Analysis

  • max time kernel
    135s
  • max time network
    95s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/05/2023, 04:23

General

  • Target

    55fd50092c1eff2b5943ca4f0cb9ffb946f968812ad1a8147220f038c14feaf6.exe

  • Size

    923KB

  • MD5

    5b06e72a029b30e8a0ac57be2ea4a797

  • SHA1

    23dac60b7d03b9d5cdc8d95b1bee1aff8413bf9e

  • SHA256

    55fd50092c1eff2b5943ca4f0cb9ffb946f968812ad1a8147220f038c14feaf6

  • SHA512

    d83256c440e058e53a7de890ab196f6d1bbcc05a71e06eedc3fe980f3014a2ce2529db5c869398baa9bed7f09ee2063b42bcc87221185d2e118979cea2dfb837

  • SSDEEP

    12288:VMrKy90OWChb4eR27CoCVLuASj8z+ZuTfr8VrnfmsFfnl9f8CJ9lTN:Xy/P8dCVLuAS6+Zu7ARnfmsFNxjhTN

Malware Config

Extracted

Family

redline

Botnet

lupa

C2

217.196.96.56:4138

Attributes
  • auth_value

    fcb02fce9bc10c56a9841d56974bd7b8

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55fd50092c1eff2b5943ca4f0cb9ffb946f968812ad1a8147220f038c14feaf6.exe
    "C:\Users\Admin\AppData\Local\Temp\55fd50092c1eff2b5943ca4f0cb9ffb946f968812ad1a8147220f038c14feaf6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4273437.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4273437.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5052
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2330166.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2330166.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:824
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7813412.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7813412.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2592
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n1280318.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n1280318.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3912
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o2097433.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o2097433.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4876
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1974693.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1974693.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4944
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s3291775.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s3291775.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4580
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:5024
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:4144
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
            5⤵
            • Loads dropped DLL
            PID:1020
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t5695238.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t5695238.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3984
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:1064
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:3112

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          711c90d1e829d5ab57bf41e53eb859fa

          SHA1

          919b51442d45b9eeacf2b88560414c5c11a4960e

          SHA256

          303142b39afdf1c97f6dd822ade1144a5eed2f968e90f6fe7360b946a6ee3a03

          SHA512

          174a78398cb68f60c9291456a8bb2ecbe02bdbb9b6c974414ebab282ad38aaa34cfb388389f83f08de458140e34a0597afb53246a5a7b699c73b94921bdda1bd

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          711c90d1e829d5ab57bf41e53eb859fa

          SHA1

          919b51442d45b9eeacf2b88560414c5c11a4960e

          SHA256

          303142b39afdf1c97f6dd822ade1144a5eed2f968e90f6fe7360b946a6ee3a03

          SHA512

          174a78398cb68f60c9291456a8bb2ecbe02bdbb9b6c974414ebab282ad38aaa34cfb388389f83f08de458140e34a0597afb53246a5a7b699c73b94921bdda1bd

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          711c90d1e829d5ab57bf41e53eb859fa

          SHA1

          919b51442d45b9eeacf2b88560414c5c11a4960e

          SHA256

          303142b39afdf1c97f6dd822ade1144a5eed2f968e90f6fe7360b946a6ee3a03

          SHA512

          174a78398cb68f60c9291456a8bb2ecbe02bdbb9b6c974414ebab282ad38aaa34cfb388389f83f08de458140e34a0597afb53246a5a7b699c73b94921bdda1bd

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          711c90d1e829d5ab57bf41e53eb859fa

          SHA1

          919b51442d45b9eeacf2b88560414c5c11a4960e

          SHA256

          303142b39afdf1c97f6dd822ade1144a5eed2f968e90f6fe7360b946a6ee3a03

          SHA512

          174a78398cb68f60c9291456a8bb2ecbe02bdbb9b6c974414ebab282ad38aaa34cfb388389f83f08de458140e34a0597afb53246a5a7b699c73b94921bdda1bd

