Resubmissions

15-06-2023 16:32

230615-t135tsae65 10

12-04-2023 12:36

230412-ptcl3scc45 10

12-04-2023 12:33

230412-prmn9scc38 10

Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-06-2023 16:32

General

  • Target

    bf6c2427cdd1ae62e0b1e9a55ebaefca4e5e7554021343884817652808cf959f.exe

  • Size

    1.5MB

  • MD5

    b608a9ae94ba4680c0a4c3827d6ed5e9

  • SHA1

    09c5fc351b7df7ce3911082df265d63076a70d00

  • SHA256

    bf6c2427cdd1ae62e0b1e9a55ebaefca4e5e7554021343884817652808cf959f

  • SHA512

    e679db781c0bc11f88633d9c795701ca10cfffd0e1faba96ca7ea149ecde863b5fa30d7ee62b0c1685a524feedf2e93b00637417d14c6b3b4cbb0d440f17aa11

  • SSDEEP

    24576:4y22LmZQQXSE5VMsp0zYtKdTmRUQziSQluSOql7QexZBLVmkhAG:/2QmZQESE5/0WCTmRUNlzOqlDxJmr

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

amadey

Version

3.70

C2

193.201.9.43/plays/chapter/index.php

Extracted

Family

redline

Botnet

maxi

C2

185.161.248.90:4125

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf6c2427cdd1ae62e0b1e9a55ebaefca4e5e7554021343884817652808cf959f.exe
    "C:\Users\Admin\AppData\Local\Temp\bf6c2427cdd1ae62e0b1e9a55ebaefca4e5e7554021343884817652808cf959f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4700
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki196966.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki196966.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:916
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki513204.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki513204.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1884
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki256502.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki256502.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1236
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ki311926.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ki311926.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:840
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\az343450.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\az343450.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3344
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bu434133.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bu434133.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:5028
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 1040
                7⤵
                • Program crash
                PID:4708
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor5932.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor5932.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4300
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Executes dropped EXE
              PID:3180
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 1384
              6⤵
              • Program crash
              PID:1060
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\diM04s03.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\diM04s03.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1668
          • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3352
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:452
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ft970407.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ft970407.exe
        3⤵
        • Executes dropped EXE
        PID:4560
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5028 -ip 5028
    1⤵
      PID:4668
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4300 -ip 4300
      1⤵
        PID:3428
      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:1804
      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:5064

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe

        Filesize

        229KB

        MD5

        ee1f5f0e1168ce5938997c932b4dcd27

        SHA1

        b8c0928da3a41d579c19f44b9e1fef6014d06452

        SHA256

        dea01b17d6e06c3bdf6f5387faa77a788ce9726a3110db90294b2e207b3d51ed

        SHA512

        bacc2d22b71bc5bc73c0699aaf4e2271effa4fe47c3ac63f3ee3ae3385d963eb6f93db082a9530d75d5c6f13884f30b0375d41badfe540f31ef747003a36c0a8

      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe

        Filesize

        229KB

        MD5

        ee1f5f0e1168ce5938997c932b4dcd27

        SHA1

        b8c0928da3a41d579c19f44b9e1fef6014d06452

        SHA256

        dea01b17d6e06c3bdf6f5387faa77a788ce9726a3110db90294b2e207b3d51ed

        SHA512

        bacc2d22b71bc5bc73c0699aaf4e2271effa4fe47c3ac63f3ee3ae3385d963eb6f93db082a9530d75d5c6f13884f30b0375d41badfe540f31ef747003a36c0a8

      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe

        Filesize

        229KB

        MD5

        ee1f5f0e1168ce5938997c932b4dcd27

        SHA1

        b8c0928da3a41d579c19f44b9e1fef6014d06452

        SHA256

        dea01b17d6e06c3bdf6f5387faa77a788ce9726a3110db90294b2e207b3d51ed

        SHA512

        bacc2d22b71bc5bc73c0699aaf4e2271effa4fe47c3ac63f3ee3ae3385d963eb6f93db082a9530d75d5c6f13884f30b0375d41badfe540f31ef747003a36c0a8

