Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22-03-2023 20:58

General

  • Target

    fcb6bad64efd19436a39e603b8a82ae86c4361f7778b6eb0ddf0323ab786c7cc.exe

  • Size

    1.0MB

  • MD5

    4f4d508f809bfeb33d7eb1603ee73a7d

  • SHA1

    03a810f610e563488ebe2d3cdd53dd478c41ce23

  • SHA256

    fcb6bad64efd19436a39e603b8a82ae86c4361f7778b6eb0ddf0323ab786c7cc

  • SHA512

    6d6505975920195d570b0801c5a6e78897adeda3542fbded4ba28452ff2d7913575619bee712c03dc0ba6269fcd1170075f33f9cfa78b09f3e0100887590c73b

  • SSDEEP

    24576:7ybdxwW8scXZDxDvtan8JFcnkd3kQ57zX6lTc030AIYPLOzlrW:uJ4JDfBAnkLX6lREAIya

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

sint

C2

193.233.20.31:4125

Attributes
  • auth_value

    9d9b763b4dcfbff1c06ef4743cc0399e

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fcb6bad64efd19436a39e603b8a82ae86c4361f7778b6eb0ddf0323ab786c7cc.exe
    "C:\Users\Admin\AppData\Local\Temp\fcb6bad64efd19436a39e603b8a82ae86c4361f7778b6eb0ddf0323ab786c7cc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap8886.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap8886.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap3463.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap3463.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4168
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap4685.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap4685.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3380
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz7521.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz7521.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3608
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2028Oa.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2028Oa.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4000
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w75VD20.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w75VD20.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4756
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xNfxF92.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xNfxF92.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3208
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y05oV51.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y05oV51.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3268
      • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
        "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4492
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4964
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:5020
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:5084
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "legenda.exe" /P "Admin:N"
              5⤵
                PID:4592
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "legenda.exe" /P "Admin:R" /E
                5⤵
                  PID:4584
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4580
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\f22b669919" /P "Admin:N"
                    5⤵
                      PID:4288
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\f22b669919" /P "Admin:R" /E
                      5⤵
                        PID:5092
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:4356
              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                1⤵
                • Executes dropped EXE
                PID:3336
              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                1⤵
                • Executes dropped EXE
                PID:1068

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Defense Evasion

              Modify Registry

              3
              T1112

              Disabling Security Tools

              2
              T1089

              Credential Access

              Credentials in Files

              2
              T1081

              Discovery

              Query Registry

              1
              T1012

              System Information Discovery

              1
              T1082

              Collection

              Data from Local System

              2
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y05oV51.exe
                Filesize

                235KB

                MD5

                5086db99de54fca268169a1c6cf26122

                SHA1

                003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                SHA256

                42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                SHA512

                90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y05oV51.exe
                Filesize

                235KB

                MD5

                5086db99de54fca268169a1c6cf26122

                SHA1

                003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                SHA256

                42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                SHA512

                90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap8886.exe
                Filesize

                850KB

                MD5

                9769813899030b036e557a448076c08c

                SHA1

                7c16ecf72a3c9c0bd1618decc00253ff41898ba8

                SHA256

                95f952094c41f8904ca0c5c88a5cffc41c36b2a1be622ead96a258037ea8174d

                SHA512

                6ec30f4791021a6853d6930a34226dcb9b2f2fa2e1f870ca8f337fb060915791e1df823d1ee442426dda67e9d7138d109a732b5f0f9ba2ce440f9419bbb116b2

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap8886.exe
                Filesize

                850KB

                MD5

                9769813899030b036e557a448076c08c

                SHA1

                7c16ecf72a3c9c0bd1618decc00253ff41898ba8

                SHA256

                95f952094c41f8904ca0c5c88a5cffc41c36b2a1be622ead96a258037ea8174d

                SHA512

                6ec30f4791021a6853d6930a34226dcb9b2f2fa2e1f870ca8f337fb060915791e1df823d1ee442426dda67e9d7138d109a732b5f0f9ba2ce440f9419bbb116b2

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xNfxF92.exe
                Filesize

                175KB

                MD5

                87d8308e8cda648f980eaded98c6dd64

                SHA1

                8e1213fea55c704c3d133c4b8675b99a66c08fc1

                SHA256

                dfb2378d9e691c98c02a4ebd3196a313185549e72cd0d770972ea47888889246

                SHA512

                04add36bd3e21f02b1fa836caddfbc0a0adfa480f18a369a5974bf98e093f17f36ab68251d5acdda4d8a94458451953b1fcf6ab7706b5e7125fc852c5dc71200

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xNfxF92.exe
                Filesize