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          711c90d1e829d5ab57bf41e53eb859fa

          SHA1

          919b51442d45b9eeacf2b88560414c5c11a4960e

          SHA256

          303142b39afdf1c97f6dd822ade1144a5eed2f968e90f6fe7360b946a6ee3a03

          SHA512

          174a78398cb68f60c9291456a8bb2ecbe02bdbb9b6c974414ebab282ad38aaa34cfb388389f83f08de458140e34a0597afb53246a5a7b699c73b94921bdda1bd

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t5695238.exe

          Filesize

          168KB

          MD5

          0c17cd4b2603923665b34ee133b127c7

          SHA1

          96422018fbee255712e3f24df686adaf152cb052

          SHA256

          ddb7ec0089826a803185caf6f024e32fd47dd8b5597870d9fa5d2321d045ea6a

          SHA512

          cc300c8010f214dd76d219e0e6eb5e4b2b789a1dfdf7d302a7d63a658594add0a584394c1716051b7ab125d4427adb87b096629f1010ee9a0a637feaac636334

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t5695238.exe

          Filesize

          168KB

          MD5

          0c17cd4b2603923665b34ee133b127c7

          SHA1

          96422018fbee255712e3f24df686adaf152cb052

          SHA256

          ddb7ec0089826a803185caf6f024e32fd47dd8b5597870d9fa5d2321d045ea6a

          SHA512

          cc300c8010f214dd76d219e0e6eb5e4b2b789a1dfdf7d302a7d63a658594add0a584394c1716051b7ab125d4427adb87b096629f1010ee9a0a637feaac636334

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4273437.exe

          Filesize

          770KB

          MD5

          909a77c06d25e83214eda9dce3b96bc4

          SHA1

          8a68915bb0585d1d19fce712aef0b750186385bd

          SHA256

          4789c3b4ae0e4ec92994f4f2b82be1436c43617d71e4d5fd183435e0e26340b8

          SHA512

          22132452c99b5b5a1c75ae917418b4e1bd0960d04da8b52b1adf80700b8d4ba293fa5008945a704f21779320e0c76ef27cd9d7527797368719f68d33ddcf467b

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4273437.exe

          Filesize

          770KB

          MD5

          909a77c06d25e83214eda9dce3b96bc4

          SHA1

          8a68915bb0585d1d19fce712aef0b750186385bd

          SHA256

          4789c3b4ae0e4ec92994f4f2b82be1436c43617d71e4d5fd183435e0e26340b8

          SHA512

          22132452c99b5b5a1c75ae917418b4e1bd0960d04da8b52b1adf80700b8d4ba293fa5008945a704f21779320e0c76ef27cd9d7527797368719f68d33ddcf467b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s3291775.exe

          Filesize

          229KB

          MD5

          711c90d1e829d5ab57bf41e53eb859fa

          SHA1

          919b51442d45b9eeacf2b88560414c5c11a4960e

          SHA256

          303142b39afdf1c97f6dd822ade1144a5eed2f968e90f6fe7360b946a6ee3a03

          SHA512

          174a78398cb68f60c9291456a8bb2ecbe02bdbb9b6c974414ebab282ad38aaa34cfb388389f83f08de458140e34a0597afb53246a5a7b699c73b94921bdda1bd

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s3291775.exe

          Filesize

          229KB

          MD5

          711c90d1e829d5ab57bf41e53eb859fa

          SHA1

          919b51442d45b9eeacf2b88560414c5c11a4960e

          SHA256

          303142b39afdf1c97f6dd822ade1144a5eed2f968e90f6fe7360b946a6ee3a03

          SHA512

          174a78398cb68f60c9291456a8bb2ecbe02bdbb9b6c974414ebab282ad38aaa34cfb388389f83f08de458140e34a0597afb53246a5a7b699c73b94921bdda1bd

