Analysis

  • max time kernel
    116s
  • max time network
    109s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20-03-2023 11:57

General

  • Target

    dc5c3eb7c01b43c579f1a66e3e421a3320ea201ce6a3f13157eceddc93e2779e.exe

  • Size

    952KB

  • MD5

    1a5ce13c220d8cd98bb6672577565a7b

  • SHA1

    6bad108ecd56c946bb6699955d9b9edac3e0b13b

  • SHA256

    dc5c3eb7c01b43c579f1a66e3e421a3320ea201ce6a3f13157eceddc93e2779e

  • SHA512

    b94ded2aa0fe4f61b1757fb19295a4993d27f2bcf341a6fed0d9610a7167f97e289a101541dc5f7c663122d3bee5b64f57bf8486cffec50e45332220832ba651

  • SSDEEP

    24576:tyFqM4uQ1ygopTJxyZS0KgVGM17+VMM4Y/15:IQYwyTdj0K81aM1o

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Extracted

Family

redline

Botnet

vint

C2

193.233.20.30:4125

Attributes
  • auth_value

    fb8811912f8370b3d23bffda092d88d0

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc5c3eb7c01b43c579f1a66e3e421a3320ea201ce6a3f13157eceddc93e2779e.exe
    "C:\Users\Admin\AppData\Local\Temp\dc5c3eb7c01b43c579f1a66e3e421a3320ea201ce6a3f13157eceddc93e2779e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5794.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5794.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5052
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap8921.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap8921.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:824
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap5104.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap5104.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2592
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz7626.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz7626.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3912
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0053Jl.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0053Jl.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2816
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w27Zx53.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w27Zx53.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1312
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xfemZ71.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xfemZ71.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3008
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y04dp60.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y04dp60.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3156
      • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
        "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4564
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3352
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:5024
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3932
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "legenda.exe" /P "Admin:N"
              5⤵
                PID:4184
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "legenda.exe" /P "Admin:R" /E
                5⤵
                  PID:4132
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4116
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\f22b669919" /P "Admin:N"
                    5⤵
                      PID:4228
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\f22b669919" /P "Admin:R" /E
                      5⤵
                        PID:5060
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:1048
              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                1⤵
                • Executes dropped EXE
                PID:396

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Defense Evasion

              Modify Registry

              3
              T1112

              Disabling Security Tools

              2
              T1089

              Credential Access

              Credentials in Files

              2
              T1081

              Discovery

              Query Registry

              1
              T1012

              System Information Discovery

              1
              T1082

              Collection

              Data from Local System

              2
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y04dp60.exe
                Filesize

                235KB

                MD5

                5086db99de54fca268169a1c6cf26122

                SHA1

                003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                SHA256

                42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                SHA512

                90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y04dp60.exe
                Filesize

                235KB

                MD5

                5086db99de54fca268169a1c6cf26122

                SHA1

                003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                SHA256

                42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                SHA512

                90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5794.exe
                Filesize

                775KB

                MD5

                31bb11b3026ea27152c776293cdb013c

                SHA1

                3faead587ab101f28b9a01ce2e0e751312c8f16d

                SHA256

                269493326b85ca409676641a50dde53dac3e9163e7096d0483a502eb1db96f8f

                SHA512

                57c99cfd9b6facc72652680a51bddb78e3baaf60ae2c150dcd6947d5f878635802a72b89749607f80eeaa3c303aa79a638851aca1b920795aa5d433827f51062

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5794.exe
                Filesize

                775KB

                MD5

                31bb11b3026ea27152c776293cdb013c

                SHA1

                3faead587ab101f28b9a01ce2e0e751312c8f16d

                SHA256

                269493326b85ca409676641a50dde53dac3e9163e7096d0483a502eb1db96f8f

                SHA512

                57c99cfd9b6facc72652680a51bddb78e3baaf60ae2c150dcd6947d5f878635802a72b89749607f80eeaa3c303aa79a638851aca1b920795aa5d433827f51062

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xfemZ71.exe
                Filesize

                175KB

                MD5

                3389637c0d072121bf1b127629736d37

                SHA1

                300e915efdf2479bfd0d3699c0a6bc51260f9655

                SHA256

                2b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153

                SHA512

                a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xfemZ71.exe
                Filesize

                175KB

                MD5

                3389637c0d072121bf1b127629736d37

                SHA1

                300e915efdf2479bfd0d3699c0a6bc51260f9655

                SHA256

                2b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153

                SHA512

                a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap8921.exe
                Filesize

