Analysis

  • max time kernel
    110s
  • max time network
    104s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23-03-2023 15:45

General

  • Target

    0c1a4b4aea8b2fbbb4fba7684d19a54250dccc4f9c4091d18f0a978d3e56240e.exe

  • Size

    1006KB

  • MD5

    e1a22c3df91dd944da2261d14b560161

  • SHA1

    58ca77393da0e507908c5e5aa1dacd2c1a73f4be

  • SHA256

    0c1a4b4aea8b2fbbb4fba7684d19a54250dccc4f9c4091d18f0a978d3e56240e

  • SHA512

    601041b5e5ae58b4a93febd912f2a76a81b8963026a9d8d8ab40923d501d91fdf123664b52a5d9cef7c567d5fcaf19024d0041009e42db5258f08bfe7333eabe

  • SSDEEP

    24576:Cyb0wnM5llmP5k39y4tKfBtJJPNM3MZD/gM+MP:pjM5lc+39y4aBtLFMM

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

lown

C2

193.233.20.31:4125

Attributes
  • auth_value

    4cf836e062bcdc2a4fdbf410f5747ec7

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c1a4b4aea8b2fbbb4fba7684d19a54250dccc4f9c4091d18f0a978d3e56240e.exe
    "C:\Users\Admin\AppData\Local\Temp\0c1a4b4aea8b2fbbb4fba7684d19a54250dccc4f9c4091d18f0a978d3e56240e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:372
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap4486.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap4486.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4516
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7136.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7136.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4988
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap5332.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap5332.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4064
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5645.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5645.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2080
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9047LU.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9047LU.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2100
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w73nS91.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w73nS91.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1156
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xFAJf74.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xFAJf74.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2704
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y91wg91.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y91wg91.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
        "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:5032
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4760
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3440
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:5072
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "legenda.exe" /P "Admin:N"
              5⤵
                PID:4128
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "legenda.exe" /P "Admin:R" /E
                5⤵
                  PID:5004
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:5020
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\f22b669919" /P "Admin:N"
                    5⤵
                      PID:4916
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\f22b669919" /P "Admin:R" /E
                      5⤵
                        PID:4904
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:524
              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                1⤵
                • Executes dropped EXE
                PID:764

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Defense Evasion

              Modify Registry

              3
              T1112

              Disabling Security Tools

              2
              T1089

              Credential Access

              Credentials in Files

              2
              T1081

              Discovery

              Query Registry

              1
              T1012

              System Information Discovery

              1
              T1082

              Collection

              Data from Local System

              2
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y91wg91.exe
                Filesize

                235KB

                MD5

                5086db99de54fca268169a1c6cf26122

                SHA1

                003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                SHA256

                42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                SHA512

                90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y91wg91.exe
                Filesize

                235KB

                MD5

                5086db99de54fca268169a1c6cf26122

                SHA1

                003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                SHA256

                42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                SHA512

                90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap4486.exe
                Filesize

                822KB

                MD5

                b7a05fabc09a31d4d215b1399e7fdabb

                SHA1

                929bd22a1f8e1bc462a4559ad274d4527bed14f6

                SHA256

                d168cc47cb8ad536fbc3e8758dcdd9dbe58c9b5c8473d1ea9add4394db851f70

                SHA512

                d92fdb64210a5507b84bef17aa933008cd3fdafd35b3576a3d68d051c0e3bf02f7295c9aa39d2d4b24fca7b6c01b18f97436278e69a5ab7a77bceb217bb6bb14

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap4486.exe
                Filesize

                822KB

                MD5

                b7a05fabc09a31d4d215b1399e7fdabb

                SHA1

                929bd22a1f8e1bc462a4559ad274d4527bed14f6

                SHA256

                d168cc47cb8ad536fbc3e8758dcdd9dbe58c9b5c8473d1ea9add4394db851f70

                SHA512

                d92fdb64210a5507b84bef17aa933008cd3fdafd35b3576a3d68d051c0e3bf02f7295c9aa39d2d4b24fca7b6c01b18f97436278e69a5ab7a77bceb217bb6bb14

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xFAJf74.exe
                Filesize

