Analysis

  • max time kernel
    107s
  • max time network
    109s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/03/2023, 17:19

General

  • Target

    5dbbd92d677f4615e2397314040b7443b5d770771705ff287939f9621ebd87cc.exe

  • Size

    1008KB

  • MD5

    f94750a7b9b383b15ee40df5fb57b35a

  • SHA1

    9feda596ab221b7166a5d1d5cd54d57bf79878a9

  • SHA256

    5dbbd92d677f4615e2397314040b7443b5d770771705ff287939f9621ebd87cc

  • SHA512

    2c9b0199cf19d112cc5f0e7380cd68533ad4ead2cc644bedf7b26b36959834953dad85b5b3d3a0db7c51a3389f1bb719c28b248780aca990ffeadd5c82c43239

  • SSDEEP

    24576:KyaVxIe5VjYlJklU/KTKRKynP1tvxOrHyPQq5acO7:RaVxIYVj+k2KTKhnLvorSf5av

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

sint

C2

193.233.20.31:4125

Attributes
  • auth_value

    9d9b763b4dcfbff1c06ef4743cc0399e

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5dbbd92d677f4615e2397314040b7443b5d770771705ff287939f9621ebd87cc.exe
    "C:\Users\Admin\AppData\Local\Temp\5dbbd92d677f4615e2397314040b7443b5d770771705ff287939f9621ebd87cc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1872
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap7356.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap7356.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap0609.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap0609.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2276
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap9595.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap9595.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2504
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz7234.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz7234.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4276
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9494ii.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9494ii.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3176
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w55kN32.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w55kN32.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1464
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xqdKW41.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xqdKW41.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3704
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y28qq12.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y28qq12.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3744
      • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
        "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2988
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:780
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4744
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3856
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "legenda.exe" /P "Admin:N"
              5⤵
                PID:3920
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "legenda.exe" /P "Admin:R" /E
                5⤵
                  PID:4876
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4380
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\f22b669919" /P "Admin:N"
                    5⤵
                      PID:5096
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\f22b669919" /P "Admin:R" /E
                      5⤵
                        PID:5012
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:5060
              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                1⤵
                • Executes dropped EXE
                PID:4908

              Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y28qq12.exe

                      Filesize

                      235KB

                      MD5

                      5086db99de54fca268169a1c6cf26122

                      SHA1

                      003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                      SHA256

                      42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                      SHA512

                      90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y28qq12.exe

                      Filesize

                      235KB

                      MD5

                      5086db99de54fca268169a1c6cf26122

                      SHA1

                      003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                      SHA256

                      42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                      SHA512

                      90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap7356.exe

                      Filesize

                      825KB

                      MD5

                      1cdee12d382d8d00241ab8aaabf65b96

                      SHA1

                      720b5df9bc87df74e5745fca8f6f01aff662b2f6

                      SHA256

                      e341e6e289f328031188ee888c54da4eac77eb439dc76e4f42693917754b0899

                      SHA512

                      988215367fe58dc574bc4e3a0b40fd3a06163fd96e71232ba5b8a2f43338a571feee2213307da4c9da736c9675b7e907a98a0519d1cece964795a4a2fe5bcc58

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap7356.exe

                      Filesize

                      825KB

                      MD5

                      1cdee12d382d8d00241ab8aaabf65b96

                      SHA1

                      720b5df9bc87df74e5745fca8f6f01aff662b2f6

                      SHA256

                      e341e6e289f328031188ee888c54da4eac77eb439dc76e4f42693917754b0899

                      SHA512

                      988215367fe58dc574bc4e3a0b40fd3a06163fd96e71232ba5b8a2f43338a571feee2213307da4c9da736c9675b7e907a98a0519d1cece964795a4a2fe5bcc58

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xqdKW41.exe

                      Filesize

                      175KB

                      MD5

                      87d8308e8cda648f980eaded98c6dd64

                      SHA1

                      8e1213fea55c704c3d133c4b8675b99a66c08fc1

                      SHA256

                      dfb2378d9e691c98c02a4ebd3196a313185549e72cd0d770972ea47888889246

                      SHA512

                      04add36bd3e21f02b1fa836caddfbc0a0adfa480f18a369a5974bf98e093f17f36ab68251d5acdda4d8a94458451953b1fcf6ab7706b5e7125fc852c5dc71200

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xqdKW41.exe

                      Filesize

                      175KB

                      MD5

                      87d8308e8cda648f980eaded98c6dd64

                      SHA1

                      8e1213fea55c704c3d133c4b8675b99a66c08fc1

                      SHA256

                      dfb2378d9e691c98c02a4ebd3196a313185549e72cd0d770972ea47888889246

                      SHA512

                      04add36bd3e21f02b1fa836caddfbc0a0adfa480f18a369a5974bf98e093f17f36ab68251d5acdda4d8a94458451953b1fcf6ab7706b5e7125fc852c5dc71200

