Analysis

  • max time kernel
    129s
  • max time network
    99s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-05-2023 12:10

General

  • Target

    e74fbe82f534f32d22b95e3cd3b10e193846c455e10eefe36e101e2dc501a570.exe

  • Size

    1.2MB

  • MD5

    829415becfb69ce5de08906be1b3ca2c

  • SHA1

    efd2da1a6e90fc565c8d81ac3798869a97d66fa5

  • SHA256

    e74fbe82f534f32d22b95e3cd3b10e193846c455e10eefe36e101e2dc501a570

  • SHA512

    367044d5905b95925f54df55a91de414957ec21e5ddcf3de996e7c16b7cbbc5b41eeeea083487dbd49e4140699fbaf0bfc18c840471206aaf70daa5ca41225ae

  • SSDEEP

    24576:iysMhQxA84oXlKuDWQcWv9HeqvwWqIVzUT+Tk9d:JsMhQxVZXDWQci9HeqvwW7xFc

Malware Config

Extracted

Family

redline

Botnet

lupa

C2

217.196.96.56:4138

Attributes
  • auth_value

    fcb02fce9bc10c56a9841d56974bd7b8

Extracted

Family

redline

Botnet

boom

C2

217.196.96.56:4138

Attributes
  • auth_value

    1ce6aebe15bac07a7bc88b114bc49335

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e74fbe82f534f32d22b95e3cd3b10e193846c455e10eefe36e101e2dc501a570.exe
    "C:\Users\Admin\AppData\Local\Temp\e74fbe82f534f32d22b95e3cd3b10e193846c455e10eefe36e101e2dc501a570.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:700
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2619049.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2619049.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1160
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7824182.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7824182.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1340
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6601846.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6601846.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:5048
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n2986661.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n2986661.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3128
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o3489889.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o3489889.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4828
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p5431667.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p5431667.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4992
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2887778.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2887778.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:980
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3712
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5018320.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5018320.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:5048
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4752
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:1488
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:4876
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:1092
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:5016

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    0bacce3e2b150f2b6ef8259642d59d2a

    SHA1

    43bebe55400ade4ed3efd1c2654fc74ce8944b31

    SHA256

    b3e3bf16438564bcf3a21ddad4662ba2ad34f706a1f8bdbbabb1771959b07bd5

    SHA512

    3c3b84a8002942078a66d01e16c64c09022c17d243a548cb32545bb382d2e80d4fbe58272524ca0c5cf5e77eba3b0e2827bef74598ed8996411d8f76afc7ee7f

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    0bacce3e2b150f2b6ef8259642d59d2a

    SHA1

    43bebe55400ade4ed3efd1c2654fc74ce8944b31

    SHA256

    b3e3bf16438564bcf3a21ddad4662ba2ad34f706a1f8bdbbabb1771959b07bd5

    SHA512

    3c3b84a8002942078a66d01e16c64c09022c17d243a548cb32545bb382d2e80d4fbe58272524ca0c5cf5e77eba3b0e2827bef74598ed8996411d8f76afc7ee7f

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    0bacce3e2b150f2b6ef8259642d59d2a

    SHA1

    43bebe55400ade4ed3efd1c2654fc74ce8944b31

    SHA256

    b3e3bf16438564bcf3a21ddad4662ba2ad34f706a1f8bdbbabb1771959b07bd5

    SHA512

    3c3b84a8002942078a66d01e16c64c09022c17d243a548cb32545bb382d2e80d4fbe58272524ca0c5cf5e77eba3b0e2827bef74598ed8996411d8f76afc7ee7f

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    0bacce3e2b150f2b6ef8259642d59d2a

    SHA1

    43bebe55400ade4ed3efd1c2654fc74ce8944b31

    SHA256

    b3e3bf16438564bcf3a21ddad4662ba2ad34f706a1f8bdbbabb1771959b07bd5

    SHA512

    3c3b84a8002942078a66d01e16c64c09022c17d243a548cb32545bb382d2e80d4fbe58272524ca0c5cf5e77eba3b0e2827bef74598ed8996411d8f76afc7ee7f

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    0bacce3e2b150f2b6ef8259642d59d2a

    SHA1

    43bebe55400ade4ed3efd1c2654fc74ce8944b31

    SHA256

    b3e3bf16438564bcf3a21ddad4662ba2ad34f706a1f8bdbbabb1771959b07bd5

    SHA512

    3c3b84a8002942078a66d01e16c64c09022c17d243a548cb32545bb382d2e80d4fbe58272524ca0c5cf5e77eba3b0e2827bef74598ed8996411d8f76afc7ee7f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5018320.exe