      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe

        Filesize

        229KB

        MD5

        ee1f5f0e1168ce5938997c932b4dcd27

        SHA1

        b8c0928da3a41d579c19f44b9e1fef6014d06452

        SHA256

        dea01b17d6e06c3bdf6f5387faa77a788ce9726a3110db90294b2e207b3d51ed

        SHA512

        bacc2d22b71bc5bc73c0699aaf4e2271effa4fe47c3ac63f3ee3ae3385d963eb6f93db082a9530d75d5c6f13884f30b0375d41badfe540f31ef747003a36c0a8

      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe

        Filesize

        229KB

        MD5

        ee1f5f0e1168ce5938997c932b4dcd27

        SHA1

        b8c0928da3a41d579c19f44b9e1fef6014d06452

        SHA256

        dea01b17d6e06c3bdf6f5387faa77a788ce9726a3110db90294b2e207b3d51ed

        SHA512

        bacc2d22b71bc5bc73c0699aaf4e2271effa4fe47c3ac63f3ee3ae3385d963eb6f93db082a9530d75d5c6f13884f30b0375d41badfe540f31ef747003a36c0a8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki196966.exe

        Filesize

        1.2MB

        MD5

        9acda4a4462b3e1c7fcb98a274c3385e

        SHA1

        eae2a9a96e78394c0dcc78e9a7837f077fce891f

        SHA256

        6b18792b32c41bb006abfafb4f5053b7df58fc1c18ee833a0ca4f79290ba1cce

        SHA512

        f15b9120ec33a47140e72e6676d06c8580c1d4341e2266f5854d49271535d25589c19e60cb22fcc285e6acd0f5bd9f1ea6b9f14a69d05c4b0f0fb495e16500ec

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki196966.exe

        Filesize

        1.2MB

        MD5

        9acda4a4462b3e1c7fcb98a274c3385e

        SHA1

        eae2a9a96e78394c0dcc78e9a7837f077fce891f

        SHA256

        6b18792b32c41bb006abfafb4f5053b7df58fc1c18ee833a0ca4f79290ba1cce

        SHA512

        f15b9120ec33a47140e72e6676d06c8580c1d4341e2266f5854d49271535d25589c19e60cb22fcc285e6acd0f5bd9f1ea6b9f14a69d05c4b0f0fb495e16500ec

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ft970407.exe

        Filesize

        168KB

        MD5

        f3f0110dd728ebd7a2e20609f3b7ff33

        SHA1

        9e846ddfc4e53793c77a8b74395ed1c1c73da027

        SHA256

        f7dbb53256eb8a1896925f31a12ef486afea188abd1ff3b67ae7325e5e756751

        SHA512

        81da25c6e399a6f312473b567541a72cb9a7907dec4a572af2e3b44fe8ff37465a06652b8cf903e152518f518b16a5055c598f34dd96306aa1b620d0b0a0bc4f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ft970407.exe

        Filesize

        168KB

        MD5

        f3f0110dd728ebd7a2e20609f3b7ff33

        SHA1

        9e846ddfc4e53793c77a8b74395ed1c1c73da027

        SHA256

        f7dbb53256eb8a1896925f31a12ef486afea188abd1ff3b67ae7325e5e756751

        SHA512

        81da25c6e399a6f312473b567541a72cb9a7907dec4a572af2e3b44fe8ff37465a06652b8cf903e152518f518b16a5055c598f34dd96306aa1b620d0b0a0bc4f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki513204.exe

        Filesize

        1.0MB

        MD5

        f83e67a1214d0119d018cb71e1c4a269

        SHA1

        46b83301f2199dc78dbc99c0dc92b4c0a3f953b4

        SHA256

        da163cb6f3ad95e349f3a4f68fa094ffb0754a6146557f4738d5283d35b6fe46

        SHA512

        666c0daa23d2f4d9e9326d9a0d411818d3cf02de85ad0ae6397da90640550494c1a31d1f59b6ec2c63ba2156d0144a4683ee96632ab7dff536dca1892d9d2477