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap0609.exe

                      Filesize

                      683KB

                      MD5

                      36095ec0076614ba3953a265d0c0b9e4

                      SHA1

                      29b8661c928b8a6fcb7c8fe48ee13f15a3caa545

                      SHA256

                      39cc63f802d70d10fabb6329485b14a4ca17a4d03634d5c68a83dbef34873784

                      SHA512

                      813f7517b69cb5d101aea23305af8ff8a0e6b7fc63c42750556ca119a015ff7c5ea4ed0a629de3d580d2cf820b66afa325c823d29d5f93269a11501c28abcedd

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap0609.exe

                      Filesize

                      683KB

                      MD5

                      36095ec0076614ba3953a265d0c0b9e4

                      SHA1

                      29b8661c928b8a6fcb7c8fe48ee13f15a3caa545

                      SHA256

                      39cc63f802d70d10fabb6329485b14a4ca17a4d03634d5c68a83dbef34873784

                      SHA512

                      813f7517b69cb5d101aea23305af8ff8a0e6b7fc63c42750556ca119a015ff7c5ea4ed0a629de3d580d2cf820b66afa325c823d29d5f93269a11501c28abcedd

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w55kN32.exe

                      Filesize

                      473KB

                      MD5

                      9b78c624e650b1eac37d9697fcb63a91

                      SHA1

                      0a0443fb31b49591e5036095a76172d546a20364

                      SHA256

                      63f0541d251a416140324cab3ecb01504fab58ac31a67065ee0fce2ca04175ae

                      SHA512

                      d542053264e7dbf1e221fcf50b35cdf1092699e2866880f8f6b65678049aaad857ef8e584d7bb5a6fc0b9b20c2ad25d88f420fb18313c86ad1ccedda3da0537e

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w55kN32.exe

                      Filesize

                      473KB

                      MD5

                      9b78c624e650b1eac37d9697fcb63a91

                      SHA1

                      0a0443fb31b49591e5036095a76172d546a20364

                      SHA256

                      63f0541d251a416140324cab3ecb01504fab58ac31a67065ee0fce2ca04175ae

                      SHA512

                      d542053264e7dbf1e221fcf50b35cdf1092699e2866880f8f6b65678049aaad857ef8e584d7bb5a6fc0b9b20c2ad25d88f420fb18313c86ad1ccedda3da0537e

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap9595.exe

                      Filesize

                      339KB

                      MD5

                      d220375d42fe338b859b0f2ee4d2cf39

                      SHA1

                      e1cd679e86d2d284e5613d285391e05283f75b65

                      SHA256

                      782be0a14a72f79a330e6aef4b0461303a1beb4a4bfa7377c626f3c23ed3936a

                      SHA512

                      1d4b8bc6d60d2e9116ab63a84c65892491bfa0eeb7b5e25723b2fe8c9e7c19cea2b83da95260772a9e9624bfaeefb937fd77fb16ad6cf9866e667cf25a393981

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap9595.exe

                      Filesize

                      339KB

                      MD5

                      d220375d42fe338b859b0f2ee4d2cf39

                      SHA1

                      e1cd679e86d2d284e5613d285391e05283f75b65

                      SHA256

                      782be0a14a72f79a330e6aef4b0461303a1beb4a4bfa7377c626f3c23ed3936a

                      SHA512

                      1d4b8bc6d60d2e9116ab63a84c65892491bfa0eeb7b5e25723b2fe8c9e7c19cea2b83da95260772a9e9624bfaeefb937fd77fb16ad6cf9866e667cf25a393981

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz7234.exe

                      Filesize

                      11KB

                      MD5

                      7e93bacbbc33e6652e147e7fe07572a0

                      SHA1

                      421a7167da01c8da4dc4d5234ca3dd84e319e762

                      SHA256

                      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                      SHA512

                      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz7234.exe

                      Filesize

                      11KB

                      MD5

                      7e93bacbbc33e6652e147e7fe07572a0

                      SHA1

                      421a7167da01c8da4dc4d5234ca3dd84e319e762

                      SHA256

                      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                      SHA512

                      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9494ii.exe

                      Filesize

                      415KB

                      MD5

                      3065925d14e3546b199a7888bc327706

                      SHA1

                      133637063a7abca9741b2a3ea5e57a10492d4cf5

                      SHA256

                      b054c16835b81c4e613a7a862dcbe9412e36e094af3ec1950322e1d4d3c5781b

                      SHA512

                      e8e2e56dcf5d86cc7d5668b696359f042788fae7a57c2e8013dedadb46adb86acc63638237cf94cd8deb72b91d82392eb157b38c5adc7424854c11fd1949b209