                175KB

                MD5

                50809fe16d7c482c1f4a2ea19fdcbc0a

                SHA1

                11b6f69c06a724da15183b16039c5cbc86016158

                SHA256

                09917b67829de37b5d6be8115c8f8321f436554f426a24e079257a8368051cb1

                SHA512

                c35170e5eb6dabda9fd2d289153df829957ca8e9665178529a1ba36395155bb34f489372993ec694d10bea490c86cef2ae152e2df480288aca8e796ba135261f

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xFAJf74.exe
                Filesize

                175KB

                MD5

                50809fe16d7c482c1f4a2ea19fdcbc0a

                SHA1

                11b6f69c06a724da15183b16039c5cbc86016158

                SHA256

                09917b67829de37b5d6be8115c8f8321f436554f426a24e079257a8368051cb1

                SHA512

                c35170e5eb6dabda9fd2d289153df829957ca8e9665178529a1ba36395155bb34f489372993ec694d10bea490c86cef2ae152e2df480288aca8e796ba135261f

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7136.exe
                Filesize

                680KB

                MD5

                0433af0e235e08d540c8f081fd9caf5e

                SHA1

                d656fe49c9706ba40efba1d9fa4c57559081f6e1

                SHA256

                d96dcb77b4390783259808ff12e2dfb9e6bc84cb56d3442fd38a19f5d7c21ea7

                SHA512

                ebee38fb957d2bd0ea1901946519d4125e958e99111ab5ee3681189ba1a35b9ab00bbee3ab50796c19fbf71d11823cc72a3e1b03d5eca083bf4889d76c324ab7

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7136.exe
                Filesize

                680KB

                MD5

                0433af0e235e08d540c8f081fd9caf5e

                SHA1

                d656fe49c9706ba40efba1d9fa4c57559081f6e1

                SHA256

                d96dcb77b4390783259808ff12e2dfb9e6bc84cb56d3442fd38a19f5d7c21ea7

                SHA512

                ebee38fb957d2bd0ea1901946519d4125e958e99111ab5ee3681189ba1a35b9ab00bbee3ab50796c19fbf71d11823cc72a3e1b03d5eca083bf4889d76c324ab7

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w73nS91.exe
                Filesize

                349KB

                MD5

                8df598af9914ab0adad4c62fd4d6c360

                SHA1

                bcf65bf898384984ee2f32dc327f7b435f17c8f7

                SHA256

                eefd4f5c4ef61e5cb4a78cc7120600ca43f5c1a666f91f783827adfe98d49b08

                SHA512

                dd0f76297b521f71c846321afb70b3ad760978a5d411ee7a7f000bdb2074af860cebada0e65f35362651bab5dc83a23b5f7cc7ff0a509a506205f86c025c8e8e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w73nS91.exe
                Filesize

                349KB

                MD5

                8df598af9914ab0adad4c62fd4d6c360

                SHA1

                bcf65bf898384984ee2f32dc327f7b435f17c8f7

                SHA256

                eefd4f5c4ef61e5cb4a78cc7120600ca43f5c1a666f91f783827adfe98d49b08

                SHA512

                dd0f76297b521f71c846321afb70b3ad760978a5d411ee7a7f000bdb2074af860cebada0e65f35362651bab5dc83a23b5f7cc7ff0a509a506205f86c025c8e8e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap5332.exe
                Filesize

                329KB

                MD5

                ffaa8ccb310a6a2564206cbdfb70eb01

                SHA1

                67550a960835120f365096a8d28f9d0019c702fc

                SHA256

                052ffc567e7fc0e5439309a17216797a958ce7ebbfca57054682e482cb689390

                SHA512

                697a4b4de4ecbb5a583147987c2283b341c6bda7e2dd35dd218c9edfda615ff5d891e36b9e96c0521ba58e3aab4297fa26977c2c9ea1bd366d14427349ad8045

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap5332.exe
                Filesize

                329KB

                MD5

                ffaa8ccb310a6a2564206cbdfb70eb01

                SHA1

                67550a960835120f365096a8d28f9d0019c702fc

                SHA256

                052ffc567e7fc0e5439309a17216797a958ce7ebbfca57054682e482cb689390

                SHA512

                697a4b4de4ecbb5a583147987c2283b341c6bda7e2dd35dd218c9edfda615ff5d891e36b9e96c0521ba58e3aab4297fa26977c2c9ea1bd366d14427349ad8045

