Analysis

  • max time kernel
    104s
  • max time network
    150s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13-11-2022 01:15

General

  • Target

    3a118296458148c7aae5f0f8d3bf211fc05cfdce7f910ccce8ca6c317f1c54a8.exe

  • Size

    231KB

  • MD5

    bf0e029e262ede1242d006e6b10f2913

  • SHA1

    38abd783fb5d5477aaf69395652fa154832b12b2

  • SHA256

    3a118296458148c7aae5f0f8d3bf211fc05cfdce7f910ccce8ca6c317f1c54a8

  • SHA512

    2d9acbbfdcc875362720121cf7889c7d8219d6d3f072c35f74558545c2ee62f95e0d1847f5a9962233ac7a04a9b0cb31a51d35353bb8d13ba97938fe47f34a1f

  • SSDEEP

    6144:p13LZFgvz3EfvaXq2JtWxovQWXf34zLA:pZ9ur3eaXq2MnWv3i

Malware Config

Extracted

Family

redline

Botnet

boy

C2

77.73.134.241:4691

Attributes
  • auth_value

    a91fa8cc2cfaefc42a23c03faef44bd3

Extracted

Family

redline

Botnet

@REDLINEVIP Cloud (TG: @FATHEROFCARDERS)

C2

151.80.89.233:13553

Attributes
  • auth_value

    fbee175162920530e6bf470c8003fa1a

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 4 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a118296458148c7aae5f0f8d3bf211fc05cfdce7f910ccce8ca6c317f1c54a8.exe
    "C:\Users\Admin\AppData\Local\Temp\3a118296458148c7aae5f0f8d3bf211fc05cfdce7f910ccce8ca6c317f1c54a8.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2628
    • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
      "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4620
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:4236
      • C:\Users\Admin\AppData\Roaming\1000006000\lego.exe
        "C:\Users\Admin\AppData\Roaming\1000006000\lego.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3340
        • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
          "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3332
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:2276
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3044
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:3892
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "rovwer.exe" /P "Admin:N"
                6⤵
                  PID:1044
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "rovwer.exe" /P "Admin:R" /E
                  6⤵
                    PID:680
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:220
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\99e342142d" /P "Admin:N"
                      6⤵
                        PID:3368
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\99e342142d" /P "Admin:R" /E
                        6⤵
                          PID:1112
                      • C:\Users\Admin\AppData\Local\Temp\1000032001\becr.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000032001\becr.exe"
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious use of WriteProcessMemory
                        PID:1508
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                          6⤵
                          • Suspicious use of SetWindowsHookEx
                          PID:4064
                      • C:\Users\Admin\AppData\Local\Temp\1000038001\blockchainlzt_crypted.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000038001\blockchainlzt_crypted.exe"
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious use of WriteProcessMemory
                        PID:4868
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                          6⤵
                            PID:1284
                        • C:\Users\Admin\AppData\Local\Temp\1000043001\20K.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000043001\20K.exe"
                          5⤵
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:792
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                          5⤵
                          • Blocklisted process makes network request
                          • Loads dropped DLL
                          • Accesses Microsoft Outlook profiles
                          • Suspicious behavior: EnumeratesProcesses
                          • outlook_win_path
                          PID:4200
                    • C:\Users\Admin\AppData\Local\Temp\1000007001\mana.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000007001\mana.exe"
                      3⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2464
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll, Main
                      3⤵
                      • Blocklisted process makes network request
                      • Loads dropped DLL
                      • Accesses Microsoft Outlook profiles
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3528
                • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                  C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                  1⤵
                  • Executes dropped EXE
                  PID:4944
                • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                  C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                  1⤵
                  • Executes dropped EXE
                  PID:4484