                633KB

                MD5

                01540abcdfb69841fae00df6efe78627

                SHA1

                952f9b9c3b161d347a31f3d2bd17ada9445c2557

                SHA256

                85e604169f7b9974a38cf9c4cb7d100eaad93274353293628b78a7f2ee7a5397

                SHA512

                643bf8ad12b381b1feea63c084746deb2aa82ca273ef58873b16d011364061eadb34303c27c0fc16f74c40aed92876389b99c4457f708b2e19d4c71076dcc4a2

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap8921.exe
                Filesize

                633KB

                MD5

                01540abcdfb69841fae00df6efe78627

                SHA1

                952f9b9c3b161d347a31f3d2bd17ada9445c2557

                SHA256

                85e604169f7b9974a38cf9c4cb7d100eaad93274353293628b78a7f2ee7a5397

                SHA512

                643bf8ad12b381b1feea63c084746deb2aa82ca273ef58873b16d011364061eadb34303c27c0fc16f74c40aed92876389b99c4457f708b2e19d4c71076dcc4a2

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w27Zx53.exe
                Filesize

                287KB

                MD5

                8708325a426fb2ee2ffaac5a1f3b1fac

                SHA1

                887a218b3de9938e95e6bebcf92eaba745865d1b

                SHA256

                ed1d034b88b968e74932edbe6e590e397eed1cde295b7a95d3a72057ef61b0df

                SHA512

                9e2e335fae1e35d2c41a3703719769cb763a50eafcd9f5ed6fb89a3af982d073b74e10cb6c472302818e86afb5acd3d13af2292e185884751a04c96c80337f08

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w27Zx53.exe
                Filesize

                287KB

                MD5

                8708325a426fb2ee2ffaac5a1f3b1fac

                SHA1

                887a218b3de9938e95e6bebcf92eaba745865d1b

                SHA256

                ed1d034b88b968e74932edbe6e590e397eed1cde295b7a95d3a72057ef61b0df

                SHA512

                9e2e335fae1e35d2c41a3703719769cb763a50eafcd9f5ed6fb89a3af982d073b74e10cb6c472302818e86afb5acd3d13af2292e185884751a04c96c80337f08

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap5104.exe
                Filesize

                313KB

                MD5

                45cc5b7efac41da4c9352245a459f82f

                SHA1

                f39c4cca559d2e40b948f24401bea052e932ddab

                SHA256

                c883fc9f762aacec2ab296c60f1aeeb087f31c675e8bd4910ac4f52d47f3956f

                SHA512

                25c67ee5651038089165ef586ea6e10faecc79d7815193e241116cd01c273a5f83198d393b55b75c03f3a0ed7e326df244bf7915d1d7076b3c5deec54742c531

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap5104.exe
                Filesize

                313KB

                MD5

                45cc5b7efac41da4c9352245a459f82f

                SHA1

                f39c4cca559d2e40b948f24401bea052e932ddab

                SHA256

                c883fc9f762aacec2ab296c60f1aeeb087f31c675e8bd4910ac4f52d47f3956f

                SHA512

                25c67ee5651038089165ef586ea6e10faecc79d7815193e241116cd01c273a5f83198d393b55b75c03f3a0ed7e326df244bf7915d1d7076b3c5deec54742c531

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz7626.exe
                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz7626.exe
                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0053Jl.exe
                Filesize

                229KB

                MD5

                7e6cf109c6ab4faf8c040c0b83adec72

                SHA1

                f115eb6a0431d14032d9a89a9729526f621b2d98

                SHA256

                dc157acdf6b50dcd6a292db91c3072d0c138472d52c4d42ef0720681eafdce58

                SHA512

                b3608246dc6bafa4774c09e9ab4998d350dbdc8a4941f384b70ddb7909493ed0cdf11bfb5cdff37a675d4eb1ac04373569aa501d66c74728ca1e95db7cde10b7

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0053Jl.exe
                Filesize

                229KB

                MD5

                7e6cf109c6ab4faf8c040c0b83adec72

                SHA1

                f115eb6a0431d14032d9a89a9729526f621b2d98

                SHA256

                dc157acdf6b50dcd6a292db91c3072d0c138472d52c4d42ef0720681eafdce58

                SHA512

                b3608246dc6bafa4774c09e9ab4998d350dbdc8a4941f384b70ddb7909493ed0cdf11bfb5cdff37a675d4eb1ac04373569aa501d66c74728ca1e95db7cde10b7