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5645.exe
                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5645.exe
                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9047LU.exe
                Filesize

                256KB

                MD5

                4b4d2a125add163c09b7b13c44ed870f

                SHA1

                e936d747f2ffba43e8a2f186f680c30dccfbcad2

                SHA256

                c63c316b75b6cda8ca50127321c19a8d14cc130cb74cc5084b0d41320f77085b

                SHA512

                109aa52b29cda16caa7a1d463613f67c9c9d07fa46b4d82576798cdd18334ac1965c9c61c929eb1d7d8c249a46f699f97818de66340b518ec9336b6b0681bb09

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9047LU.exe
                Filesize

                256KB

                MD5

                4b4d2a125add163c09b7b13c44ed870f

                SHA1

                e936d747f2ffba43e8a2f186f680c30dccfbcad2

                SHA256

                c63c316b75b6cda8ca50127321c19a8d14cc130cb74cc5084b0d41320f77085b

                SHA512

                109aa52b29cda16caa7a1d463613f67c9c9d07fa46b4d82576798cdd18334ac1965c9c61c929eb1d7d8c249a46f699f97818de66340b518ec9336b6b0681bb09

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                Filesize

                235KB

                MD5

                5086db99de54fca268169a1c6cf26122

                SHA1

                003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                SHA256

                42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                SHA512

                90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                Filesize

                235KB

                MD5

                5086db99de54fca268169a1c6cf26122

                SHA1

                003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                SHA256

                42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                SHA512

                90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                Filesize

                235KB

                MD5

                5086db99de54fca268169a1c6cf26122

                SHA1

                003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                SHA256

                42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                SHA512

                90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                Filesize

                235KB

                MD5

                5086db99de54fca268169a1c6cf26122

                SHA1

                003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                SHA256

                42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                SHA512

                90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                Filesize

                223B

                MD5

                94cbeec5d4343918fd0e48760e40539c

                SHA1

                a049266c5c1131f692f306c8710d7e72586ae79d

                SHA256

                48eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279

                SHA512

                4e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0

              • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • memory/1156-1114-0x00000000025F0000-0x0000000002600000-memory.dmp
                Filesize

                64KB

              • memory/1156-229-0x00000000025F0000-0x0000000002600000-memory.dmp
                Filesize

                64KB

              • memory/1156-1121-0x00000000069B0000-0x0000000006EDC000-memory.dmp
                Filesize

                5.2MB

              • memory/1156-1120-0x00000000067E0000-0x00000000069A2000-memory.dmp
                Filesize

                1.8MB

              • memory/1156-1118-0x00000000066F0000-0x0000000006766000-memory.dmp
                Filesize

                472KB

              • memory/1156-1119-0x0000000006770000-0x00000000067C0000-memory.dmp
                Filesize

                320KB

              • memory/1156-1117-0x00000000025F0000-0x0000000002600000-memory.dmp
                Filesize

                64KB

              • memory/1156-1116-0x00000000025F0000-0x0000000002600000-memory.dmp
                Filesize

                64KB

              • memory/1156-1115-0x00000000025F0000-0x0000000002600000-memory.dmp
                Filesize

                64KB

              • memory/1156-1112-0x0000000005790000-0x00000000057F6000-memory.dmp
                Filesize

                408KB

              • memory/1156-1111-0x00000000056F0000-0x0000000005782000-memory.dmp
                Filesize

                584KB

              • memory/1156-1110-0x00000000025F0000-0x0000000002600000-memory.dmp
                Filesize

                64KB

              • memory/1156-1109-0x0000000005560000-0x00000000055AB000-memory.dmp
                Filesize

                300KB

              • memory/1156-193-0x0000000002590000-0x00000000025D6000-memory.dmp
                Filesize

                280KB

              • memory/1156-194-0x00000000051C0000-0x0000000005204000-memory.dmp
                Filesize

                272KB

              • memory/1156-195-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/1156-196-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/1156-198-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/1156-200-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/1156-202-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/1156-204-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/1156-206-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/1156-208-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/1156-210-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/1156-212-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/1156-214-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/1156-216-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/1156-218-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/1156-220-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/1156-222-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/1156-224-0x0000000000800000-0x000000000084B000-memory.dmp
                Filesize

