Analysis

  • max time kernel
    141s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04/05/2023, 13:15

General

  • Target

    1dfa9906b4ab76096f655193e525168c8ddbd6c4ce6f78396412383d6cd9ec8e.exe

  • Size

    1.3MB

  • MD5

    aff560d92af8f9b419c3b0995baae0e2

  • SHA1

    2df5a7132ddaff87087d40cc05b51c9bdc055973

  • SHA256

    1dfa9906b4ab76096f655193e525168c8ddbd6c4ce6f78396412383d6cd9ec8e

  • SHA512

    d64fb0999e95d909967367f23742b0cfa08e51a02e58ee539201460f8cd580b11f786b7de506c3d63d17d8477631f317cc180510b0a68feee22f63606259d659

  • SSDEEP

    24576:2yP3bl0fs5IAerndSUWOWvZS4JWi6uyl8wBRhb9HlsT28oyo0w:FhZKAeLuvZSUWz6CJB0

Malware Config

Extracted

Family

redline

Botnet

boom

C2

217.196.96.56:4138

Attributes
  • auth_value

    1ce6aebe15bac07a7bc88b114bc49335

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1dfa9906b4ab76096f655193e525168c8ddbd6c4ce6f78396412383d6cd9ec8e.exe
    "C:\Users\Admin\AppData\Local\Temp\1dfa9906b4ab76096f655193e525168c8ddbd6c4ce6f78396412383d6cd9ec8e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4456
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3887241.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3887241.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7778580.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7778580.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4724
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5656719.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5656719.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4744
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n9015096.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n9015096.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4588
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o2342056.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o2342056.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3584
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1570438.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1570438.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4360
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7761395.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7761395.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5008
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          PID:4164
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7023171.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7023171.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:5040
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4392
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4252
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:1924
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:4344
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:3348

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    d63b8a410ef0c66c4c89dc56271cd296

    SHA1

    673cea0af1de74b40a5793d4e9fb6a8a765a23a4

    SHA256

    8f8fc01ff9ba7d91ca5667e217b2841d3846f185da65b9d2c3fc8482717aae34

    SHA512

    a2013d902ea74ea2cddb6889d7f01eef572a6a505de2b89cfeb60bd061e6b0c4275cf26c33a11d14a76d7472d3267396c1baa2fe43c7aecdcbee5c2bf3bc03e0

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    d63b8a410ef0c66c4c89dc56271cd296

    SHA1

    673cea0af1de74b40a5793d4e9fb6a8a765a23a4

    SHA256

    8f8fc01ff9ba7d91ca5667e217b2841d3846f185da65b9d2c3fc8482717aae34

    SHA512

    a2013d902ea74ea2cddb6889d7f01eef572a6a505de2b89cfeb60bd061e6b0c4275cf26c33a11d14a76d7472d3267396c1baa2fe43c7aecdcbee5c2bf3bc03e0

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    d63b8a410ef0c66c4c89dc56271cd296

    SHA1

    673cea0af1de74b40a5793d4e9fb6a8a765a23a4

    SHA256

    8f8fc01ff9ba7d91ca5667e217b2841d3846f185da65b9d2c3fc8482717aae34

    SHA512

    a2013d902ea74ea2cddb6889d7f01eef572a6a505de2b89cfeb60bd061e6b0c4275cf26c33a11d14a76d7472d3267396c1baa2fe43c7aecdcbee5c2bf3bc03e0

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    d63b8a410ef0c66c4c89dc56271cd296

    SHA1

    673cea0af1de74b40a5793d4e9fb6a8a765a23a4

    SHA256

    8f8fc01ff9ba7d91ca5667e217b2841d3846f185da65b9d2c3fc8482717aae34

    SHA512

    a2013d902ea74ea2cddb6889d7f01eef572a6a505de2b89cfeb60bd061e6b0c4275cf26c33a11d14a76d7472d3267396c1baa2fe43c7aecdcbee5c2bf3bc03e0

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    d63b8a410ef0c66c4c89dc56271cd296

    SHA1

    673cea0af1de74b40a5793d4e9fb6a8a765a23a4

    SHA256

    8f8fc01ff9ba7d91ca5667e217b2841d3846f185da65b9d2c3fc8482717aae34

    SHA512

    a2013d902ea74ea2cddb6889d7f01eef572a6a505de2b89cfeb60bd061e6b0c4275cf26c33a11d14a76d7472d3267396c1baa2fe43c7aecdcbee5c2bf3bc03e0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7023171.exe

    Filesize

    229KB

    MD5

    d63b8a410ef0c66c4c89dc56271cd296

    SHA1

    673cea0af1de74b40a5793d4e9fb6a8a765a23a4

    SHA256

    8f8fc01ff9ba7d91ca5667e217b2841d3846f185da65b9d2c3fc8482717aae34

    SHA512

    a2013d902ea74ea2cddb6889d7f01eef572a6a505de2b89cfeb60bd061e6b0c4275cf26c33a11d14a76d7472d3267396c1baa2fe43c7aecdcbee5c2bf3bc03e0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7023171.exe