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                Filesize

                235KB

                MD5

                5086db99de54fca268169a1c6cf26122

                SHA1

                003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                SHA256

                42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                SHA512

                90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                Filesize

                235KB

                MD5

                5086db99de54fca268169a1c6cf26122

                SHA1

                003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                SHA256

                42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                SHA512

                90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                Filesize

                235KB

                MD5

                5086db99de54fca268169a1c6cf26122

                SHA1

                003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                SHA256

                42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                SHA512

                90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                Filesize

                235KB

                MD5

                5086db99de54fca268169a1c6cf26122

                SHA1

                003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                SHA256

                42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                SHA512

                90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                Filesize

                223B

                MD5

                94cbeec5d4343918fd0e48760e40539c

                SHA1

                a049266c5c1131f692f306c8710d7e72586ae79d

                SHA256

                48eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279

                SHA512

                4e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0

              • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • memory/1312-1115-0x0000000004AF0000-0x0000000004B00000-memory.dmp
                Filesize

                64KB

              • memory/1312-230-0x0000000004A80000-0x0000000004ABE000-memory.dmp
                Filesize

                248KB

              • memory/1312-1123-0x0000000006D70000-0x0000000006DC0000-memory.dmp
                Filesize

                320KB

              • memory/1312-1122-0x0000000006CF0000-0x0000000006D66000-memory.dmp
                Filesize

                472KB

              • memory/1312-1121-0x0000000004AF0000-0x0000000004B00000-memory.dmp
                Filesize

                64KB

              • memory/1312-1120-0x0000000006580000-0x0000000006AAC000-memory.dmp
                Filesize

                5.2MB

              • memory/1312-1119-0x0000000006390000-0x0000000006552000-memory.dmp
                Filesize

                1.8MB

              • memory/1312-1118-0x0000000004AF0000-0x0000000004B00000-memory.dmp
                Filesize

                64KB

              • memory/1312-1117-0x0000000006170000-0x0000000006202000-memory.dmp
                Filesize

                584KB

              • memory/1312-1116-0x00000000054A0000-0x0000000005506000-memory.dmp
                Filesize

                408KB

              • memory/1312-1113-0x0000000005310000-0x000000000535B000-memory.dmp
                Filesize

                300KB

              • memory/1312-1112-0x0000000004AF0000-0x0000000004B00000-memory.dmp
                Filesize

                64KB

              • memory/1312-1111-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/1312-1110-0x00000000051A0000-0x00000000051B2000-memory.dmp
                Filesize

                72KB

              • memory/1312-1109-0x0000000005060000-0x000000000516A000-memory.dmp
                Filesize

                1.0MB

              • memory/1312-1108-0x0000000005610000-0x0000000005C16000-memory.dmp
                Filesize

                6.0MB

              • memory/1312-197-0x0000000002440000-0x0000000002486000-memory.dmp
                Filesize

                280KB

              • memory/1312-198-0x0000000000500000-0x000000000054B000-memory.dmp
                Filesize

                300KB

              • memory/1312-199-0x0000000004AF0000-0x0000000004B00000-memory.dmp
                Filesize

                64KB

              • memory/1312-200-0x0000000004A80000-0x0000000004AC4000-memory.dmp
                Filesize

                272KB

              • memory/1312-201-0x0000000004A80000-0x0000000004ABE000-memory.dmp
                Filesize

                248KB

              • memory/1312-202-0x0000000004A80000-0x0000000004ABE000-memory.dmp
                Filesize

                248KB

              • memory/1312-204-0x0000000004A80000-0x0000000004ABE000-memory.dmp
                Filesize

                248KB

              • memory/1312-206-0x0000000004A80000-0x0000000004ABE000-memory.dmp
                Filesize

                248KB

              • memory/1312-208-0x0000000004A80000-0x0000000004ABE000-memory.dmp
                Filesize

                248KB

              • memory/1312-210-0x0000000004A80000-0x0000000004ABE000-memory.dmp
                Filesize

                248KB

              • memory/1312-212-0x0000000004A80000-0x0000000004ABE000-memory.dmp
                Filesize

                248KB

              • memory/1312-214-0x0000000004A80000-0x0000000004ABE000-memory.dmp
                Filesize

                248KB

              • memory/1312-216-0x0000000004A80000-0x0000000004ABE000-memory.dmp
                Filesize

                248KB

              • memory/1312-218-0x0000000004A80000-0x0000000004ABE000-memory.dmp
                Filesize

                248KB

              • memory/1312-220-0x0000000004A80000-0x0000000004ABE000-memory.dmp
                Filesize