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Execution

                Scheduled Task

                1
                T1053

                Persistence

                Registry Run Keys / Startup Folder

                1
                T1060

                Scheduled Task

                1
                T1053

                Privilege Escalation

                Scheduled Task

                1
                T1053

                Defense Evasion

                Modify Registry

                1
                T1112

                Credential Access

                Credentials in Files

                3
                T1081

                Discovery

                Query Registry

                1
                T1012

                System Information Discovery

                1
                T1082

                Collection

                Data from Local System

                3
                T1005

                Email Collection

                1
                T1114

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\1000007001\mana.exe
                  Filesize

                  137KB

                  MD5

                  e63d74cec6926b2d04e474b889d08af4

                  SHA1

                  a64a888ccfb4e82ade71f1a00a7ae681d29c7bcb

                  SHA256

                  a9ffffff38aca59d7d2f041fbdb253ca612c7ba2d597782b2e6a59a914f49b33

                  SHA512

                  fd59c0a1c613611002e52a309ee4baad626df8fbbd8c0c230bcb8e6fed4a3059296ab11b88a1d25a0f54c65f730a027f876629298120f7b4c251bf6d2aaed148

                • C:\Users\Admin\AppData\Local\Temp\1000007001\mana.exe
                  Filesize

                  137KB

                  MD5

                  e63d74cec6926b2d04e474b889d08af4

                  SHA1

                  a64a888ccfb4e82ade71f1a00a7ae681d29c7bcb

                  SHA256

                  a9ffffff38aca59d7d2f041fbdb253ca612c7ba2d597782b2e6a59a914f49b33

                  SHA512

                  fd59c0a1c613611002e52a309ee4baad626df8fbbd8c0c230bcb8e6fed4a3059296ab11b88a1d25a0f54c65f730a027f876629298120f7b4c251bf6d2aaed148

                • C:\Users\Admin\AppData\Local\Temp\1000032001\becr.exe
                  Filesize

                  18.4MB

                  MD5

                  464502cbaae7b9ed1cd6da844d38ba86

                  SHA1

                  30dd42539cbfad04564f9db45ca40f2b9e81546c

                  SHA256

                  6c90b6acb49fff4969b5f5fabde4b4fea363e1902ac675ba02e7ad325804b7d4

                  SHA512

                  e74b45702eeaca95bc6c9f2aeea8a5958a425dc1f45ecfb127e286a39eb668243b41e56c705ae5fe7a72ff1ab691948adf29ddd6de18509421fa415647a36b59

                • C:\Users\Admin\AppData\Local\Temp\1000032001\becr.exe
                  Filesize

                  18.4MB

                  MD5

                  464502cbaae7b9ed1cd6da844d38ba86

                  SHA1

                  30dd42539cbfad04564f9db45ca40f2b9e81546c

                  SHA256

                  6c90b6acb49fff4969b5f5fabde4b4fea363e1902ac675ba02e7ad325804b7d4

                  SHA512

                  e74b45702eeaca95bc6c9f2aeea8a5958a425dc1f45ecfb127e286a39eb668243b41e56c705ae5fe7a72ff1ab691948adf29ddd6de18509421fa415647a36b59

                • C:\Users\Admin\AppData\Local\Temp\1000038001\blockchainlzt_crypted.exe
                  Filesize

                  2.7MB

                  MD5

                  e7f46144892fe5bdef99bdf819d1b9a6

                  SHA1

                  763ac1ea8c3de617457f64a8ce4eabe7ab8a3abb

                  SHA256

                  e252a54e441ea88aafa694259386afd002153481af25a5b7b2df46d17ac53fcc

                  SHA512

                  0165fe66620ef9c621b1f3b37e5ef69d636f4f6ec341011d9d6b45fdf9b634151937c139e928b8641183ff2f469844a1370a4ac0253d84ec81992cd9c67b963f

                • C:\Users\Admin\AppData\Local\Temp\1000038001\blockchainlzt_crypted.exe
                  Filesize

