Analysis

  • max time kernel
    126s
  • max time network
    141s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/05/2023, 00:22

General

  • Target

    5fe1bc00d255691c7a2cd1a30f903538e3bce1cba7996d5b49bcf78dac1917ff.exe

  • Size

    780KB

  • MD5

    6095d4b452708690806be2f011737c1c

  • SHA1

    3589bed87052cd95f6a86ba2ff35b0e3ecec35a6

  • SHA256

    5fe1bc00d255691c7a2cd1a30f903538e3bce1cba7996d5b49bcf78dac1917ff

  • SHA512

    891a5ef32006dcde1d615e07553a57d7f464db947cc6d9216e7179464a501b1d8eb75f9cbf9d5d237c237b58a9f6427985227bd160523012b3d4c039e72810aa

  • SSDEEP

    24576:HydydOpTJBcIr2lFhYfTCBTUgjE2W27Io:SdydOpJHacTCBTtlU

Malware Config

Extracted

Family

redline

Botnet

lessa

C2

185.161.248.75:4132

Attributes
  • auth_value

    29d77029685f0783eb0ec17c1b173cb2

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5fe1bc00d255691c7a2cd1a30f903538e3bce1cba7996d5b49bcf78dac1917ff.exe
    "C:\Users\Admin\AppData\Local\Temp\5fe1bc00d255691c7a2cd1a30f903538e3bce1cba7996d5b49bcf78dac1917ff.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4244
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2455111.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2455111.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3492
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8675561.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8675561.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3868
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3583300.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3583300.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4856
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p7501588.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p7501588.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3880
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2453109.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2453109.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4548
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9460071.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9460071.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4944
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2752
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4056
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:1768
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:764
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:1192

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    232KB

    MD5

    10a7a29fcdc14baaa547cfd4fd4af696

    SHA1

    87c03e881d81bf3b8a24c3ba8f38e36f593d105e

    SHA256

    8f365058f9bbc6b94970e4e3d5e3e87b2cec54d8605cf1ba93bbaa6d356ba1e4

    SHA512

    29cd0bd941c424204c5de3f333e3884f0f95609fcd6857fcbd73658557a9ec60b160eb4e7eb8b5c373334f7b12f9e5711ad83704ae4b91be6639b2ec527c2bf8

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    232KB

    MD5

    10a7a29fcdc14baaa547cfd4fd4af696

    SHA1

    87c03e881d81bf3b8a24c3ba8f38e36f593d105e

    SHA256

    8f365058f9bbc6b94970e4e3d5e3e87b2cec54d8605cf1ba93bbaa6d356ba1e4

    SHA512

    29cd0bd941c424204c5de3f333e3884f0f95609fcd6857fcbd73658557a9ec60b160eb4e7eb8b5c373334f7b12f9e5711ad83704ae4b91be6639b2ec527c2bf8

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    232KB

    MD5

    10a7a29fcdc14baaa547cfd4fd4af696

    SHA1

    87c03e881d81bf3b8a24c3ba8f38e36f593d105e

    SHA256

    8f365058f9bbc6b94970e4e3d5e3e87b2cec54d8605cf1ba93bbaa6d356ba1e4

    SHA512

    29cd0bd941c424204c5de3f333e3884f0f95609fcd6857fcbd73658557a9ec60b160eb4e7eb8b5c373334f7b12f9e5711ad83704ae4b91be6639b2ec527c2bf8

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    232KB

    MD5

    10a7a29fcdc14baaa547cfd4fd4af696

    SHA1

    87c03e881d81bf3b8a24c3ba8f38e36f593d105e

    SHA256

    8f365058f9bbc6b94970e4e3d5e3e87b2cec54d8605cf1ba93bbaa6d356ba1e4

    SHA512

    29cd0bd941c424204c5de3f333e3884f0f95609fcd6857fcbd73658557a9ec60b160eb4e7eb8b5c373334f7b12f9e5711ad83704ae4b91be6639b2ec527c2bf8

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    232KB

    MD5

    10a7a29fcdc14baaa547cfd4fd4af696

    SHA1

    87c03e881d81bf3b8a24c3ba8f38e36f593d105e

    SHA256

    8f365058f9bbc6b94970e4e3d5e3e87b2cec54d8605cf1ba93bbaa6d356ba1e4

    SHA512

    29cd0bd941c424204c5de3f333e3884f0f95609fcd6857fcbd73658557a9ec60b160eb4e7eb8b5c373334f7b12f9e5711ad83704ae4b91be6639b2ec527c2bf8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9460071.exe