    Filesize

    229KB

    MD5

    d63b8a410ef0c66c4c89dc56271cd296

    SHA1

    673cea0af1de74b40a5793d4e9fb6a8a765a23a4

    SHA256

    8f8fc01ff9ba7d91ca5667e217b2841d3846f185da65b9d2c3fc8482717aae34

    SHA512

    a2013d902ea74ea2cddb6889d7f01eef572a6a505de2b89cfeb60bd061e6b0c4275cf26c33a11d14a76d7472d3267396c1baa2fe43c7aecdcbee5c2bf3bc03e0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3887241.exe

    Filesize

    1.1MB

    MD5

    2c9c6c214bb829b55e8ff16f80d6eadc

    SHA1

    62e760678762d9d6414f4eee068746fb7c5996fe

    SHA256

    3f45e40dcf607715d65a1ed74c8b1b40498a717ba50386bbcc79b0854c9916c5

    SHA512

    8348aa8a4ea9c266590beb8a43531a100f0465d813a6b3cdff798eba2841c2473b2491fe73ef72447f5f4bed07e9573415190ddaa1de0eee6f8d229ea06ea51d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3887241.exe

    Filesize

    1.1MB

    MD5

    2c9c6c214bb829b55e8ff16f80d6eadc

    SHA1

    62e760678762d9d6414f4eee068746fb7c5996fe

    SHA256

    3f45e40dcf607715d65a1ed74c8b1b40498a717ba50386bbcc79b0854c9916c5

    SHA512

    8348aa8a4ea9c266590beb8a43531a100f0465d813a6b3cdff798eba2841c2473b2491fe73ef72447f5f4bed07e9573415190ddaa1de0eee6f8d229ea06ea51d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7761395.exe

    Filesize

    548KB

    MD5

    cc5058959ba8fb67abf0490b939aca6f

    SHA1

    560a1e34df67f45feaf11f0428cbb57a5743b52b

    SHA256

    ca19a7b9a95dff87b65306cef61bec493f56012a277cedb6f52d0adbc98182db

    SHA512

    7f4fe8dc1506db4a6943655b0784cbbe082bc05370812dee6035c74e26adf21c37fd359be38945994bc484ddb5615d509c0b247dc262dd95585f80dce148f9d5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7761395.exe

    Filesize

    548KB

    MD5

    cc5058959ba8fb67abf0490b939aca6f

    SHA1

    560a1e34df67f45feaf11f0428cbb57a5743b52b

    SHA256

    ca19a7b9a95dff87b65306cef61bec493f56012a277cedb6f52d0adbc98182db

    SHA512

    7f4fe8dc1506db4a6943655b0784cbbe082bc05370812dee6035c74e26adf21c37fd359be38945994bc484ddb5615d509c0b247dc262dd95585f80dce148f9d5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7778580.exe

    Filesize

    621KB

    MD5

    4744fdb407f151a4310fb3e4b2aea928

    SHA1

    88869b518af8f6f4e9821b94c2bddd01907d1524

    SHA256

    09e695073c67e531a3136ecb88b984a7a4ffed462867c3c1e03c4c1105d498fd

    SHA512

    9223f7ea924328e588a9efa96171829b042d8aab55600402ddfbb309408d1e8199ffa5ed6dc89c4b2de7d2b36498b98e706b69288f644a1d555f6f9977cd3bc1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7778580.exe

    Filesize

    621KB

    MD5

    4744fdb407f151a4310fb3e4b2aea928

    SHA1

    88869b518af8f6f4e9821b94c2bddd01907d1524

    SHA256

    09e695073c67e531a3136ecb88b984a7a4ffed462867c3c1e03c4c1105d498fd

    SHA512

    9223f7ea924328e588a9efa96171829b042d8aab55600402ddfbb309408d1e8199ffa5ed6dc89c4b2de7d2b36498b98e706b69288f644a1d555f6f9977cd3bc1

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1570438.exe

    Filesize

    175KB

    MD5

    8265c0e83b804d8f7508c88d9defc69f

    SHA1

    e800f4ecf2bbda938b68174b9dc085e1aaacd1ac

    SHA256

    18985d2c443e1f4e774b856a8c55d496d936de641ea3b633dc78ebaf9ecbad1e

    SHA512

    0e087a8299cb1f1d256af56355f4b78d590de016aaf6aa7c0aeaefec999e388454f35382241f9de3805641c4eb2f18d40fcd345ddcfa17b7ffdb4dbc285cbf62

