ac9d3dacc401c

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s35399472.exe
        Filesize

        574KB

        MD5

        cfc1dfe55b2649a168caf47bb97d41d5

        SHA1

        7dd9bf83806d9457445eeeb9f62745e6caae3014

        SHA256

        3ec112b0982e63b72d5cf37a7493b9a19fa2b98d52f53d25d3970b39a1d7c668

        SHA512

        198702e53e4d25dfe1678b4c74d95024c00966b6b3e010640186d750f3618bf67380396e8a3e457d4d6cfcfe7ea8bacb6de843103fb4027f9e4ac9d3dacc401c

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t53285970.exe
        Filesize

        169KB

        MD5

        0b56b24a7bcf7097e66812f2b407303a

        SHA1

        6f0341757c4a90bbfc904192b0e7f13ee57224d3

        SHA256

        2888d89ad22387e0e107134c7188b1bcbe83268faf90a0a87eaeafdefb87ca3e

        SHA512

        7adecbbd172c7d90227ad33096f5cae4079bfe04ae538f11c3fb0f39385d9de65249478ec57eff40a0e1ef59c200ed334ea93ff234ea7a056bbdbabaec3912b3

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t53285970.exe
        Filesize

        169KB

        MD5

        0b56b24a7bcf7097e66812f2b407303a

        SHA1

        6f0341757c4a90bbfc904192b0e7f13ee57224d3

        SHA256

        2888d89ad22387e0e107134c7188b1bcbe83268faf90a0a87eaeafdefb87ca3e

        SHA512

        7adecbbd172c7d90227ad33096f5cae4079bfe04ae538f11c3fb0f39385d9de65249478ec57eff40a0e1ef59c200ed334ea93ff234ea7a056bbdbabaec3912b3

      • C:\Windows\Temp\1.exe
        Filesize

        168KB

        MD5

        f16fb63d4e551d3808e8f01f2671b57e

        SHA1

        781153ad6235a1152da112de1fb39a6f2d063575

        SHA256

        8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

        SHA512

        fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

      • C:\Windows\Temp\1.exe
        Filesize

        168KB

        MD5

        f16fb63d4e551d3808e8f01f2671b57e

        SHA1

        781153ad6235a1152da112de1fb39a6f2d063575

        SHA256

        8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

        SHA512

        fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

      • C:\Windows\Temp\1.exe
        Filesize

        168KB

        MD5

        f16fb63d4e551d3808e8f01f2671b57e

        SHA1

        781153ad6235a1152da112de1fb39a6f2d063575

        SHA256

        8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

        SHA512

        fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

      • memory/1948-220-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-172-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-190-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-192-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-194-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-196-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-198-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-200-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-202-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-204-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-206-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-208-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-210-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-212-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-214-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-216-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-218-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-226-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-228-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-224-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-222-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-186-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-230-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-1911-0x0000000004F70000-0x0000000004F80000-memory.dmp
        Filesize

        64KB

      • memory/1948-1915-0x0000000004F70000-0x0000000004F80000-memory.dmp
        Filesize

        64KB

      • memory/1948-1913-0x0000000004F70000-0x0000000004F80000-memory.dmp
        Filesize

        64KB

      • memory/1948-2318-0x0000000004F70000-0x0000000004F80000-memory.dmp
        Filesize

        64KB

      • memory/1948-184-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-182-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-180-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-162-0x0000000004F80000-0x0000000005524000-memory.dmp
        Filesize

        5.6MB

      • memory/1948-163-0x0000000000C10000-0x0000000000C6B000-memory.dmp
        Filesize

        364KB

      • memory/1948-165-0x0000000004F70000-0x0000000004F80000-memory.dmp
        Filesize

        64KB

      • memory/1948-164-0x0000000004F70000-0x0000000004F80000-memory.dmp
        Filesize

        64KB

      • memory/1948-166-0x0000000004F70000-0x0000000004F80000-memory.dmp
        Filesize

        64KB

      • memory/1948-167-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-178-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-176-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-168-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-170-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-188-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/1948-174-0x0000000005530000-0x0000000005590000-memory.dmp
        Filesize

        384KB

      • memory/2672-2333-0x000000000A470000-0x000000000A482000-memory.dmp
        Filesize

        72KB

      • memory/2672-2347-0x000000000BD80000-0x000000000BF42000-memory.dmp
        Filesize

        1.8MB

      • memory/2672-2331-0x000000000AA30000-0x000000000B048000-memory.dmp
        Filesize

        6.1MB

      • memory/2672-2332-0x000000000A540000-0x000000000A64A000-memory.dmp
        Filesize

        1.0MB

      • memory/2672-2348-0x000000000C480000-0x000000000C9AC000-memory.dmp
        Filesize

        5.2MB

      • memory/2672-2350-0x000000000BCF0000-0x000000000BD40000-memory.dmp
        Filesize

        320KB

      • memory/2672-2344-0x000000000A900000-0x000000000A992000-memory.dmp
        Filesize

        584KB

      • memory/2672-2343-0x000000000A7E0000-0x000000000A856000-memory.dmp
        Filesize

        472KB

      • memory/2672-2346-0x0000000004F80000-0x0000000004F90000-memory.dmp
        Filesize

        64KB

      • memory/2672-2330-0x0000000000700000-0x000000000072E000-memory.dmp
        Filesize

        184KB

      • memory/2672-2336-0x0000000004F80000-0x0000000004F90000-memory.dmp
        Filesize

        64KB

      • memory/2672-2334-0x000000000A4D0000-0x000000000A50C000-memory.dmp
        Filesize

        240KB

      • memory/2748-2439-0x0000000004A20000-0x0000000004A30000-memory.dmp
        Filesize

        64KB

      • memory/2748-2440-0x0000000004A20000-0x0000000004A30000-memory.dmp
        Filesize

        64KB

      • memory/2748-2441-0x0000000004A20000-0x0000000004A30000-memory.dmp
        Filesize

        64KB

      • memory/3380-2342-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/3380-2349-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/3380-2345-0x0000000005860000-0x00000000058C6000-memory.dmp
        Filesize

        408KB

      • memory/3380-2341-0x00000000002A0000-0x00000000002CE000-memory.dmp
        Filesize

        184KB

      • memory/3940-2406-0x00000000020A0000-0x00000000020B0000-memory.dmp
        Filesize

        64KB

      • memory/3940-2398-0x00000000006C0000-0x00000000006ED000-memory.dmp
        Filesize

        180KB

      • memory/3940-2399-0x00000000020A0000-0x00000000020B0000-memory.dmp
        Filesize

        64KB

      • memory/3940-2405-0x00000000020A0000-0x00000000020B0000-memory.dmp
        Filesize

        64KB

      • memory/3940-2404-0x00000000020A0000-0x00000000020B0000-memory.dmp
        Filesize

        64KB

      • memory/3940-2401-0x00000000020A0000-0x00000000020B0000-memory.dmp
        Filesize

        64KB

      • memory/3940-2400-0x00000000020A0000-0x00000000020B0000-memory.dmp
        Filesize

        64KB