    Filesize

    232KB

    MD5

    10a7a29fcdc14baaa547cfd4fd4af696

    SHA1

    87c03e881d81bf3b8a24c3ba8f38e36f593d105e

    SHA256

    8f365058f9bbc6b94970e4e3d5e3e87b2cec54d8605cf1ba93bbaa6d356ba1e4

    SHA512

    29cd0bd941c424204c5de3f333e3884f0f95609fcd6857fcbd73658557a9ec60b160eb4e7eb8b5c373334f7b12f9e5711ad83704ae4b91be6639b2ec527c2bf8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9460071.exe

    Filesize

    232KB

    MD5

    10a7a29fcdc14baaa547cfd4fd4af696

    SHA1

    87c03e881d81bf3b8a24c3ba8f38e36f593d105e

    SHA256

    8f365058f9bbc6b94970e4e3d5e3e87b2cec54d8605cf1ba93bbaa6d356ba1e4

    SHA512

    29cd0bd941c424204c5de3f333e3884f0f95609fcd6857fcbd73658557a9ec60b160eb4e7eb8b5c373334f7b12f9e5711ad83704ae4b91be6639b2ec527c2bf8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2455111.exe

    Filesize

    597KB

    MD5

    e34c07c5bed8bd882057d01b31e90538

    SHA1

    32cd10f8d41d6c9caa7d968fb42946be714c065c

    SHA256

    09b15402dc6b457912c53caa37ef1e63335e1d578e59c4c7c1ec41a270610e42

    SHA512

    6e57d8a83bfce2aa4b01f6fef6b6f541b7b4b89d3572bf8604dab3e1dc4497b51ed342df4cda1bd49fd81342f4ffe0cfad06600fcd6d7e9ee7c77193ba6d081e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2455111.exe

    Filesize

    597KB

    MD5

    e34c07c5bed8bd882057d01b31e90538

    SHA1

    32cd10f8d41d6c9caa7d968fb42946be714c065c

    SHA256

    09b15402dc6b457912c53caa37ef1e63335e1d578e59c4c7c1ec41a270610e42

    SHA512

    6e57d8a83bfce2aa4b01f6fef6b6f541b7b4b89d3572bf8604dab3e1dc4497b51ed342df4cda1bd49fd81342f4ffe0cfad06600fcd6d7e9ee7c77193ba6d081e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2453109.exe

    Filesize

    286KB

    MD5

    f44cbe20478245d86a4a9e23c14e89e5

    SHA1

    c58837b039ce6701e21fa24cc19ded303fbbcd5f

    SHA256

    390de8e58489858130953f052105a9656e250e594def4c32672fcf97ad91f520

    SHA512

    06312de20e5ceaae6ce6be0c8c289fafcf97ffe30360c45329d1b050027ea5d891d3e4031d76addfc229f1115a6739a434d1326ccc506eb553638f04f8939e70

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2453109.exe

    Filesize

    286KB

    MD5

    f44cbe20478245d86a4a9e23c14e89e5

    SHA1

    c58837b039ce6701e21fa24cc19ded303fbbcd5f

    SHA256

    390de8e58489858130953f052105a9656e250e594def4c32672fcf97ad91f520

    SHA512

    06312de20e5ceaae6ce6be0c8c289fafcf97ffe30360c45329d1b050027ea5d891d3e4031d76addfc229f1115a6739a434d1326ccc506eb553638f04f8939e70

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8675561.exe

    Filesize

    316KB

    MD5

    2f0a7dc27949a79e815c0c0f808c22e0

    SHA1

    ddc94269097842bafec454d28bce76bbb2334996

    SHA256

    65e2d624cc214e9043f970b88ca5a6ba591a39f921a79105ea498377e8e116e9

    SHA512

    9292861fe211f6c66a09c0336f91bd60160bf5ceecf38bfd83d2f25e6d1313dd94211a6c465e9f25eec3019de828c8a73bb5494a7511fdfcbaeaf8648629d7bf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8675561.exe

    Filesize

    316KB

    MD5

    2f0a7dc27949a79e815c0c0f808c22e0

    SHA1

    ddc94269097842bafec454d28bce76bbb2334996

    SHA256

    65e2d624cc214e9043f970b88ca5a6ba591a39f921a79105ea498377e8e116e9

    SHA512

    9292861fe211f6c66a09c0336f91bd60160bf5ceecf38bfd83d2f25e6d1313dd94211a6c465e9f25eec3019de828c8a73bb5494a7511fdfcbaeaf8648629d7bf