    Filesize

    229KB

    MD5

    0bacce3e2b150f2b6ef8259642d59d2a

    SHA1

    43bebe55400ade4ed3efd1c2654fc74ce8944b31

    SHA256

    b3e3bf16438564bcf3a21ddad4662ba2ad34f706a1f8bdbbabb1771959b07bd5

    SHA512

    3c3b84a8002942078a66d01e16c64c09022c17d243a548cb32545bb382d2e80d4fbe58272524ca0c5cf5e77eba3b0e2827bef74598ed8996411d8f76afc7ee7f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5018320.exe

    Filesize

    229KB

    MD5

    0bacce3e2b150f2b6ef8259642d59d2a

    SHA1

    43bebe55400ade4ed3efd1c2654fc74ce8944b31

    SHA256

    b3e3bf16438564bcf3a21ddad4662ba2ad34f706a1f8bdbbabb1771959b07bd5

    SHA512

    3c3b84a8002942078a66d01e16c64c09022c17d243a548cb32545bb382d2e80d4fbe58272524ca0c5cf5e77eba3b0e2827bef74598ed8996411d8f76afc7ee7f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2619049.exe

    Filesize

    1.0MB

    MD5

    de1851c0bc3d9d76150f835fd8b44349

    SHA1

    b329040ad022c8e639a2d160153895dd22d7c2ce

    SHA256

    5082b9764ee1b3b49eb5f3f6c4a308d1503babacb22de8f453c237f08b818dc5

    SHA512

    d96ad48896110f01604108e7b054b269236e730846f77611c74db139ab045003342fdb9a1ebc509df0699bdae9e8d64b1bd9ca0dab42f694ebed24cf491bb39a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2619049.exe

    Filesize

    1.0MB

    MD5

    de1851c0bc3d9d76150f835fd8b44349

    SHA1

    b329040ad022c8e639a2d160153895dd22d7c2ce

    SHA256

    5082b9764ee1b3b49eb5f3f6c4a308d1503babacb22de8f453c237f08b818dc5

    SHA512

    d96ad48896110f01604108e7b054b269236e730846f77611c74db139ab045003342fdb9a1ebc509df0699bdae9e8d64b1bd9ca0dab42f694ebed24cf491bb39a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2887778.exe

    Filesize

    470KB

    MD5

    fee476dce4f448063e46d24756301209

    SHA1

    b691075bc5631b11221ae8ce113babb810255b41

    SHA256

    c111808e00f93403bcde4167aa1b903fd59779738ebf72c40426ac383be7fa8f

    SHA512

    0872a4522bbbe780dd809bfef85737e0ad6bcd1d7105bc514a468ced8204bbb42e980a9c138ccbdfccce75ac8ef0b8b017506bed3610c5ebb3249648a15add61

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2887778.exe

    Filesize

    470KB

    MD5

    fee476dce4f448063e46d24756301209

    SHA1

    b691075bc5631b11221ae8ce113babb810255b41

    SHA256

    c111808e00f93403bcde4167aa1b903fd59779738ebf72c40426ac383be7fa8f

    SHA512

    0872a4522bbbe780dd809bfef85737e0ad6bcd1d7105bc514a468ced8204bbb42e980a9c138ccbdfccce75ac8ef0b8b017506bed3610c5ebb3249648a15add61

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7824182.exe

    Filesize

    585KB

    MD5

    c5c6deafbf6b713ecaf0f35f54065a05

    SHA1

    b5e9753b56166f4df1748a8fb10017b6e78b4b23

    SHA256

    36db8bc25521b807bc16bfb7e164be5fbc41f1d3897b1e2d93be13f63281bbe1

    SHA512

    5658f6795936b5f464494549516ab3ede39810d91a845bcfbaa40c36e959ba3d81ad64d56fc07531343e29341db26f3025f460b5bbbe009680c52ce91ed08f0d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7824182.exe

    Filesize

    585KB

    MD5

    c5c6deafbf6b713ecaf0f35f54065a05

    SHA1

    b5e9753b56166f4df1748a8fb10017b6e78b4b23

    SHA256

    36db8bc25521b807bc16bfb7e164be5fbc41f1d3897b1e2d93be13f63281bbe1

    SHA512

    5658f6795936b5f464494549516ab3ede39810d91a845bcfbaa40c36e959ba3d81ad64d56fc07531343e29341db26f3025f460b5bbbe009680c52ce91ed08f0d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p5431667.exe

    Filesize

    177KB

    MD5

    7c80300fb4469e8b7daa4633293a4b4b

    SHA1

    c133852fbc2d9429862774100bb04232e75e2bcc

    SHA256

    d247a712b7a66703ceba204460ee5dba1f77447e6e41349e758b3fd587dc2ea4

    SHA512

    e9ff271924fa2f5aa0d297315edf50416eb7e535995a6b485d9ce32ac9d23b9efe8df3f6a70b833498df6d37c55a8bbab590d3abf14892b8d1bdf973bb1c53a7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p5431667.exe

