Analysis

  • max time kernel
    99s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-03-2023 23:49

General

  • Target

    84662fcc1e24715ab180274ce1e64a5bacb9702638524ba6b2ba24aed6ef1f68.exe

  • Size

    1.0MB

  • MD5

    147541fb667f7e1243799c45d2710e08

  • SHA1

    fb4cbbaa1cc22a208a6e88ccc0de8dac8a18fd25

  • SHA256

    84662fcc1e24715ab180274ce1e64a5bacb9702638524ba6b2ba24aed6ef1f68

  • SHA512

    553b4dabe9542768e05b5019f539baae014ca0c8acbc1a3fbcfbb71425a27d94f36f03291fd863275ac3e238ac9f2a426ef0a3b3f5cb842e7d8f67bd776242e2

  • SSDEEP

    24576:OyuZrl33MtXRg1qAiCI5lz70s/lZNLBY:dWstXTCID70stZ

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

fort

C2

193.233.20.33:4125

Attributes
  • auth_value

    5ea5673154a804d8c80f565f7276f720

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Extracted

Family

aurora

C2

212.87.204.93:8081

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Aurora

    Aurora is a crypto wallet stealer written in Golang.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84662fcc1e24715ab180274ce1e64a5bacb9702638524ba6b2ba24aed6ef1f68.exe
    "C:\Users\Admin\AppData\Local\Temp\84662fcc1e24715ab180274ce1e64a5bacb9702638524ba6b2ba24aed6ef1f68.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4352
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1284.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1284.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4232
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap6480.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap6480.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1344
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap9287.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap9287.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4248
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0904.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0904.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3820
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3238if.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3238if.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1460
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w84Ep90.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w84Ep90.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3412
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xbUzW70.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xbUzW70.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4944
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y99Xl53.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y99Xl53.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2876
      • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
        "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:948
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4460
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4092
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:1636
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "legenda.exe" /P "Admin:N"
              5⤵
                PID:904
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "legenda.exe" /P "Admin:R" /E
                5⤵
                  PID:4440
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:1572
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\f22b669919" /P "Admin:N"
                    5⤵
                      PID:3304
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\f22b669919" /P "Admin:R" /E
                      5⤵
                        PID:2708
                    • C:\Users\Admin\AppData\Roaming\1000177000\2023.exe
                      "C:\Users\Admin\AppData\Roaming\1000177000\2023.exe"
                      4⤵
                      • Executes dropped EXE
                      PID:1916

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Defense Evasion

              Modify Registry

              3
              T1112

              Disabling Security Tools

              2
              T1089

              Credential Access

              Credentials in Files

              2
              T1081

              Discovery

              Query Registry

              2
              T1012

              System Information Discovery

              2
              T1082

              Collection

              Data from Local System

              2
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y99Xl53.exe
                Filesize

                236KB

                MD5

                838610c2d22d997a02b24ca9d0e7eea1

                SHA1

                e603fe84a3d044174dfd97abda849aa16ef6f5ef

                SHA256

                3c86ddd6d83d292f52c6c218a86b4d88af98a9bd6718387beec844a85d6b28fd

                SHA512

                d34973739be43566ae629a8a5f07603daa9f53e5fbaa14a9448830442c934a243e87721352d4199b608c1239c543c9388ec5ce590e5db9d2fdac105db3d6a9d3

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y99Xl53.exe
                Filesize

                236KB

                MD5

                838610c2d22d997a02b24ca9d0e7eea1

                SHA1

                e603fe84a3d044174dfd97abda849aa16ef6f5ef

                SHA256

                3c86ddd6d83d292f52c6c218a86b4d88af98a9bd6718387beec844a85d6b28fd

                SHA512

                d34973739be43566ae629a8a5f07603daa9f53e5fbaa14a9448830442c934a243e87721352d4199b608c1239c543c9388ec5ce590e5db9d2fdac105db3d6a9d3

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1284.exe
                Filesize

                846KB

                MD5

                23c61d22b594c8356fd3d06e56656412

                SHA1

                8eca292696d21c86b57cc9c6ccd35e4124136673

                SHA256

                299313e594671123fc33e908fe337a7acdd67a2ea32d7c5803a3b2615140dd0b

                SHA512

                cd6089a712e5a64e23d12202dd0ab530af045dbc3a3d42352ea589eea8b1401fa624d7f8e396a1685c5b84d76b77557fd619562484edceffebc4288d48d18ab2

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1284.exe
                Filesize

                846KB

                MD5

                23c61d22b594c8356fd3d06e56656412

                SHA1

                8eca292696d21c86b57cc9c6ccd35e4124136673

                SHA256

                299313e594671123fc33e908fe337a7acdd67a2ea32d7c5803a3b2615140dd0b

                SHA512

                cd6089a712e5a64e23d12202dd0ab530af045dbc3a3d42352ea589eea8b1401fa624d7f8e396a1685c5b84d76b77557fd619562484edceffebc4288d48d18ab2

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xbUzW70.exe
                Filesize

                175KB

                MD5

                2e35a7c98c612e390d19c5d3353d9af9

                SHA1

                af45bcdf297719c900a52981268e50dc19bd2c2f

                SHA256

                f38c799f529ad8dce5b2f923f00fbdfae79222ac151549aa5665237b6cc8a31a

                SHA512

                52d662279ed647cc4147a2360e93368b2a7fcf024bfa612a87e230ab7f88174cdfd54da18d23ff641efa8b9965e7ece30f828b72dad0a71ebc98c7ec7aeffc38

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xbUzW70.exe
                Filesize