                248KB

              • memory/1312-222-0x0000000004A80000-0x0000000004ABE000-memory.dmp
                Filesize

                248KB

              • memory/1312-224-0x0000000004A80000-0x0000000004ABE000-memory.dmp
                Filesize

                248KB

              • memory/1312-226-0x0000000004A80000-0x0000000004ABE000-memory.dmp
                Filesize

                248KB

              • memory/1312-228-0x0000000004A80000-0x0000000004ABE000-memory.dmp
                Filesize

                248KB

              • memory/1312-500-0x0000000004AF0000-0x0000000004B00000-memory.dmp
                Filesize

                64KB

              • memory/1312-232-0x0000000004A80000-0x0000000004ABE000-memory.dmp
                Filesize

                248KB

              • memory/1312-234-0x0000000004A80000-0x0000000004ABE000-memory.dmp
                Filesize

                248KB

              • memory/2816-176-0x0000000002380000-0x0000000002392000-memory.dmp
                Filesize

                72KB

              • memory/2816-159-0x0000000002380000-0x0000000002392000-memory.dmp
                Filesize

                72KB

              • memory/2816-172-0x0000000002380000-0x0000000002392000-memory.dmp
                Filesize

                72KB

              • memory/2816-192-0x0000000000400000-0x00000000004BA000-memory.dmp
                Filesize

                744KB

              • memory/2816-190-0x0000000004B80000-0x0000000004B90000-memory.dmp
                Filesize

                64KB

              • memory/2816-189-0x0000000004B80000-0x0000000004B90000-memory.dmp
                Filesize

                64KB

              • memory/2816-188-0x0000000004B80000-0x0000000004B90000-memory.dmp
                Filesize

                64KB

              • memory/2816-166-0x0000000002380000-0x0000000002392000-memory.dmp
                Filesize

                72KB

              • memory/2816-187-0x0000000000400000-0x00000000004BA000-memory.dmp
                Filesize

                744KB

              • memory/2816-186-0x0000000002380000-0x0000000002392000-memory.dmp
                Filesize

                72KB

              • memory/2816-184-0x0000000002380000-0x0000000002392000-memory.dmp
                Filesize

                72KB

              • memory/2816-182-0x0000000002380000-0x0000000002392000-memory.dmp
                Filesize

                72KB

              • memory/2816-180-0x0000000002380000-0x0000000002392000-memory.dmp
                Filesize

                72KB

              • memory/2816-178-0x0000000002380000-0x0000000002392000-memory.dmp
                Filesize

                72KB

              • memory/2816-170-0x0000000002380000-0x0000000002392000-memory.dmp
                Filesize

                72KB

              • memory/2816-174-0x0000000002380000-0x0000000002392000-memory.dmp
                Filesize

                72KB

              • memory/2816-168-0x0000000002380000-0x0000000002392000-memory.dmp
                Filesize

                72KB

              • memory/2816-162-0x0000000002380000-0x0000000002392000-memory.dmp
                Filesize

                72KB

              • memory/2816-152-0x0000000000590000-0x00000000005BD000-memory.dmp
                Filesize

                180KB

              • memory/2816-153-0x00000000007F0000-0x000000000080A000-memory.dmp
                Filesize

                104KB

              • memory/2816-154-0x0000000004B90000-0x000000000508E000-memory.dmp
                Filesize

                5.0MB

              • memory/2816-160-0x0000000002380000-0x0000000002392000-memory.dmp
                Filesize

                72KB

              • memory/2816-164-0x0000000002380000-0x0000000002392000-memory.dmp
                Filesize

                72KB

              • memory/2816-158-0x0000000004B80000-0x0000000004B90000-memory.dmp
                Filesize

                64KB

              • memory/2816-157-0x0000000004B80000-0x0000000004B90000-memory.dmp
                Filesize

                64KB

              • memory/2816-156-0x0000000004B80000-0x0000000004B90000-memory.dmp
                Filesize

                64KB

              • memory/2816-155-0x0000000002380000-0x0000000002398000-memory.dmp
                Filesize

                96KB

              • memory/3008-1131-0x0000000005370000-0x0000000005380000-memory.dmp
                Filesize

                64KB

              • memory/3008-1130-0x0000000005310000-0x000000000535B000-memory.dmp
                Filesize

                300KB

              • memory/3008-1129-0x0000000000A90000-0x0000000000AC2000-memory.dmp
                Filesize

                200KB

              • memory/3912-146-0x0000000000BB0000-0x0000000000BBA000-memory.dmp
                Filesize

                40KB