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3583300.exe

    Filesize

    184KB

    MD5

    d4c640fb500618ad6c9fc5fe7d3e784d

    SHA1

    850df0880e1685ce709b44afbbb365cab4f0fec4

    SHA256

    a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b

    SHA512

    a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3583300.exe

    Filesize

    184KB

    MD5

    d4c640fb500618ad6c9fc5fe7d3e784d

    SHA1

    850df0880e1685ce709b44afbbb365cab4f0fec4

    SHA256

    a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b

    SHA512

    a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p7501588.exe

    Filesize

    168KB

    MD5

    b378c0d879409dcf1ea538abc52fef45

    SHA1

    77655094a8f2cdde87dc37fe68c33e74bd2567d4

    SHA256

    cf832230b13a6e86676289213b65f7a7625d30a415eafb3eee529070df775047

    SHA512

    3a21f874c7238c0b3a86c28020ca62d575dd4090426bf66f6097ce7c25a1d7d1e584c72907712fc464460c2070653e1175f523a9924dc1dfd7210e241facfe8d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p7501588.exe

    Filesize

    168KB

    MD5

    b378c0d879409dcf1ea538abc52fef45

    SHA1

    77655094a8f2cdde87dc37fe68c33e74bd2567d4

    SHA256

    cf832230b13a6e86676289213b65f7a7625d30a415eafb3eee529070df775047

    SHA512

    3a21f874c7238c0b3a86c28020ca62d575dd4090426bf66f6097ce7c25a1d7d1e584c72907712fc464460c2070653e1175f523a9924dc1dfd7210e241facfe8d

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

    Filesize

    162B

    MD5

    1b7c22a214949975556626d7217e9a39

    SHA1

    d01c97e2944166ed23e47e4a62ff471ab8fa031f

    SHA256

    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

    SHA512

    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

  • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • memory/3880-186-0x00000000055C0000-0x0000000005652000-memory.dmp