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1570438.exe

    Filesize

    175KB

    MD5

    8265c0e83b804d8f7508c88d9defc69f

    SHA1

    e800f4ecf2bbda938b68174b9dc085e1aaacd1ac

    SHA256

    18985d2c443e1f4e774b856a8c55d496d936de641ea3b633dc78ebaf9ecbad1e

    SHA512

    0e087a8299cb1f1d256af56355f4b78d590de016aaf6aa7c0aeaefec999e388454f35382241f9de3805641c4eb2f18d40fcd345ddcfa17b7ffdb4dbc285cbf62

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5656719.exe

    Filesize

    417KB

    MD5

    7b0363aa416688fc13200bfe7f17c9fa

    SHA1

    d44fb82ddab864995f26f96bf02b2acad297bbd4

    SHA256

    5ed544de347136cbbf83a3a251524f1ed3f9475c82d91214f77991dc434cdab6

    SHA512

    1caf55e749fabd68b5582ed88f43f9686bb11b98e2ca92cbbbdd0236b4ecd50a6516a3f3558cec213c564486c825bec0e0944e7fcede5260c93f147504696131

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5656719.exe

    Filesize

    417KB

    MD5

    7b0363aa416688fc13200bfe7f17c9fa

    SHA1

    d44fb82ddab864995f26f96bf02b2acad297bbd4

    SHA256

    5ed544de347136cbbf83a3a251524f1ed3f9475c82d91214f77991dc434cdab6

    SHA512

    1caf55e749fabd68b5582ed88f43f9686bb11b98e2ca92cbbbdd0236b4ecd50a6516a3f3558cec213c564486c825bec0e0944e7fcede5260c93f147504696131

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n9015096.exe

    Filesize

    360KB

    MD5

    91020f958cc8513a3832bc5dd7432223

    SHA1

    48f6ba3053da5c1b6496f10805883ab3b4a8f09d

    SHA256

    943b301549f7e394376ddb8fc61cdc9aa22f8e547a716857c0ac1428a5df6198

    SHA512

    3a950d15ad11d0479c8d355c96a5a1cb504fcfa787f8a44a0ff7cae240c7ce5b47ea7de685c0e5a1f672b150800275fdbc0d1495dcb96626cab78663c1125267

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n9015096.exe

    Filesize

    360KB

    MD5

    91020f958cc8513a3832bc5dd7432223

    SHA1

    48f6ba3053da5c1b6496f10805883ab3b4a8f09d

    SHA256

    943b301549f7e394376ddb8fc61cdc9aa22f8e547a716857c0ac1428a5df6198

    SHA512

    3a950d15ad11d0479c8d355c96a5a1cb504fcfa787f8a44a0ff7cae240c7ce5b47ea7de685c0e5a1f672b150800275fdbc0d1495dcb96626cab78663c1125267

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o2342056.exe

    Filesize

    136KB

    MD5

    2f111838c2fee05798176e52ee7775d6

    SHA1

    eaea25e2fa2508b6bdfe9a23ca9f0b72cd954eff

    SHA256

    97c2cb1dd04e5830ae99cdd4803538f20e83b08afa7520ecdd5d62c60ba47d51

    SHA512

    effed2a160b7f73dad4f925500fa0ff9989e56693db00b134700a2f91cb900576b0ccb1a0604d860ae9ddc5a58d7a7171478b03bc6a516870c05807d98cbb950

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o2342056.exe

    Filesize

    136KB

    MD5

    2f111838c2fee05798176e52ee7775d6

    SHA1

    eaea25e2fa2508b6bdfe9a23ca9f0b72cd954eff

    SHA256

    97c2cb1dd04e5830ae99cdd4803538f20e83b08afa7520ecdd5d62c60ba47d51

    SHA512

    effed2a160b7f73dad4f925500fa0ff9989e56693db00b134700a2f91cb900576b0ccb1a0604d860ae9ddc5a58d7a7171478b03bc6a516870c05807d98cbb950

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

    Filesize

    162B

    MD5

    1b7c22a214949975556626d7217e9a39

    SHA1

    d01c97e2944166ed23e47e4a62ff471ab8fa031f

    SHA256

    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

    SHA512

    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    7070d754b720fe5162742116d8683a49

    SHA1

    e1e928cacf55633f30125dcf2e7aa6a0e6f4172e

    SHA256

    5eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2

    SHA512

    cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    7070d754b720fe5162742116d8683a49

    SHA1

    e1e928cacf55633f30125dcf2e7aa6a0e6f4172e

    SHA256

    5eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2

    SHA512

    cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b

  • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • memory/3584-189-0x0000000000BC0000-0x0000000000BE8000-memory.dmp