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9494ii.exe

                      Filesize

                      415KB

                      MD5

                      3065925d14e3546b199a7888bc327706

                      SHA1

                      133637063a7abca9741b2a3ea5e57a10492d4cf5

                      SHA256

                      b054c16835b81c4e613a7a862dcbe9412e36e094af3ec1950322e1d4d3c5781b

                      SHA512

                      e8e2e56dcf5d86cc7d5668b696359f042788fae7a57c2e8013dedadb46adb86acc63638237cf94cd8deb72b91d82392eb157b38c5adc7424854c11fd1949b209

                    • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                      Filesize

                      235KB

                      MD5

                      5086db99de54fca268169a1c6cf26122

                      SHA1

                      003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                      SHA256

                      42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                      SHA512

                      90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

                    • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                      Filesize

                      235KB

                      MD5

                      5086db99de54fca268169a1c6cf26122

                      SHA1

                      003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                      SHA256

                      42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                      SHA512

                      90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

                    • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                      Filesize

                      235KB

                      MD5

                      5086db99de54fca268169a1c6cf26122

                      SHA1

                      003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                      SHA256

                      42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                      SHA512

                      90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

                    • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                      Filesize

                      235KB

                      MD5

                      5086db99de54fca268169a1c6cf26122

                      SHA1

                      003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                      SHA256

                      42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                      SHA512

                      90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

                    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                      Filesize

                      89KB

                      MD5

                      16cf28ebb6d37dbaba93f18320c6086e

                      SHA1

                      eae7d4b7a9636329065877aabe8d4f721a26ab25

                      SHA256

                      c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                      SHA512

                      f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

                    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                      Filesize

                      89KB

                      MD5

                      16cf28ebb6d37dbaba93f18320c6086e

                      SHA1

                      eae7d4b7a9636329065877aabe8d4f721a26ab25

                      SHA256

                      c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                      SHA512

                      f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

                    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                      Filesize

                      223B

                      MD5

                      94cbeec5d4343918fd0e48760e40539c

                      SHA1

                      a049266c5c1131f692f306c8710d7e72586ae79d

                      SHA256

                      48eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279

                      SHA512

                      4e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0

                    • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                      Filesize

                      89KB

                      MD5

                      16cf28ebb6d37dbaba93f18320c6086e

                      SHA1

                      eae7d4b7a9636329065877aabe8d4f721a26ab25

                      SHA256

                      c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                      SHA512

                      f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

                    • memory/1464-1112-0x00000000054D0000-0x0000000005562000-memory.dmp

                      Filesize

                      584KB

                    • memory/1464-249-0x0000000002510000-0x0000000002520000-memory.dmp

                      Filesize

                      64KB

                    • memory/1464-1121-0x0000000008070000-0x00000000080C0000-memory.dmp

                      Filesize

                      320KB

                    • memory/1464-1120-0x0000000007FF0000-0x0000000008066000-memory.dmp

                      Filesize

                      472KB

                    • memory/1464-1119-0x0000000002510000-0x0000000002520000-memory.dmp

                      Filesize

                      64KB

                    • memory/1464-1118-0x00000000067F0000-0x0000000006D1C000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/1464-1117-0x0000000006610000-0x00000000067D2000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/1464-1116-0x0000000005570000-0x00000000055D6000-memory.dmp

                      Filesize

                      408KB

                    • memory/1464-1115-0x0000000002510000-0x0000000002520000-memory.dmp

                      Filesize

                      64KB

                    • memory/1464-1114-0x0000000002510000-0x0000000002520000-memory.dmp

                      Filesize

                      64KB

                    • memory/1464-1113-0x0000000002510000-0x0000000002520000-memory.dmp

                      Filesize

                      64KB

                    • memory/1464-1110-0x0000000005340000-0x000000000538B000-memory.dmp

                      Filesize

                      300KB

                    • memory/1464-193-0x00000000024A0000-0x00000000024E6000-memory.dmp

                      Filesize

                      280KB

                    • memory/1464-194-0x0000000004FE0000-0x0000000005024000-memory.dmp

                      Filesize

                      272KB

                    • memory/1464-195-0x0000000004FE0000-0x000000000501E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1464-196-0x0000000004FE0000-0x000000000501E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1464-198-0x0000000004FE0000-0x000000000501E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1464-200-0x0000000004FE0000-0x000000000501E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1464-202-0x0000000004FE0000-0x000000000501E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1464-204-0x0000000004FE0000-0x000000000501E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1464-206-0x0000000004FE0000-0x000000000501E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1464-208-0x0000000004FE0000-0x000000000501E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1464-210-0x0000000004FE0000-0x000000000501E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1464-212-0x0000000004FE0000-0x000000000501E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1464-214-0x0000000004FE0000-0x000000000501E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1464-216-0x0000000004FE0000-0x000000000501E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1464-218-0x0000000004FE0000-0x000000000501E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1464-220-0x0000000004FE0000-0x000000000501E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1464-222-0x0000000004FE0000-0x000000000501E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1464-224-0x0000000004FE0000-0x000000000501E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1464-226-0x0000000004FE0000-0x000000000501E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1464-228-0x0000000004FE0000-0x000000000501E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1464-248-0x0000000001EE0000-0x0000000001F2B000-memory.dmp