                175KB

                MD5

                87d8308e8cda648f980eaded98c6dd64

                SHA1

                8e1213fea55c704c3d133c4b8675b99a66c08fc1

                SHA256

                dfb2378d9e691c98c02a4ebd3196a313185549e72cd0d770972ea47888889246

                SHA512

                04add36bd3e21f02b1fa836caddfbc0a0adfa480f18a369a5974bf98e093f17f36ab68251d5acdda4d8a94458451953b1fcf6ab7706b5e7125fc852c5dc71200

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap3463.exe
                Filesize

                708KB

                MD5

                82d4eb7fd90fce62eabcd1d488857079

                SHA1

                3f8812eae612b593ea8b09d47bec877c19b512e2

                SHA256

                41fc06bb4dbb33a7c0f8fbd89fd4aeabb98f728a4d6c6ef974224f630e7a47a3

                SHA512

                c41c533d8f665b68e49e084c7dff8f3761fb5346af8b56d197110da9414e2b05bbf67297632f504195404fa70c4cff3bcdc81e134631bbe77db321e329372829

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap3463.exe
                Filesize

                708KB

                MD5

                82d4eb7fd90fce62eabcd1d488857079

                SHA1

                3f8812eae612b593ea8b09d47bec877c19b512e2

                SHA256

                41fc06bb4dbb33a7c0f8fbd89fd4aeabb98f728a4d6c6ef974224f630e7a47a3

                SHA512

                c41c533d8f665b68e49e084c7dff8f3761fb5346af8b56d197110da9414e2b05bbf67297632f504195404fa70c4cff3bcdc81e134631bbe77db321e329372829

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w75VD20.exe
                Filesize

                497KB

                MD5

                e1abea90b72d159c8548351c32caebe7

                SHA1

                694a9d72cf656a57461d9a1966769a693105bd4e

                SHA256

                b8af9a9537725f64edf253c458cfc2d587a061b9c63def5ef6ddee1e209a686e

                SHA512

                fa45208149bed69509eb78a5f8728946d10bb7866f98c7cc34ec67e952c2fbd1d530ed237752017aee06a5064961a901be8808afd129d96c64624eb07213e94d

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w75VD20.exe
                Filesize

                497KB

                MD5

                e1abea90b72d159c8548351c32caebe7

                SHA1

                694a9d72cf656a57461d9a1966769a693105bd4e

                SHA256

                b8af9a9537725f64edf253c458cfc2d587a061b9c63def5ef6ddee1e209a686e

                SHA512

                fa45208149bed69509eb78a5f8728946d10bb7866f98c7cc34ec67e952c2fbd1d530ed237752017aee06a5064961a901be8808afd129d96c64624eb07213e94d

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap4685.exe
                Filesize

                351KB

                MD5

                47b4d89c71b0ab8b9c4202a0832ef656

                SHA1

                952ca2db2dc1a091b252a5df2f41896a9ca55ed6

                SHA256

                a4c3c4cd46d124388e47c35caf8dd7ca14018646e79c731fd546e3f33ef295d3

                SHA512

                7ff8bca26f393e26320e9b7124e1d3dcb486442696e2f6e614837c63531d3428bba32a37d36969a14cae000fdb1bab809413ba9c24d8ce459de56cad6d27b3f0

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap4685.exe
                Filesize

                351KB

                MD5

                47b4d89c71b0ab8b9c4202a0832ef656

                SHA1

                952ca2db2dc1a091b252a5df2f41896a9ca55ed6

                SHA256

                a4c3c4cd46d124388e47c35caf8dd7ca14018646e79c731fd546e3f33ef295d3

                SHA512

                7ff8bca26f393e26320e9b7124e1d3dcb486442696e2f6e614837c63531d3428bba32a37d36969a14cae000fdb1bab809413ba9c24d8ce459de56cad6d27b3f0

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz7521.exe
                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz7521.exe
                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2028Oa.exe
                Filesize

                438KB

                MD5

                174c1a6a8bad663d78836996371780e1

                SHA1

                aef2e27656e9840204c063f9b43184a284c72330

                SHA256

                2f5534aba17b1e8152b20b0a18cb78ae20339288d0eb466570c5936f3fcde24b

                SHA512

                1001feba74e1dfe5db162a2852b57d685c0adc1fe4541daf681a7fd937e4d37ef84855b5d9508ee114f9c23bf39432ef1c5767003b95b3ef3aa92437459b1008

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2028Oa.exe
                Filesize

                438KB

                MD5

                174c1a6a8bad663d78836996371780e1

                SHA1

                aef2e27656e9840204c063f9b43184a284c72330

                SHA256

                2f5534aba17b1e8152b20b0a18cb78ae20339288d0eb466570c5936f3fcde24b

                SHA512

                1001feba74e1dfe5db162a2852b57d685c0adc1fe4541daf681a7fd937e4d37ef84855b5d9508ee114f9c23bf39432ef1c5767003b95b3ef3aa92437459b1008