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2330166.exe

          Filesize

          587KB

          MD5

          c3f606e59067c581097ec4ead243fe1f

          SHA1

          4db0c12dc55950f3b66d31ec935fd40a961b39a5

          SHA256

          2a9b7ad6ce991df8456c73bffd97f359e4ddd88b3501fb7c07082377e48ae128

          SHA512

          bb3a4252d64ca4a4e798ee64518bc4a24a3e1f0de0cda05b792bd10736ca8cdfb466328c8300fccdc77f6da4b4547577f0ff638ca9b7fe58975b32cfa9d0f726

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2330166.exe

          Filesize

          587KB

          MD5

          c3f606e59067c581097ec4ead243fe1f

          SHA1

          4db0c12dc55950f3b66d31ec935fd40a961b39a5

          SHA256

          2a9b7ad6ce991df8456c73bffd97f359e4ddd88b3501fb7c07082377e48ae128

          SHA512

          bb3a4252d64ca4a4e798ee64518bc4a24a3e1f0de0cda05b792bd10736ca8cdfb466328c8300fccdc77f6da4b4547577f0ff638ca9b7fe58975b32cfa9d0f726

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1974693.exe

          Filesize

          176KB

          MD5

          1cf49f63c7f280e697b1eebb35a8e72b

          SHA1

          0d80ca968654f4ccf528bf9e6765ab147834eaaf

          SHA256

          d4b64bfaf011b5885976a223a988e5a95f6698d7909adf714b966eb398e4ba39

          SHA512

          352ab57e7ac45c83aaa9fd09cf6cedc63ce3931c89b75e58a6afceaf22c60b8f82c819ddf47f658eee3203db2db2aeac35e94e83d09611e4661f265d9257b8d0

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1974693.exe

          Filesize

          176KB

          MD5

          1cf49f63c7f280e697b1eebb35a8e72b

          SHA1

          0d80ca968654f4ccf528bf9e6765ab147834eaaf

          SHA256

          d4b64bfaf011b5885976a223a988e5a95f6698d7909adf714b966eb398e4ba39

          SHA512

          352ab57e7ac45c83aaa9fd09cf6cedc63ce3931c89b75e58a6afceaf22c60b8f82c819ddf47f658eee3203db2db2aeac35e94e83d09611e4661f265d9257b8d0

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7813412.exe

          Filesize

          383KB

          MD5

          79377f8ac0c621316cf95e9a8acaa943

          SHA1

          99ad2882bec676194d2cbcc186aa7818a72019e1

          SHA256

          701d28da5800bf0363c0b892019508a6028d69890b52aa094d5b9c87b19c562c

          SHA512

          77d0727fd10a2a1c10a03c9af91e5f0cd57a31bd2466fe1b0e96846aed632aaf48b32226c16e3a593f478948d5e62643ebec69bf10c3022996e542a5003b3ebb

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7813412.exe

          Filesize

          383KB

          MD5

          79377f8ac0c621316cf95e9a8acaa943

          SHA1

          99ad2882bec676194d2cbcc186aa7818a72019e1

          SHA256

          701d28da5800bf0363c0b892019508a6028d69890b52aa094d5b9c87b19c562c

          SHA512

          77d0727fd10a2a1c10a03c9af91e5f0cd57a31bd2466fe1b0e96846aed632aaf48b32226c16e3a593f478948d5e62643ebec69bf10c3022996e542a5003b3ebb

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n1280318.exe

          Filesize

          283KB

          MD5

          25bc263089ab01af55f262ffa1d0f833

          SHA1

          2fb749325e5abdfafe1e23f697fe17f68ae504e5

          SHA256

          d0c30eb0ed71bb1dba20696e84426e61479af949f034a9316f84f360f5f100e5

          SHA512

          b8aeb680fbc325846f8dcad9088d3c58a07a82332442530527084cd9fccf94d38e15afe45a1c0fdfd207f414c36aaae3527824ca36dcb3e394c910f08a9c1177