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki513204.exe

        Filesize

        1.0MB

        MD5

        f83e67a1214d0119d018cb71e1c4a269

        SHA1

        46b83301f2199dc78dbc99c0dc92b4c0a3f953b4

        SHA256

        da163cb6f3ad95e349f3a4f68fa094ffb0754a6146557f4738d5283d35b6fe46

        SHA512

        666c0daa23d2f4d9e9326d9a0d411818d3cf02de85ad0ae6397da90640550494c1a31d1f59b6ec2c63ba2156d0144a4683ee96632ab7dff536dca1892d9d2477

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\diM04s03.exe

        Filesize

        229KB

        MD5

        ee1f5f0e1168ce5938997c932b4dcd27

        SHA1

        b8c0928da3a41d579c19f44b9e1fef6014d06452

        SHA256

        dea01b17d6e06c3bdf6f5387faa77a788ce9726a3110db90294b2e207b3d51ed

        SHA512

        bacc2d22b71bc5bc73c0699aaf4e2271effa4fe47c3ac63f3ee3ae3385d963eb6f93db082a9530d75d5c6f13884f30b0375d41badfe540f31ef747003a36c0a8

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\diM04s03.exe

        Filesize

        229KB

        MD5

        ee1f5f0e1168ce5938997c932b4dcd27

        SHA1

        b8c0928da3a41d579c19f44b9e1fef6014d06452

        SHA256

        dea01b17d6e06c3bdf6f5387faa77a788ce9726a3110db90294b2e207b3d51ed

        SHA512

        bacc2d22b71bc5bc73c0699aaf4e2271effa4fe47c3ac63f3ee3ae3385d963eb6f93db082a9530d75d5c6f13884f30b0375d41badfe540f31ef747003a36c0a8

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki256502.exe

        Filesize

        883KB

        MD5

        935cf6e1809587efa5df511d3454e533

        SHA1

        be40b272c3f5446b0382fe82db2d2354fa18cc53

        SHA256

        d232461e534fe8a44b65ed81db280e21b1b560e17a1ea4487398edf9d929def5

        SHA512

        b9a168a5e50accec78a9741232bd4d5ee95a6924eff38d23a4c498e8867219c2ad2c1a90fcdaca763963de972778fe21112f439ed115829b61438c8d972fc021

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki256502.exe

        Filesize

        883KB

        MD5

        935cf6e1809587efa5df511d3454e533

        SHA1

        be40b272c3f5446b0382fe82db2d2354fa18cc53

        SHA256

        d232461e534fe8a44b65ed81db280e21b1b560e17a1ea4487398edf9d929def5

        SHA512

        b9a168a5e50accec78a9741232bd4d5ee95a6924eff38d23a4c498e8867219c2ad2c1a90fcdaca763963de972778fe21112f439ed115829b61438c8d972fc021

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor5932.exe

        Filesize

        586KB

        MD5

        c80825dbb0acd351dea385a8c9d801b5

        SHA1

        460dc74b8f632f3beda4af1bb82ab4351ab07b49

        SHA256

        64b9c0a353acab7be9a7dbd9ccdf139834a7a9d80c748e3d7e8980fd548824a5

        SHA512

        ab7858add3df43d1c38e7f0fea253e5a7ae080d9130a6e6a3a2bef98466d4c6ee194f6533511b7ca730681e9d4c554912fe57745ab025b5b7eac9094465fb245

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor5932.exe

        Filesize

        586KB

        MD5

        c80825dbb0acd351dea385a8c9d801b5

        SHA1

        460dc74b8f632f3beda4af1bb82ab4351ab07b49

        SHA256

        64b9c0a353acab7be9a7dbd9ccdf139834a7a9d80c748e3d7e8980fd548824a5

        SHA512

        ab7858add3df43d1c38e7f0fea253e5a7ae080d9130a6e6a3a2bef98466d4c6ee194f6533511b7ca730681e9d4c554912fe57745ab025b5b7eac9094465fb245