                  2.7MB

                  MD5

                  e7f46144892fe5bdef99bdf819d1b9a6

                  SHA1

                  763ac1ea8c3de617457f64a8ce4eabe7ab8a3abb

                  SHA256

                  e252a54e441ea88aafa694259386afd002153481af25a5b7b2df46d17ac53fcc

                  SHA512

                  0165fe66620ef9c621b1f3b37e5ef69d636f4f6ec341011d9d6b45fdf9b634151937c139e928b8641183ff2f469844a1370a4ac0253d84ec81992cd9c67b963f

                • C:\Users\Admin\AppData\Local\Temp\1000043001\20K.exe
                  Filesize

                  137KB

                  MD5

                  06cee591f384a048b3403819d9328e82

                  SHA1

                  4b8dd48bb52cf306a21a0ef3a3449c0963dbae4e

                  SHA256

                  f4d228b52dbea8f6c059c2debe6fea366833f27ae9dcd5b793248e830a0cb8c4

                  SHA512

                  38928ee89657576814597fb5a4bfe8380b04557921b2b5e5ad09afaa208d3080d897c47154ebc8fdf4a844b55b34f8c7d572ccc2a70e9abdf3861d0621764ae5

                • C:\Users\Admin\AppData\Local\Temp\1000043001\20K.exe
                  Filesize

                  137KB

                  MD5

                  06cee591f384a048b3403819d9328e82

                  SHA1

                  4b8dd48bb52cf306a21a0ef3a3449c0963dbae4e

                  SHA256

                  f4d228b52dbea8f6c059c2debe6fea366833f27ae9dcd5b793248e830a0cb8c4

                  SHA512

                  38928ee89657576814597fb5a4bfe8380b04557921b2b5e5ad09afaa208d3080d897c47154ebc8fdf4a844b55b34f8c7d572ccc2a70e9abdf3861d0621764ae5

                • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
                  Filesize

                  231KB

                  MD5

                  bf0e029e262ede1242d006e6b10f2913

                  SHA1

                  38abd783fb5d5477aaf69395652fa154832b12b2

                  SHA256

                  3a118296458148c7aae5f0f8d3bf211fc05cfdce7f910ccce8ca6c317f1c54a8

                  SHA512

                  2d9acbbfdcc875362720121cf7889c7d8219d6d3f072c35f74558545c2ee62f95e0d1847f5a9962233ac7a04a9b0cb31a51d35353bb8d13ba97938fe47f34a1f

                • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
                  Filesize

                  231KB

                  MD5

                  bf0e029e262ede1242d006e6b10f2913

                  SHA1

                  38abd783fb5d5477aaf69395652fa154832b12b2

                  SHA256

                  3a118296458148c7aae5f0f8d3bf211fc05cfdce7f910ccce8ca6c317f1c54a8

                  SHA512

                  2d9acbbfdcc875362720121cf7889c7d8219d6d3f072c35f74558545c2ee62f95e0d1847f5a9962233ac7a04a9b0cb31a51d35353bb8d13ba97938fe47f34a1f

                • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                  Filesize

                  241KB

                  MD5

                  b466f58861bb4069db99312de146a2e8

                  SHA1

                  295f06794b26ba5ac7c73fbf636c581624f897cd

                  SHA256

                  6cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420

                  SHA512

                  8693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d

                • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                  Filesize

                  241KB

                  MD5

                  b466f58861bb4069db99312de146a2e8

                  SHA1

                  295f06794b26ba5ac7c73fbf636c581624f897cd

                  SHA256

                  6cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420

                  SHA512

                  8693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d

                • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                  Filesize

                  241KB

                  MD5

                  b466f58861bb4069db99312de146a2e8

                  SHA1

                  295f06794b26ba5ac7c73fbf636c581624f897cd

                  SHA256

                  6cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420

                  SHA512

                  8693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d

                • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                  Filesize

                  241KB

                  MD5

                  b466f58861bb4069db99312de146a2e8

                  SHA1

                  295f06794b26ba5ac7c73fbf636c581624f897cd

                  SHA256

                  6cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420

                  SHA512

                  8693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d

                • C:\Users\Admin\AppData\Roaming\1000006000\lego.exe
                  Filesize

                  241KB

                  MD5

                  b466f58861bb4069db99312de146a2e8

                  SHA1

                  295f06794b26ba5ac7c73fbf636c581624f897cd

                  SHA256

                  6cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420

                  SHA512

                  8693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d

                • C:\Users\Admin\AppData\Roaming\1000006000\lego.exe
                  Filesize

                  241KB

                  MD5

                  b466f58861bb4069db99312de146a2e8

                  SHA1

                  295f06794b26ba5ac7c73fbf636c581624f897cd

                  SHA256

                  6cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420

                  SHA512

                  8693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d

                • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                  Filesize

                  126KB

                  MD5

                  507e9dc7b9c42f535b6df96d79179835

                  SHA1

                  acf41fb549750023115f060071aa5ca8c33f249e

                  SHA256

                  3b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af

                  SHA512

                  70907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302

                • C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll
                  Filesize

                  126KB

                  MD5

                  b8d80046e28849a320a3dcd868b73d7c

                  SHA1

                  f15bc4a4c5189e7aa845213469c6def5afd68186

                  SHA256

                  d23147a448d24f81d81d4bb226f3fc968386792c0987dda75917104b5ecd9d5a

                  SHA512

                  b7f6d59ee55d2b579c2185560d2e660c1952f9214f3db3096b1358af3559fd985859aa3389be333c826f35b85cd63c6f65a03e65a7ad57c7834bb09abd1d853e

                • \Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                  Filesize

                  126KB

                  MD5

                  507e9dc7b9c42f535b6df96d79179835

                  SHA1

                  acf41fb549750023115f060071aa5ca8c33f249e

                  SHA256

                  3b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af

                  SHA512

                  70907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302

                • \Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll
                  Filesize

                  126KB

                  MD5

                  b8d80046e28849a320a3dcd868b73d7c

                  SHA1

                  f15bc4a4c5189e7aa845213469c6def5afd68186

                  SHA256

                  d23147a448d24f81d81d4bb226f3fc968386792c0987dda75917104b5ecd9d5a

                  SHA512

                  b7f6d59ee55d2b579c2185560d2e660c1952f9214f3db3096b1358af3559fd985859aa3389be333c826f35b85cd63c6f65a03e65a7ad57c7834bb09abd1d853e

                • memory/220-407-0x0000000000000000-mapping.dmp
                • memory/680-393-0x0000000000000000-mapping.dmp
                • memory/792-769-0x0000000008A30000-0x0000000008F5C000-memory.dmp
                  Filesize

                  5.2MB

                • memory/792-648-0x0000000000000000-mapping.dmp
                • memory/792-768-0x0000000007CD0000-0x0000000007E92000-memory.dmp
                  Filesize

                  1.8MB

                • memory/792-684-0x00000000002C0000-0x00000000002E8000-memory.dmp
                  Filesize

                  160KB

                • memory/1044-375-0x0000000000000000-mapping.dmp
                • memory/1112-436-0x0000000000000000-mapping.dmp
                • memory/1284-579-0x000000000045ECA0-mapping.dmp
                • memory/1508-493-0x0000000000090000-0x00000000012FA000-memory.dmp
                  Filesize

                  18.4MB

                • memory/1508-503-0x000000001C090000-0x000000001C220000-memory.dmp
                  Filesize

                  1.6MB

                • memory/1508-485-0x0000000000000000-mapping.dmp
                • memory/2276-348-0x0000000000000000-mapping.dmp
                • memory/2464-759-0x00000000061A0000-0x0000000006232000-memory.dmp
                  Filesize

                  584KB

                • memory/2464-450-0x0000000000000000-mapping.dmp
                • memory/2464-489-0x0000000000990000-0x00000000009B8000-memory.dmp
                  Filesize