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n1280318.exe

          Filesize

          283KB

          MD5

          25bc263089ab01af55f262ffa1d0f833

          SHA1

          2fb749325e5abdfafe1e23f697fe17f68ae504e5

          SHA256

          d0c30eb0ed71bb1dba20696e84426e61479af949f034a9316f84f360f5f100e5

          SHA512

          b8aeb680fbc325846f8dcad9088d3c58a07a82332442530527084cd9fccf94d38e15afe45a1c0fdfd207f414c36aaae3527824ca36dcb3e394c910f08a9c1177

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o2097433.exe

          Filesize

          168KB

          MD5

          cd8c53c876a909f0bdca138579a79c2f

          SHA1

          04e953a601b97479b6017f9e589f3666c124ce4f

          SHA256

          3ecd6823831454044f968f057c3a917ed9a589f6de19a1e6220f1325212b4e2f

          SHA512

          dfcd362088ee9a5a3c6101b556879b8fec1790dff61b9d07ed99a94f597cd9a668886d378d1af1d4373ada991046013519886d3e2b7885dd1b443aa0bd1050cd

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o2097433.exe

          Filesize

          168KB

          MD5

          cd8c53c876a909f0bdca138579a79c2f

          SHA1

          04e953a601b97479b6017f9e589f3666c124ce4f

          SHA256

          3ecd6823831454044f968f057c3a917ed9a589f6de19a1e6220f1325212b4e2f

          SHA512

          dfcd362088ee9a5a3c6101b556879b8fec1790dff61b9d07ed99a94f597cd9a668886d378d1af1d4373ada991046013519886d3e2b7885dd1b443aa0bd1050cd

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o2097433.exe

          Filesize

          168KB

          MD5

          cd8c53c876a909f0bdca138579a79c2f

          SHA1

          04e953a601b97479b6017f9e589f3666c124ce4f

          SHA256

          3ecd6823831454044f968f057c3a917ed9a589f6de19a1e6220f1325212b4e2f

          SHA512

          dfcd362088ee9a5a3c6101b556879b8fec1790dff61b9d07ed99a94f597cd9a668886d378d1af1d4373ada991046013519886d3e2b7885dd1b443aa0bd1050cd

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

          Filesize

          162B

          MD5

          1b7c22a214949975556626d7217e9a39

          SHA1

          d01c97e2944166ed23e47e4a62ff471ab8fa031f

          SHA256

          340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

          SHA512

          ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

        • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • memory/3912-159-0x0000000002580000-0x0000000002592000-memory.dmp

          Filesize

          72KB

        • memory/3912-148-0x00000000009E0000-0x00000000009FA000-memory.dmp

          Filesize

          104KB

        • memory/3912-179-0x0000000002580000-0x0000000002592000-memory.dmp

          Filesize

          72KB

        • memory/3912-181-0x0000000002580000-0x0000000002592000-memory.dmp

          Filesize

          72KB

        • memory/3912-182-0x0000000000400000-0x00000000006C7000-memory.dmp

          Filesize

          2.8MB

        • memory/3912-183-0x00000000028F0000-0x0000000002900000-memory.dmp

          Filesize

          64KB

        • memory/3912-184-0x00000000028F0000-0x0000000002900000-memory.dmp

          Filesize

          64KB

        • memory/3912-186-0x0000000000400000-0x00000000006C7000-memory.dmp

          Filesize

          2.8MB

        • memory/3912-175-0x0000000002580000-0x0000000002592000-memory.dmp

          Filesize

          72KB

        • memory/3912-173-0x0000000002580000-0x0000000002592000-memory.dmp

          Filesize

          72KB

        • memory/3912-171-0x0000000002580000-0x0000000002592000-memory.dmp

          Filesize

          72KB

        • memory/3912-147-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/3912-177-0x0000000002580000-0x0000000002592000-memory.dmp