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                Filesize

                235KB

                MD5

                5086db99de54fca268169a1c6cf26122

                SHA1

                003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                SHA256

                42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                SHA512

                90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                Filesize

                235KB

                MD5

                5086db99de54fca268169a1c6cf26122

                SHA1

                003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                SHA256

                42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                SHA512

                90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                Filesize

                235KB

                MD5

                5086db99de54fca268169a1c6cf26122

                SHA1

                003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                SHA256

                42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                SHA512

                90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                Filesize

                235KB

                MD5

                5086db99de54fca268169a1c6cf26122

                SHA1

                003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                SHA256

                42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                SHA512

                90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                Filesize

                235KB

                MD5

                5086db99de54fca268169a1c6cf26122

                SHA1

                003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                SHA256

                42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                SHA512

                90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                Filesize

                223B

                MD5

                94cbeec5d4343918fd0e48760e40539c

                SHA1

                a049266c5c1131f692f306c8710d7e72586ae79d

                SHA256

                48eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279

                SHA512

                4e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0

              • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • memory/3208-1134-0x00000000053B0000-0x00000000053C0000-memory.dmp
                Filesize

                64KB

              • memory/3208-1133-0x00000000054E0000-0x000000000552B000-memory.dmp
                Filesize

                300KB

              • memory/3208-1132-0x0000000000AA0000-0x0000000000AD2000-memory.dmp
                Filesize

                200KB

              • memory/3608-149-0x0000000000400000-0x000000000040A000-memory.dmp
                Filesize

                40KB

              • memory/4000-170-0x00000000021A0000-0x00000000021B2000-memory.dmp
                Filesize

                72KB

              • memory/4000-178-0x00000000021A0000-0x00000000021B2000-memory.dmp
                Filesize

                72KB

              • memory/4000-180-0x00000000021A0000-0x00000000021B2000-memory.dmp
                Filesize

                72KB

              • memory/4000-182-0x00000000021A0000-0x00000000021B2000-memory.dmp
                Filesize

                72KB

              • memory/4000-184-0x00000000021A0000-0x00000000021B2000-memory.dmp
                Filesize

                72KB

              • memory/4000-186-0x00000000021A0000-0x00000000021B2000-memory.dmp
                Filesize

                72KB

              • memory/4000-188-0x00000000021A0000-0x00000000021B2000-memory.dmp
                Filesize

                72KB

              • memory/4000-189-0x0000000000400000-0x00000000004EE000-memory.dmp
                Filesize

                952KB

              • memory/4000-190-0x0000000004D30000-0x0000000004D40000-memory.dmp
                Filesize

                64KB

              • memory/4000-191-0x0000000004D30000-0x0000000004D40000-memory.dmp
                Filesize

                64KB

              • memory/4000-193-0x0000000000400000-0x00000000004EE000-memory.dmp
                Filesize

                952KB

              • memory/4000-176-0x00000000021A0000-0x00000000021B2000-memory.dmp
                Filesize

                72KB

              • memory/4000-174-0x00000000021A0000-0x00000000021B2000-memory.dmp
                Filesize

                72KB

              • memory/4000-172-0x00000000021A0000-0x00000000021B2000-memory.dmp
                Filesize

                72KB

              • memory/4000-168-0x00000000021A0000-0x00000000021B2000-memory.dmp
                Filesize

                72KB

              • memory/4000-166-0x00000000021A0000-0x00000000021B2000-memory.dmp
                Filesize

                72KB

              • memory/4000-164-0x00000000021A0000-0x00000000021B2000-memory.dmp
                Filesize

                72KB

              • memory/4000-161-0x00000000021A0000-0x00000000021B2000-memory.dmp
                Filesize

                72KB

              • memory/4000-162-0x0000000004D30000-0x0000000004D40000-memory.dmp
                Filesize

                64KB

              • memory/4000-160-0x00000000021A0000-0x00000000021B2000-memory.dmp
                Filesize

                72KB

              • memory/4000-159-0x00000000021A0000-0x00000000021B8000-memory.dmp
                Filesize

                96KB

              • memory/4000-158-0x0000000004D40000-0x000000000523E000-memory.dmp
                Filesize

                5.0MB

              • memory/4000-157-0x00000000008A0000-0x00000000008BA000-memory.dmp
                Filesize

                104KB

              • memory/4000-156-0x0000000004D30000-0x0000000004D40000-memory.dmp
                Filesize

                64KB

              • memory/4000-155-0x00000000001D0000-0x00000000001FD000-memory.dmp
                Filesize

                180KB

              • memory/4756-207-0x0000000004A60000-0x0000000004A9E000-memory.dmp
                Filesize

                248KB

              • memory/4756-225-0x0000000004A60000-0x0000000004A9E000-memory.dmp
                Filesize