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ki311926.exe

        Filesize

        376KB

        MD5

        1199243febb5656d3a46e273e810d899

        SHA1

        a0c24de4268d1923ab188750b5d1aebe706811ae

        SHA256

        54e3398598b05d8127747db957cd76c2d0866754cc6a10e4aec9788262e8a26c

        SHA512

        ec7c8fab09ffb5f3c78c3d8eeae0566260b26fdbeee15ef5714c3d24f94cdbae74aa7b77cfb83de448b68bc2c75349255396c06cf83c59ba9395567f0a2399df

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ki311926.exe

        Filesize

        376KB

        MD5

        1199243febb5656d3a46e273e810d899

        SHA1

        a0c24de4268d1923ab188750b5d1aebe706811ae

        SHA256

        54e3398598b05d8127747db957cd76c2d0866754cc6a10e4aec9788262e8a26c

        SHA512

        ec7c8fab09ffb5f3c78c3d8eeae0566260b26fdbeee15ef5714c3d24f94cdbae74aa7b77cfb83de448b68bc2c75349255396c06cf83c59ba9395567f0a2399df

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\az343450.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\az343450.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bu434133.exe

        Filesize

        402KB

        MD5

        1df3262d920867d4a75c24e4ac9199e9

        SHA1

        361d344d0d20d2ac51c64a33769e57a364aa08ba

        SHA256

        868c6e9ce79d7c6e334da2ac4baea75ddb45bb1e8100a1df89633fa1a7c382de

        SHA512

        200c2e4516e82d2164716aceea4cb03401e3988e76901fc0c14d3b22d166ee6495ae86aa245580a860613b86bd461bc6b9dd94705743b5109492ee5ecedda3d8

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bu434133.exe

        Filesize

        402KB

        MD5

        1df3262d920867d4a75c24e4ac9199e9

        SHA1

        361d344d0d20d2ac51c64a33769e57a364aa08ba

        SHA256

        868c6e9ce79d7c6e334da2ac4baea75ddb45bb1e8100a1df89633fa1a7c382de

        SHA512

        200c2e4516e82d2164716aceea4cb03401e3988e76901fc0c14d3b22d166ee6495ae86aa245580a860613b86bd461bc6b9dd94705743b5109492ee5ecedda3d8

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        03728fed675bcde5256342183b1d6f27

        SHA1

        d13eace7d3d92f93756504b274777cc269b222a2

        SHA256

        f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

        SHA512

        6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        03728fed675bcde5256342183b1d6f27

        SHA1

        d13eace7d3d92f93756504b274777cc269b222a2

        SHA256

        f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

        SHA512

        6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        03728fed675bcde5256342183b1d6f27

        SHA1

        d13eace7d3d92f93756504b274777cc269b222a2

        SHA256

        f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

        SHA512

        6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

      • memory/3180-2380-0x00000000028D0000-0x000000000290C000-memory.dmp

        Filesize

        240KB

      • memory/3180-2376-0x00000000056F0000-0x0000000005D08000-memory.dmp

        Filesize

        6.1MB

      • memory/3180-2374-0x0000000000650000-0x000000000067E000-memory.dmp

        Filesize

        184KB

      • memory/3180-2377-0x00000000051E0000-0x00000000052EA000-memory.dmp

        Filesize

        1.0MB

      • memory/3180-2378-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3180-2384-0x00000000050C0000-0x00000000050D0000-memory.dmp