    Filesize

    177KB

    MD5

    7c80300fb4469e8b7daa4633293a4b4b

    SHA1

    c133852fbc2d9429862774100bb04232e75e2bcc

    SHA256

    d247a712b7a66703ceba204460ee5dba1f77447e6e41349e758b3fd587dc2ea4

    SHA512

    e9ff271924fa2f5aa0d297315edf50416eb7e535995a6b485d9ce32ac9d23b9efe8df3f6a70b833498df6d37c55a8bbab590d3abf14892b8d1bdf973bb1c53a7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6601846.exe

    Filesize

    381KB

    MD5

    891352430198603538b7fc9e7f9d191a

    SHA1

    5d3099f8333ca08e4730e4a9b876fc6409109f24

    SHA256

    cdcb22ab3655b7a13ff63b1d141188f8f90908aa65d3ddaa047546790afd17e9

    SHA512

    b763f28939872f51a5fec65d4740a36ca35af8666ac6b0bf2462a0e369c5f5e2edb44679effa8c3c81fb688306d8a609297eda09b1299add9f61fdc5e44ba6a2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6601846.exe

    Filesize

    381KB

    MD5

    891352430198603538b7fc9e7f9d191a

    SHA1

    5d3099f8333ca08e4730e4a9b876fc6409109f24

    SHA256

    cdcb22ab3655b7a13ff63b1d141188f8f90908aa65d3ddaa047546790afd17e9

    SHA512

    b763f28939872f51a5fec65d4740a36ca35af8666ac6b0bf2462a0e369c5f5e2edb44679effa8c3c81fb688306d8a609297eda09b1299add9f61fdc5e44ba6a2

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n2986661.exe

    Filesize

    283KB

    MD5

    6dbf6bc76667a9ad6a6cdaa5511957d0

    SHA1

    b0c7413c6f0c0e1aae54932d2325c93e3c2db3a3

    SHA256

    2b112bf196068235e315c16bf138a04202ad84b027486f846a5ec3aa6f5222e0

    SHA512

    de21b43a7ab999ae08a42edfd46be7d7a4008e6b96b4344d7f95dccd86dfb05ae27ef49860df66e7afdcc7ac958a426d0c8ef415eca8a92e191948802ce7e0c8

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n2986661.exe

    Filesize

    283KB

    MD5

    6dbf6bc76667a9ad6a6cdaa5511957d0

    SHA1

    b0c7413c6f0c0e1aae54932d2325c93e3c2db3a3

    SHA256

    2b112bf196068235e315c16bf138a04202ad84b027486f846a5ec3aa6f5222e0

    SHA512

    de21b43a7ab999ae08a42edfd46be7d7a4008e6b96b4344d7f95dccd86dfb05ae27ef49860df66e7afdcc7ac958a426d0c8ef415eca8a92e191948802ce7e0c8

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o3489889.exe

    Filesize

    169KB

    MD5

    65ac86d383b10599ad5d414fdcd6e738

    SHA1

    72bcfe9973e3bb81637a68d9705f58c71f857d0e

    SHA256

    46f2dbd6678828a9e3cf7ffc98db46dd97f66e685cfd24485c3b0e2b6b3657b6

    SHA512

    4a098140f5f077aef474bc9722a2c186edd1856cb1b969a49f3d5d74ee3483a25488297f34d8477fb5fdc87ef375cd7e065670abfc83c4fa71e9ddd8333fd6f0

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o3489889.exe

    Filesize

    169KB

    MD5

    65ac86d383b10599ad5d414fdcd6e738

    SHA1

    72bcfe9973e3bb81637a68d9705f58c71f857d0e

    SHA256

    46f2dbd6678828a9e3cf7ffc98db46dd97f66e685cfd24485c3b0e2b6b3657b6

    SHA512

    4a098140f5f077aef474bc9722a2c186edd1856cb1b969a49f3d5d74ee3483a25488297f34d8477fb5fdc87ef375cd7e065670abfc83c4fa71e9ddd8333fd6f0

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

    Filesize

    162B

    MD5

    1b7c22a214949975556626d7217e9a39

    SHA1

    d01c97e2944166ed23e47e4a62ff471ab8fa031f

    SHA256

    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

    SHA512

    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    7070d754b720fe5162742116d8683a49

    SHA1

    e1e928cacf55633f30125dcf2e7aa6a0e6f4172e

    SHA256

    5eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2

    SHA512

    cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    7070d754b720fe5162742116d8683a49