                248KB

              • memory/4756-227-0x0000000004A60000-0x0000000004A9E000-memory.dmp
                Filesize

                248KB

              • memory/4756-229-0x0000000004A60000-0x0000000004A9E000-memory.dmp
                Filesize

                248KB

              • memory/4756-231-0x0000000004A60000-0x0000000004A9E000-memory.dmp
                Filesize

                248KB

              • memory/4756-233-0x0000000004A60000-0x0000000004A9E000-memory.dmp
                Filesize

                248KB

              • memory/4756-395-0x0000000000500000-0x000000000054B000-memory.dmp
                Filesize

                300KB

              • memory/4756-396-0x0000000004BE0000-0x0000000004BF0000-memory.dmp
                Filesize

                64KB

              • memory/4756-400-0x0000000004BE0000-0x0000000004BF0000-memory.dmp
                Filesize

                64KB

              • memory/4756-398-0x0000000004BE0000-0x0000000004BF0000-memory.dmp
                Filesize

                64KB

              • memory/4756-1110-0x00000000050F0000-0x00000000056F6000-memory.dmp
                Filesize

                6.0MB

              • memory/4756-1111-0x0000000005700000-0x000000000580A000-memory.dmp
                Filesize

                1.0MB

              • memory/4756-1112-0x0000000004BB0000-0x0000000004BC2000-memory.dmp
                Filesize

                72KB

              • memory/4756-1113-0x0000000005810000-0x000000000584E000-memory.dmp
                Filesize

                248KB

              • memory/4756-1114-0x0000000005950000-0x000000000599B000-memory.dmp
                Filesize

                300KB

              • memory/4756-1115-0x0000000004BE0000-0x0000000004BF0000-memory.dmp
                Filesize

                64KB

              • memory/4756-1118-0x0000000004BE0000-0x0000000004BF0000-memory.dmp
                Filesize

                64KB

              • memory/4756-1117-0x0000000004BE0000-0x0000000004BF0000-memory.dmp
                Filesize

                64KB

              • memory/4756-1119-0x0000000004BE0000-0x0000000004BF0000-memory.dmp
                Filesize

                64KB

              • memory/4756-1120-0x0000000005AE0000-0x0000000005B72000-memory.dmp
                Filesize

                584KB

              • memory/4756-1121-0x0000000005B80000-0x0000000005BE6000-memory.dmp
                Filesize

                408KB

              • memory/4756-1122-0x0000000006390000-0x0000000006552000-memory.dmp
                Filesize

                1.8MB

              • memory/4756-1123-0x0000000006570000-0x0000000006A9C000-memory.dmp
                Filesize

                5.2MB

              • memory/4756-1124-0x0000000004BE0000-0x0000000004BF0000-memory.dmp
                Filesize

                64KB

              • memory/4756-223-0x0000000004A60000-0x0000000004A9E000-memory.dmp
                Filesize

                248KB

              • memory/4756-221-0x0000000004A60000-0x0000000004A9E000-memory.dmp
                Filesize

                248KB

              • memory/4756-219-0x0000000004A60000-0x0000000004A9E000-memory.dmp
                Filesize

                248KB

              • memory/4756-217-0x0000000004A60000-0x0000000004A9E000-memory.dmp
                Filesize

                248KB

              • memory/4756-215-0x0000000004A60000-0x0000000004A9E000-memory.dmp
                Filesize

                248KB

              • memory/4756-213-0x0000000004A60000-0x0000000004A9E000-memory.dmp
                Filesize

                248KB

              • memory/4756-211-0x0000000004A60000-0x0000000004A9E000-memory.dmp
                Filesize

                248KB

              • memory/4756-209-0x0000000004A60000-0x0000000004A9E000-memory.dmp
                Filesize

                248KB

              • memory/4756-205-0x0000000004A60000-0x0000000004A9E000-memory.dmp
                Filesize

                248KB

              • memory/4756-203-0x0000000004A60000-0x0000000004A9E000-memory.dmp
                Filesize

                248KB

              • memory/4756-201-0x0000000004A60000-0x0000000004A9E000-memory.dmp
                Filesize

                248KB

              • memory/4756-200-0x0000000004A60000-0x0000000004A9E000-memory.dmp
                Filesize

                248KB

              • memory/4756-199-0x0000000004A60000-0x0000000004AA4000-memory.dmp
                Filesize

                272KB

              • memory/4756-198-0x0000000002580000-0x00000000025C6000-memory.dmp
                Filesize

                280KB

              • memory/4756-1125-0x0000000007EA0000-0x0000000007F16000-memory.dmp
                Filesize

                472KB

              • memory/4756-1126-0x0000000007F30000-0x0000000007F80000-memory.dmp
                Filesize

                320KB