    Filesize

    160KB

  • memory/3584-196-0x0000000007CA0000-0x0000000007D06000-memory.dmp

    Filesize

    408KB

  • memory/3584-201-0x0000000009070000-0x000000000908E000-memory.dmp

    Filesize

    120KB

  • memory/3584-200-0x0000000009920000-0x0000000009E4C000-memory.dmp

    Filesize

    5.2MB

  • memory/3584-199-0x0000000009220000-0x00000000093E2000-memory.dmp

    Filesize

    1.8MB

  • memory/3584-198-0x00000000088D0000-0x0000000008946000-memory.dmp

    Filesize

    472KB

  • memory/3584-197-0x0000000008830000-0x00000000088C2000-memory.dmp

    Filesize

    584KB

  • memory/3584-195-0x0000000007C90000-0x0000000007CA0000-memory.dmp

    Filesize

    64KB

  • memory/3584-194-0x0000000007940000-0x000000000798B000-memory.dmp

    Filesize

    300KB

  • memory/3584-202-0x00000000090B0000-0x0000000009100000-memory.dmp

    Filesize

    320KB

  • memory/3584-190-0x0000000007E40000-0x0000000008446000-memory.dmp

    Filesize

    6.0MB

  • memory/3584-191-0x00000000078A0000-0x00000000078B2000-memory.dmp

    Filesize

    72KB

  • memory/3584-192-0x00000000079D0000-0x0000000007ADA000-memory.dmp

    Filesize

    1.0MB

  • memory/3584-193-0x0000000007900000-0x000000000793E000-memory.dmp

    Filesize

    248KB

  • memory/4164-2442-0x00000000051B0000-0x00000000051C0000-memory.dmp

    Filesize

    64KB

  • memory/4164-2433-0x000000000A8A0000-0x000000000A8EB000-memory.dmp

    Filesize

    300KB

  • memory/4164-2427-0x0000000000990000-0x00000000009BE000-memory.dmp

    Filesize

    184KB

  • memory/4164-2432-0x00000000051B0000-0x00000000051C0000-memory.dmp

    Filesize

    64KB

  • memory/4164-2431-0x0000000002A80000-0x0000000002A86000-memory.dmp

    Filesize

    24KB

  • memory/4360-235-0x0000000004960000-0x0000000004970000-memory.dmp

    Filesize

    64KB

  • memory/4360-236-0x0000000004960000-0x0000000004970000-memory.dmp

    Filesize

    64KB

  • memory/4360-237-0x0000000004960000-0x0000000004970000-memory.dmp

    Filesize

    64KB

  • memory/4588-164-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/4588-154-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/4588-183-0x0000000000B80000-0x0000000000B90000-memory.dmp

    Filesize

    64KB

  • memory/4588-182-0x0000000000B80000-0x0000000000B90000-memory.dmp

    Filesize

    64KB

  • memory/4588-181-0x0000000000400000-0x00000000006F4000-memory.dmp

    Filesize

    3.0MB

  • memory/4588-180-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/4588-178-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/4588-176-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/4588-146-0x0000000000B60000-0x0000000000B7A000-memory.dmp

    Filesize

    104KB

  • memory/4588-147-0x0000000004CB0000-0x00000000051AE000-memory.dmp

    Filesize

    5.0MB

  • memory/4588-148-0x0000000002730000-0x0000000002748000-memory.dmp

    Filesize

    96KB

  • memory/4588-149-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4588-150-0x0000000000B80000-0x0000000000B90000-memory.dmp

    Filesize

    64KB

  • memory/4588-151-0x0000000000B80000-0x0000000000B90000-memory.dmp

    Filesize

    64KB

  • memory/4588-152-0x0000000000B80000-0x0000000000B90000-memory.dmp

    Filesize

    64KB

  • memory/4588-153-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/4588-185-0x0000000000400000-0x00000000006F4000-memory.dmp

    Filesize

    3.0MB

  • memory/4588-156-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/4588-158-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/4588-174-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/4588-172-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/4588-170-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/4588-168-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/4588-166-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/4588-162-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/4588-160-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/5008-2419-0x0000000005530000-0x0000000005562000-memory.dmp

    Filesize

    200KB

  • memory/5008-442-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/5008-439-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/5008-438-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/5008-436-0x0000000000950000-0x00000000009AC000-memory.dmp

    Filesize

    368KB

  • memory/5008-250-0x0000000005310000-0x0000000005371000-memory.dmp

    Filesize

    388KB

  • memory/5008-248-0x0000000005310000-0x0000000005371000-memory.dmp

    Filesize

    388KB

  • memory/5008-246-0x0000000005310000-0x0000000005371000-memory.dmp

    Filesize

    388KB

  • memory/5008-245-0x0000000005310000-0x0000000005371000-memory.dmp

    Filesize

    388KB

  • memory/5008-244-0x0000000005310000-0x0000000005376000-memory.dmp

    Filesize

    408KB

  • memory/5008-243-0x00000000026C0000-0x0000000002728000-memory.dmp

    Filesize

    416KB