                300KB

              • memory/1156-225-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/1156-227-0x00000000025F0000-0x0000000002600000-memory.dmp
                Filesize

                64KB

              • memory/1156-1108-0x0000000005410000-0x000000000544E000-memory.dmp
                Filesize

                248KB

              • memory/1156-232-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/1156-231-0x00000000025F0000-0x0000000002600000-memory.dmp
                Filesize

                64KB

              • memory/1156-228-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/1156-1105-0x0000000005840000-0x0000000005E46000-memory.dmp
                Filesize

                6.0MB

              • memory/1156-1106-0x00000000052B0000-0x00000000053BA000-memory.dmp
                Filesize

                1.0MB

              • memory/1156-1107-0x00000000053F0000-0x0000000005402000-memory.dmp
                Filesize

                72KB

              • memory/2080-145-0x00000000001F0000-0x00000000001FA000-memory.dmp
                Filesize

                40KB

              • memory/2100-162-0x00000000025D0000-0x00000000025E2000-memory.dmp
                Filesize

                72KB

              • memory/2100-168-0x00000000025D0000-0x00000000025E2000-memory.dmp
                Filesize

                72KB

              • memory/2100-164-0x00000000025D0000-0x00000000025E2000-memory.dmp
                Filesize

                72KB

              • memory/2100-186-0x0000000000AD0000-0x0000000000AE0000-memory.dmp
                Filesize

                64KB

              • memory/2100-166-0x00000000025D0000-0x00000000025E2000-memory.dmp
                Filesize

                72KB

              • memory/2100-185-0x0000000000400000-0x0000000000703000-memory.dmp
                Filesize

                3.0MB

              • memory/2100-184-0x00000000025D0000-0x00000000025E2000-memory.dmp
                Filesize

                72KB

              • memory/2100-182-0x00000000025D0000-0x00000000025E2000-memory.dmp
                Filesize

                72KB

              • memory/2100-180-0x00000000025D0000-0x00000000025E2000-memory.dmp
                Filesize

                72KB

              • memory/2100-178-0x00000000025D0000-0x00000000025E2000-memory.dmp
                Filesize

                72KB

              • memory/2100-176-0x00000000025D0000-0x00000000025E2000-memory.dmp
                Filesize

                72KB

              • memory/2100-174-0x00000000025D0000-0x00000000025E2000-memory.dmp
                Filesize

                72KB

              • memory/2100-188-0x0000000000400000-0x0000000000703000-memory.dmp
                Filesize

                3.0MB

              • memory/2100-170-0x00000000025D0000-0x00000000025E2000-memory.dmp
                Filesize

                72KB

              • memory/2100-157-0x0000000000AD0000-0x0000000000AE0000-memory.dmp
                Filesize

                64KB

              • memory/2100-172-0x00000000025D0000-0x00000000025E2000-memory.dmp
                Filesize

                72KB

              • memory/2100-151-0x0000000000AE0000-0x0000000000AFA000-memory.dmp
                Filesize

                104KB

              • memory/2100-160-0x00000000025D0000-0x00000000025E2000-memory.dmp
                Filesize

                72KB

              • memory/2100-158-0x00000000025D0000-0x00000000025E2000-memory.dmp
                Filesize

                72KB

              • memory/2100-155-0x0000000000AD0000-0x0000000000AE0000-memory.dmp
                Filesize

                64KB

              • memory/2100-156-0x00000000025D0000-0x00000000025E2000-memory.dmp
                Filesize

                72KB

              • memory/2100-152-0x0000000004D40000-0x000000000523E000-memory.dmp
                Filesize

                5.0MB

              • memory/2100-154-0x00000000001D0000-0x00000000001FD000-memory.dmp
                Filesize

                180KB

              • memory/2100-153-0x00000000025D0000-0x00000000025E8000-memory.dmp
                Filesize

                96KB

              • memory/2704-1127-0x00000000009A0000-0x00000000009D2000-memory.dmp
                Filesize

                200KB

              • memory/2704-1129-0x00000000053E0000-0x000000000542B000-memory.dmp
                Filesize

                300KB

              • memory/2704-1128-0x0000000005560000-0x0000000005570000-memory.dmp
                Filesize

                64KB