                  160KB

                • memory/2464-592-0x00000000057F0000-0x0000000005DF6000-memory.dmp
                  Filesize

                  6.0MB

                • memory/2464-598-0x00000000052F0000-0x00000000053FA000-memory.dmp
                  Filesize

                  1.0MB

                • memory/2464-612-0x0000000005200000-0x0000000005212000-memory.dmp
                  Filesize

                  72KB

                • memory/2464-624-0x0000000005260000-0x000000000529E000-memory.dmp
                  Filesize

                  248KB

                • memory/2464-638-0x00000000052A0000-0x00000000052EB000-memory.dmp
                  Filesize

                  300KB

                • memory/2464-749-0x0000000006300000-0x00000000067FE000-memory.dmp
                  Filesize

                  5.0MB

                • memory/2464-751-0x0000000005560000-0x00000000055C6000-memory.dmp
                  Filesize

                  408KB

                • memory/2464-799-0x0000000006240000-0x00000000062B6000-memory.dmp
                  Filesize

                  472KB

                • memory/2464-800-0x0000000006150000-0x00000000061A0000-memory.dmp
                  Filesize

                  320KB

                • memory/2628-153-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-141-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-168-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-169-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-170-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-122-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-166-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-121-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-123-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-124-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-176-0x0000000000400000-0x0000000000596000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-125-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-174-0x00000000022C0000-0x00000000022FE000-memory.dmp
                  Filesize

                  248KB

                • memory/2628-126-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-128-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-129-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-165-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-131-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-130-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-127-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-134-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-133-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-132-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-136-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-137-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-138-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-139-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-167-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-143-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-142-0x00000000022C0000-0x00000000022FE000-memory.dmp
                  Filesize

                  248KB

                • memory/2628-164-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-140-0x00000000005A0000-0x000000000064E000-memory.dmp
                  Filesize

                  696KB

                • memory/2628-163-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-144-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-162-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-161-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-160-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-145-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-146-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-159-0x0000000000400000-0x0000000000596000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-158-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-157-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-148-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-156-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-155-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-154-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-120-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-152-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-151-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-150-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-149-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2628-147-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/3044-353-0x0000000000000000-mapping.dmp
                • memory/3332-301-0x0000000000000000-mapping.dmp
                • memory/3340-254-0x0000000000000000-mapping.dmp
                • memory/3368-409-0x0000000000000000-mapping.dmp
                • memory/3528-843-0x0000000000000000-mapping.dmp
                • memory/3892-369-0x0000000000000000-mapping.dmp
                • memory/4064-505-0x000000000040106C-mapping.dmp
                • memory/4064-566-0x0000000000400000-0x0000000000405000-memory.dmp
                  Filesize

                  20KB

                • memory/4064-645-0x0000000000400000-0x0000000000405000-memory.dmp
                  Filesize

                  20KB

                • memory/4200-926-0x0000000000000000-mapping.dmp
                • memory/4236-225-0x0000000000000000-mapping.dmp
                • memory/4620-190-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/4620-184-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/4620-194-0x00000000005A0000-0x000000000064E000-memory.dmp
                  Filesize

                  696KB

                • memory/4620-242-0x0000000000400000-0x0000000000596000-memory.dmp
                  Filesize

                  1.6MB

                • memory/4620-192-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/4620-492-0x00000000005A0000-0x000000000064E000-memory.dmp
                  Filesize

                  696KB

                • memory/4620-189-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/4620-188-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/4620-187-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/4620-186-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/4620-185-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/4620-193-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/4620-183-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/4620-181-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/4620-180-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/4620-179-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/4620-171-0x0000000000000000-mapping.dmp
                • memory/4620-178-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/4620-177-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/4620-495-0x0000000000400000-0x0000000000596000-memory.dmp
                  Filesize

                  1.6MB

                • memory/4620-175-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/4620-173-0x0000000077C80000-0x0000000077E0E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/4868-533-0x0000000000000000-mapping.dmp