        Filesize

        64KB

      • memory/3180-2400-0x00000000050C0000-0x00000000050D0000-memory.dmp

        Filesize

        64KB

      • memory/3344-168-0x0000000000650000-0x000000000065A000-memory.dmp

        Filesize

        40KB

      • memory/4300-221-0x0000000002900000-0x0000000002960000-memory.dmp

        Filesize

        384KB

      • memory/4300-326-0x0000000002880000-0x0000000002890000-memory.dmp

        Filesize

        64KB

      • memory/4300-2375-0x0000000002880000-0x0000000002890000-memory.dmp

        Filesize

        64KB

      • memory/4300-324-0x0000000002880000-0x0000000002890000-memory.dmp

        Filesize

        64KB

      • memory/4300-321-0x0000000002880000-0x0000000002890000-memory.dmp

        Filesize

        64KB

      • memory/4300-216-0x0000000002900000-0x0000000002960000-memory.dmp

        Filesize

        384KB

      • memory/4300-217-0x0000000002900000-0x0000000002960000-memory.dmp

        Filesize

        384KB

      • memory/4300-219-0x0000000002900000-0x0000000002960000-memory.dmp

        Filesize

        384KB

      • memory/4300-320-0x0000000000990000-0x00000000009EB000-memory.dmp

        Filesize

        364KB

      • memory/4300-223-0x0000000002900000-0x0000000002960000-memory.dmp

        Filesize

        384KB

      • memory/4300-225-0x0000000002900000-0x0000000002960000-memory.dmp

        Filesize

        384KB

      • memory/4300-227-0x0000000002900000-0x0000000002960000-memory.dmp

        Filesize

        384KB

      • memory/4300-229-0x0000000002900000-0x0000000002960000-memory.dmp

        Filesize

        384KB

      • memory/4300-231-0x0000000002900000-0x0000000002960000-memory.dmp

        Filesize

        384KB

      • memory/4300-233-0x0000000002900000-0x0000000002960000-memory.dmp

        Filesize

        384KB

      • memory/4300-235-0x0000000002900000-0x0000000002960000-memory.dmp

        Filesize

        384KB

      • memory/4300-237-0x0000000002900000-0x0000000002960000-memory.dmp

        Filesize

        384KB

      • memory/4300-239-0x0000000002900000-0x0000000002960000-memory.dmp

        Filesize

        384KB

      • memory/4300-241-0x0000000002900000-0x0000000002960000-memory.dmp

        Filesize

        384KB

      • memory/4300-243-0x0000000002900000-0x0000000002960000-memory.dmp

        Filesize

        384KB

      • memory/4300-245-0x0000000002900000-0x0000000002960000-memory.dmp

        Filesize

        384KB

      • memory/4300-247-0x0000000002900000-0x0000000002960000-memory.dmp

        Filesize

        384KB

      • memory/4300-249-0x0000000002900000-0x0000000002960000-memory.dmp

        Filesize

        384KB

      • memory/4560-2398-0x0000000000050000-0x0000000000080000-memory.dmp

        Filesize

        192KB

      • memory/4560-2401-0x00000000049D0000-0x00000000049E0000-memory.dmp

        Filesize

        64KB

      • memory/4560-2399-0x00000000049D0000-0x00000000049E0000-memory.dmp

        Filesize

        64KB

      • memory/5028-190-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/5028-186-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/5028-202-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/5028-200-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/5028-198-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/5028-211-0x0000000000400000-0x0000000000809000-memory.dmp

        Filesize

        4.0MB

      • memory/5028-196-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/5028-194-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/5028-192-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/5028-206-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/5028-188-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/5028-204-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/5028-184-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/5028-182-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/5028-180-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/5028-179-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/5028-178-0x0000000005010000-0x0000000005020000-memory.dmp

        Filesize

        64KB

      • memory/5028-176-0x0000000005010000-0x0000000005020000-memory.dmp

        Filesize

        64KB

      • memory/5028-208-0x0000000005010000-0x0000000005020000-memory.dmp

        Filesize

        64KB

      • memory/5028-209-0x0000000005010000-0x0000000005020000-memory.dmp

        Filesize

        64KB

      • memory/5028-177-0x0000000005010000-0x0000000005020000-memory.dmp

        Filesize

        64KB

      • memory/5028-207-0x0000000000400000-0x0000000000809000-memory.dmp

        Filesize

        4.0MB

      • memory/5028-175-0x00000000008E0000-0x000000000090D000-memory.dmp

        Filesize

        180KB

      • memory/5028-174-0x0000000005020000-0x00000000055C4000-memory.dmp

        Filesize

        5.6MB