          Filesize

          72KB

        • memory/3912-165-0x0000000002580000-0x0000000002592000-memory.dmp

          Filesize

          72KB

        • memory/3912-150-0x0000000004D50000-0x000000000524E000-memory.dmp

          Filesize

          5.0MB

        • memory/3912-151-0x00000000028F0000-0x0000000002900000-memory.dmp

          Filesize

          64KB

        • memory/3912-149-0x00000000028F0000-0x0000000002900000-memory.dmp

          Filesize

          64KB

        • memory/3912-152-0x00000000028F0000-0x0000000002900000-memory.dmp

          Filesize

          64KB

        • memory/3912-167-0x0000000002580000-0x0000000002592000-memory.dmp

          Filesize

          72KB

        • memory/3912-169-0x0000000002580000-0x0000000002592000-memory.dmp

          Filesize

          72KB

        • memory/3912-153-0x0000000002580000-0x0000000002598000-memory.dmp

          Filesize

          96KB

        • memory/3912-154-0x0000000002580000-0x0000000002592000-memory.dmp

          Filesize

          72KB

        • memory/3912-155-0x0000000002580000-0x0000000002592000-memory.dmp

          Filesize

          72KB

        • memory/3912-157-0x0000000002580000-0x0000000002592000-memory.dmp

          Filesize

          72KB

        • memory/3912-161-0x0000000002580000-0x0000000002592000-memory.dmp

          Filesize

          72KB

        • memory/3912-163-0x0000000002580000-0x0000000002592000-memory.dmp

          Filesize

          72KB

        • memory/3984-254-0x0000000005000000-0x0000000005010000-memory.dmp

          Filesize

          64KB

        • memory/3984-255-0x000000000A6F0000-0x000000000A73B000-memory.dmp

          Filesize

          300KB

        • memory/4876-191-0x0000000004F40000-0x0000000004F46000-memory.dmp

          Filesize

          24KB

        • memory/4876-199-0x0000000005DC0000-0x0000000005E52000-memory.dmp

          Filesize

          584KB

        • memory/4876-190-0x0000000000790000-0x00000000007BE000-memory.dmp

          Filesize

          184KB

        • memory/4876-192-0x00000000057B0000-0x0000000005DB6000-memory.dmp

          Filesize

          6.0MB

        • memory/4876-204-0x0000000004F90000-0x0000000004FA0000-memory.dmp

          Filesize

          64KB

        • memory/4876-203-0x0000000008950000-0x0000000008E7C000-memory.dmp

          Filesize

          5.2MB

        • memory/4876-202-0x0000000006BD0000-0x0000000006D92000-memory.dmp

          Filesize

          1.8MB

        • memory/4876-201-0x0000000006050000-0x00000000060A0000-memory.dmp

          Filesize

          320KB

        • memory/4876-200-0x0000000005E60000-0x0000000005EC6000-memory.dmp

          Filesize

          408KB

        • memory/4876-193-0x00000000052B0000-0x00000000053BA000-memory.dmp

          Filesize

          1.0MB

        • memory/4876-198-0x0000000005660000-0x00000000056D6000-memory.dmp

          Filesize

          472KB

        • memory/4876-197-0x00000000053C0000-0x000000000540B000-memory.dmp

          Filesize

          300KB

        • memory/4876-196-0x0000000004F90000-0x0000000004FA0000-memory.dmp

          Filesize

          64KB

        • memory/4876-195-0x0000000005240000-0x000000000527E000-memory.dmp

          Filesize

          248KB

        • memory/4876-194-0x00000000051E0000-0x00000000051F2000-memory.dmp

          Filesize

          72KB

        • memory/4944-238-0x0000000004A00000-0x0000000004A10000-memory.dmp

          Filesize

          64KB

        • memory/4944-237-0x0000000004A00000-0x0000000004A10000-memory.dmp

          Filesize

          64KB

        • memory/4944-239-0x0000000004A00000-0x0000000004A10000-memory.dmp

          Filesize

          64KB