    SHA1

    e1e928cacf55633f30125dcf2e7aa6a0e6f4172e

    SHA256

    5eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2

    SHA512

    cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b

  • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • memory/980-255-0x0000000005330000-0x0000000005391000-memory.dmp

    Filesize

    388KB

  • memory/980-253-0x0000000005330000-0x0000000005391000-memory.dmp

    Filesize

    388KB

  • memory/980-251-0x0000000005330000-0x0000000005391000-memory.dmp

    Filesize

    388KB

  • memory/980-250-0x0000000005330000-0x0000000005391000-memory.dmp

    Filesize

    388KB

  • memory/980-249-0x0000000005330000-0x0000000005396000-memory.dmp

    Filesize

    408KB

  • memory/980-248-0x0000000004C60000-0x0000000004CC8000-memory.dmp

    Filesize

    416KB

  • memory/980-337-0x0000000000700000-0x000000000075C000-memory.dmp

    Filesize

    368KB

  • memory/980-341-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

    Filesize

    64KB

  • memory/980-342-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

    Filesize

    64KB

  • memory/980-338-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

    Filesize

    64KB

  • memory/980-2424-0x0000000005510000-0x0000000005542000-memory.dmp

    Filesize

    200KB

  • memory/3128-168-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/3128-158-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/3128-150-0x0000000000A10000-0x0000000000A2A000-memory.dmp

    Filesize

    104KB

  • memory/3128-151-0x0000000004D70000-0x000000000526E000-memory.dmp

    Filesize

    5.0MB

  • memory/3128-152-0x0000000004BF0000-0x0000000004C08000-memory.dmp

    Filesize

    96KB

  • memory/3128-153-0x00000000006D0000-0x00000000006FD000-memory.dmp

    Filesize

    180KB

  • memory/3128-154-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/3128-155-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/3128-156-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/3128-157-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/3128-160-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/3128-162-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/3128-164-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/3128-166-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/3128-170-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/3128-172-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/3128-174-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/3128-176-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/3128-190-0x0000000000400000-0x00000000006C7000-memory.dmp

    Filesize

    2.8MB

  • memory/3128-188-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/3128-187-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/3128-186-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/3128-185-0x0000000000400000-0x00000000006C7000-memory.dmp

    Filesize

    2.8MB

  • memory/3128-184-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/3128-182-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/3128-180-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/3128-178-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/3712-2437-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/3712-2438-0x000000000A3E0000-0x000000000A42B000-memory.dmp

    Filesize

    300KB

  • memory/3712-2436-0x0000000002610000-0x0000000002616000-memory.dmp

    Filesize

    24KB

  • memory/3712-2432-0x00000000004D0000-0x00000000004FE000-memory.dmp

    Filesize

    184KB

  • memory/4828-195-0x0000000000A00000-0x0000000000A06000-memory.dmp

    Filesize

    24KB

  • memory/4828-204-0x0000000005110000-0x0000000005176000-memory.dmp

    Filesize

    408KB

  • memory/4828-207-0x0000000006140000-0x0000000006190000-memory.dmp

    Filesize

    320KB

  • memory/4828-196-0x00000000053A0000-0x00000000059A6000-memory.dmp

    Filesize

    6.0MB

  • memory/4828-197-0x0000000004EA0000-0x0000000004FAA000-memory.dmp

    Filesize

    1.0MB

  • memory/4828-206-0x0000000008110000-0x000000000863C000-memory.dmp

    Filesize

    5.2MB

  • memory/4828-198-0x0000000004D10000-0x0000000004D22000-memory.dmp

    Filesize

    72KB

  • memory/4828-199-0x0000000004D90000-0x0000000004DCE000-memory.dmp

    Filesize

    248KB

  • memory/4828-194-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4828-205-0x0000000006190000-0x0000000006352000-memory.dmp

    Filesize

    1.8MB

  • memory/4828-203-0x00000000051B0000-0x0000000005242000-memory.dmp

    Filesize

    584KB

  • memory/4828-202-0x0000000005090000-0x0000000005106000-memory.dmp

    Filesize

    472KB

  • memory/4828-201-0x0000000004D80000-0x0000000004D90000-memory.dmp

    Filesize

    64KB

  • memory/4828-200-0x0000000004D30000-0x0000000004D7B000-memory.dmp

    Filesize

    300KB

  • memory/4992-241-0x0000000004970000-0x0000000004980000-memory.dmp

    Filesize

    64KB

  • memory/4992-240-0x0000000004970000-0x0000000004980000-memory.dmp

    Filesize

    64KB

  • memory/4992-242-0x0000000004970000-0x0000000004980000-memory.dmp

    Filesize

    64KB