    Filesize

    584KB

  • memory/3880-177-0x0000000000860000-0x000000000088E000-memory.dmp

    Filesize

    184KB

  • memory/3880-188-0x0000000006450000-0x00000000064A0000-memory.dmp

    Filesize

    320KB

  • memory/3880-187-0x0000000005660000-0x00000000056C6000-memory.dmp

    Filesize

    408KB

  • memory/3880-190-0x0000000006670000-0x0000000006832000-memory.dmp

    Filesize

    1.8MB

  • memory/3880-191-0x00000000086A0000-0x0000000008BCC000-memory.dmp

    Filesize

    5.2MB

  • memory/3880-185-0x0000000005540000-0x00000000055B6000-memory.dmp

    Filesize

    472KB

  • memory/3880-189-0x0000000005310000-0x0000000005320000-memory.dmp

    Filesize

    64KB

  • memory/3880-178-0x0000000001060000-0x0000000001066000-memory.dmp

    Filesize

    24KB

  • memory/3880-179-0x0000000005930000-0x0000000005F36000-memory.dmp

    Filesize

    6.0MB

  • memory/3880-180-0x0000000005430000-0x000000000553A000-memory.dmp

    Filesize

    1.0MB

  • memory/3880-181-0x0000000002C20000-0x0000000002C32000-memory.dmp

    Filesize

    72KB

  • memory/3880-182-0x0000000002C40000-0x0000000002C7E000-memory.dmp

    Filesize

    248KB

  • memory/3880-183-0x0000000002C80000-0x0000000002CCB000-memory.dmp

    Filesize

    300KB

  • memory/3880-184-0x0000000005310000-0x0000000005320000-memory.dmp

    Filesize

    64KB

  • memory/4548-226-0x0000000004ED0000-0x0000000004F12000-memory.dmp

    Filesize

    264KB

  • memory/4548-220-0x0000000004ED0000-0x0000000004F12000-memory.dmp

    Filesize

    264KB

  • memory/4548-1227-0x00000000048C0000-0x00000000048D0000-memory.dmp

    Filesize

    64KB

  • memory/4548-1226-0x00000000048C0000-0x00000000048D0000-memory.dmp

    Filesize

    64KB

  • memory/4548-1225-0x000000000B250000-0x000000000B29B000-memory.dmp

    Filesize

    300KB

  • memory/4548-1224-0x00000000048C0000-0x00000000048D0000-memory.dmp

    Filesize

    64KB

  • memory/4548-1223-0x00000000048A0000-0x00000000048A6000-memory.dmp

    Filesize

    24KB

  • memory/4548-236-0x0000000004ED0000-0x0000000004F12000-memory.dmp

    Filesize

    264KB

  • memory/4548-234-0x0000000004ED0000-0x0000000004F12000-memory.dmp

    Filesize

    264KB

  • memory/4548-196-0x00000000047F0000-0x000000000483A000-memory.dmp

    Filesize

    296KB

  • memory/4548-197-0x00000000048C0000-0x00000000048D0000-memory.dmp

    Filesize

    64KB

  • memory/4548-198-0x0000000004ED0000-0x0000000004F16000-memory.dmp

    Filesize

    280KB

  • memory/4548-199-0x00000000048C0000-0x00000000048D0000-memory.dmp

    Filesize

    64KB

  • memory/4548-200-0x00000000048C0000-0x00000000048D0000-memory.dmp

    Filesize

    64KB

  • memory/4548-201-0x0000000004ED0000-0x0000000004F12000-memory.dmp

    Filesize

    264KB

  • memory/4548-202-0x0000000004ED0000-0x0000000004F12000-memory.dmp

    Filesize

    264KB

  • memory/4548-204-0x0000000004ED0000-0x0000000004F12000-memory.dmp

    Filesize

    264KB

  • memory/4548-206-0x0000000004ED0000-0x0000000004F12000-memory.dmp

    Filesize

    264KB

  • memory/4548-208-0x0000000004ED0000-0x0000000004F12000-memory.dmp

    Filesize

    264KB

  • memory/4548-210-0x0000000004ED0000-0x0000000004F12000-memory.dmp

    Filesize

    264KB

  • memory/4548-212-0x0000000004ED0000-0x0000000004F12000-memory.dmp

    Filesize

    264KB

  • memory/4548-214-0x0000000004ED0000-0x0000000004F12000-memory.dmp

    Filesize

    264KB

  • memory/4548-216-0x0000000004ED0000-0x0000000004F12000-memory.dmp

    Filesize

    264KB

  • memory/4548-218-0x0000000004ED0000-0x0000000004F12000-memory.dmp

    Filesize

    264KB

  • memory/4548-222-0x0000000004ED0000-0x0000000004F12000-memory.dmp

    Filesize

    264KB

  • memory/4548-232-0x0000000004ED0000-0x0000000004F12000-memory.dmp

    Filesize

    264KB

  • memory/4548-224-0x0000000004ED0000-0x0000000004F12000-memory.dmp

    Filesize

    264KB

  • memory/4548-230-0x0000000004ED0000-0x0000000004F12000-memory.dmp

    Filesize

    264KB

  • memory/4548-228-0x0000000004ED0000-0x0000000004F12000-memory.dmp

    Filesize

    264KB

  • memory/4856-154-0x00000000048F0000-0x0000000004906000-memory.dmp

    Filesize

    88KB

  • memory/4856-172-0x0000000004920000-0x0000000004930000-memory.dmp

    Filesize

    64KB

  • memory/4856-160-0x00000000048F0000-0x0000000004906000-memory.dmp

    Filesize

    88KB

  • memory/4856-162-0x00000000048F0000-0x0000000004906000-memory.dmp

    Filesize

    88KB

  • memory/4856-166-0x00000000048F0000-0x0000000004906000-memory.dmp

    Filesize

    88KB

  • memory/4856-164-0x00000000048F0000-0x0000000004906000-memory.dmp

    Filesize

    88KB

  • memory/4856-168-0x00000000048F0000-0x0000000004906000-memory.dmp

    Filesize

    88KB

  • memory/4856-170-0x00000000048F0000-0x0000000004906000-memory.dmp

    Filesize

    88KB

  • memory/4856-156-0x00000000048F0000-0x0000000004906000-memory.dmp

    Filesize

    88KB

  • memory/4856-171-0x0000000004920000-0x0000000004930000-memory.dmp

    Filesize

    64KB

  • memory/4856-150-0x00000000048F0000-0x0000000004906000-memory.dmp

    Filesize

    88KB

  • memory/4856-152-0x00000000048F0000-0x0000000004906000-memory.dmp

    Filesize

    88KB

  • memory/4856-158-0x00000000048F0000-0x0000000004906000-memory.dmp

    Filesize

    88KB

  • memory/4856-148-0x00000000048F0000-0x0000000004906000-memory.dmp

    Filesize

    88KB

  • memory/4856-146-0x00000000048F0000-0x0000000004906000-memory.dmp

    Filesize

    88KB

  • memory/4856-144-0x00000000048F0000-0x0000000004906000-memory.dmp

    Filesize

    88KB

  • memory/4856-143-0x00000000048F0000-0x0000000004906000-memory.dmp

    Filesize

    88KB

  • memory/4856-142-0x00000000048F0000-0x000000000490C000-memory.dmp

    Filesize

    112KB

  • memory/4856-141-0x0000000004930000-0x0000000004E2E000-memory.dmp

    Filesize

    5.0MB

  • memory/4856-140-0x00000000021F0000-0x000000000220E000-memory.dmp

    Filesize

    120KB