                      Filesize

                      300KB

                    • memory/1464-1109-0x00000000051F0000-0x000000000522E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1464-253-0x0000000002510000-0x0000000002520000-memory.dmp

                      Filesize

                      64KB

                    • memory/1464-251-0x0000000002510000-0x0000000002520000-memory.dmp

                      Filesize

                      64KB

                    • memory/1464-1105-0x0000000005630000-0x0000000005C36000-memory.dmp

                      Filesize

                      6.0MB

                    • memory/1464-1106-0x0000000005090000-0x000000000519A000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/1464-1107-0x00000000051D0000-0x00000000051E2000-memory.dmp

                      Filesize

                      72KB

                    • memory/1464-1108-0x0000000002510000-0x0000000002520000-memory.dmp

                      Filesize

                      64KB

                    • memory/3176-165-0x0000000004A10000-0x0000000004A22000-memory.dmp

                      Filesize

                      72KB

                    • memory/3176-153-0x00000000001D0000-0x00000000001FD000-memory.dmp

                      Filesize

                      180KB

                    • memory/3176-167-0x0000000004A10000-0x0000000004A22000-memory.dmp

                      Filesize

                      72KB

                    • memory/3176-171-0x0000000004A10000-0x0000000004A22000-memory.dmp

                      Filesize

                      72KB

                    • memory/3176-188-0x0000000000400000-0x00000000004E8000-memory.dmp

                      Filesize

                      928KB

                    • memory/3176-186-0x0000000000400000-0x00000000004E8000-memory.dmp

                      Filesize

                      928KB

                    • memory/3176-185-0x0000000004A10000-0x0000000004A22000-memory.dmp

                      Filesize

                      72KB

                    • memory/3176-183-0x0000000004A10000-0x0000000004A22000-memory.dmp

                      Filesize

                      72KB

                    • memory/3176-181-0x0000000004A10000-0x0000000004A22000-memory.dmp

                      Filesize

                      72KB

                    • memory/3176-179-0x0000000004A10000-0x0000000004A22000-memory.dmp

                      Filesize

                      72KB

                    • memory/3176-177-0x0000000004A10000-0x0000000004A22000-memory.dmp

                      Filesize

                      72KB

                    • memory/3176-152-0x0000000000710000-0x000000000072A000-memory.dmp

                      Filesize

                      104KB

                    • memory/3176-169-0x0000000004A10000-0x0000000004A22000-memory.dmp

                      Filesize

                      72KB

                    • memory/3176-173-0x0000000004A10000-0x0000000004A22000-memory.dmp

                      Filesize

                      72KB

                    • memory/3176-175-0x0000000004A10000-0x0000000004A22000-memory.dmp

                      Filesize

                      72KB

                    • memory/3176-163-0x0000000004A10000-0x0000000004A22000-memory.dmp

                      Filesize

                      72KB

                    • memory/3176-154-0x0000000004A30000-0x0000000004A40000-memory.dmp

                      Filesize

                      64KB

                    • memory/3176-161-0x0000000004A10000-0x0000000004A22000-memory.dmp

                      Filesize

                      72KB

                    • memory/3176-159-0x0000000004A10000-0x0000000004A22000-memory.dmp

                      Filesize

                      72KB

                    • memory/3176-158-0x0000000004A10000-0x0000000004A22000-memory.dmp

                      Filesize

                      72KB

                    • memory/3176-157-0x0000000004A10000-0x0000000004A28000-memory.dmp

                      Filesize

                      96KB

                    • memory/3176-156-0x0000000004A40000-0x0000000004F3E000-memory.dmp

                      Filesize

                      5.0MB

                    • memory/3176-155-0x0000000004A30000-0x0000000004A40000-memory.dmp

                      Filesize

                      64KB

                    • memory/3704-1129-0x0000000004F60000-0x0000000004F70000-memory.dmp

                      Filesize

                      64KB

                    • memory/3704-1128-0x0000000005150000-0x000000000519B000-memory.dmp

                      Filesize

                      300KB

                    • memory/3704-1127-0x0000000000710000-0x0000000000742000-memory.dmp

                      Filesize

                      200KB

                    • memory/4276-146-0x0000000000D00000-0x0000000000D0A000-memory.dmp

                      Filesize

                      40KB