                175KB

                MD5

                2e35a7c98c612e390d19c5d3353d9af9

                SHA1

                af45bcdf297719c900a52981268e50dc19bd2c2f

                SHA256

                f38c799f529ad8dce5b2f923f00fbdfae79222ac151549aa5665237b6cc8a31a

                SHA512

                52d662279ed647cc4147a2360e93368b2a7fcf024bfa612a87e230ab7f88174cdfd54da18d23ff641efa8b9965e7ece30f828b72dad0a71ebc98c7ec7aeffc38

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap6480.exe
                Filesize

                704KB

                MD5

                1cbd02047fa29e6968e0b240935f63c4

                SHA1

                0516afe96b6a865a9361b2ead8cccc382569e5b5

                SHA256

                1ca7cb1d3b1e5bb467cfe1ed177463b71ead0c5216743c73d3de94d3cc3499e2

                SHA512

                2d1ebbd81a3990592b015a6fd53ccd19a3c5d63660d37163db46adf5a1e196283852e7c87a35ac523f4fb0fd32713f76a0f7055291c687c43ba5717805fc8f9c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap6480.exe
                Filesize

                704KB

                MD5

                1cbd02047fa29e6968e0b240935f63c4

                SHA1

                0516afe96b6a865a9361b2ead8cccc382569e5b5

                SHA256

                1ca7cb1d3b1e5bb467cfe1ed177463b71ead0c5216743c73d3de94d3cc3499e2

                SHA512

                2d1ebbd81a3990592b015a6fd53ccd19a3c5d63660d37163db46adf5a1e196283852e7c87a35ac523f4fb0fd32713f76a0f7055291c687c43ba5717805fc8f9c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w84Ep90.exe
                Filesize

                379KB

                MD5

                64ee6e2f3a1b8d974c0c7aa92c2f2341

                SHA1

                1b61443391a5d0a70efb5e80b855fb4007ecfc69

                SHA256

                58b8864ad47332b6b491b44ef01c9f2bd16f5bc0389176c5f39f144e13dc1fe1

                SHA512

                835d4da3adb4739a941fb0c4d5aa254fe8ed1b01bbc6807139d2494c3444c4574ec1375bfa36a750757ea06749757431c43fd7d7e23eca0cfb1e8f1d9d6a906a

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w84Ep90.exe
                Filesize

                379KB

                MD5

                64ee6e2f3a1b8d974c0c7aa92c2f2341

                SHA1

                1b61443391a5d0a70efb5e80b855fb4007ecfc69

                SHA256

                58b8864ad47332b6b491b44ef01c9f2bd16f5bc0389176c5f39f144e13dc1fe1

                SHA512

                835d4da3adb4739a941fb0c4d5aa254fe8ed1b01bbc6807139d2494c3444c4574ec1375bfa36a750757ea06749757431c43fd7d7e23eca0cfb1e8f1d9d6a906a

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap9287.exe
                Filesize

                349KB

                MD5

                d338eb87cd06195331db52e633dd8056

                SHA1

                df3cdc85c35975ca29e520d1d14621bc66ea8ff3

                SHA256

                e90665de5e9aa15805af0a29aeb3aec86f8f3602735cb9a72cc84578bbe1a77b

                SHA512

                da5492f12f4ab78b722d852f0f93f13b574d33edd8b36ca48a328581ae212f77018b5615b3a2452001b7da7878ae7c03297cff81de11ed2972d10bf2197bb6b6

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap9287.exe
                Filesize

                349KB

                MD5

                d338eb87cd06195331db52e633dd8056

                SHA1

                df3cdc85c35975ca29e520d1d14621bc66ea8ff3

                SHA256

                e90665de5e9aa15805af0a29aeb3aec86f8f3602735cb9a72cc84578bbe1a77b

                SHA512

                da5492f12f4ab78b722d852f0f93f13b574d33edd8b36ca48a328581ae212f77018b5615b3a2452001b7da7878ae7c03297cff81de11ed2972d10bf2197bb6b6

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0904.exe
                Filesize

                12KB

                MD5

                f8ef23e84fadf742be674dab9addfe9d

                SHA1

                6490a0f9e0050ada3bb4ef42c63899ab1295850c

                SHA256

                fc58f7aa025869f34b4ad7a9b976b0742a784a6aecb258a4c207b0f842bc7004

                SHA512

                e549bbe7e9993e95f490c6420f61ccf6faba0ebe30663563797d4413bf06b7f37252d9d9c602c25205b5e35d5f8bc4e6d22df361f5bddea92af24c83455ff33c

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0904.exe
                Filesize

                12KB

                MD5

                f8ef23e84fadf742be674dab9addfe9d

                SHA1

                6490a0f9e0050ada3bb4ef42c63899ab1295850c

                SHA256

                fc58f7aa025869f34b4ad7a9b976b0742a784a6aecb258a4c207b0f842bc7004

                SHA512

                e549bbe7e9993e95f490c6420f61ccf6faba0ebe30663563797d4413bf06b7f37252d9d9c602c25205b5e35d5f8bc4e6d22df361f5bddea92af24c83455ff33c

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3238if.exe
                Filesize

                322KB

                MD5

                b9f3e4b13754150cc1e7b3b4f81260e0

                SHA1

                ea9049af1402c5f5210b0de22d958bb7a5239529

                SHA256

                384c4ed1320fa5f0464c22f98af77c3d784d350315c7ba98af80fc8a706bf202

                SHA512

                1080cb97aef595beef40efc1a717d846650a75629167458fb3e9bd2ce22fbdecfe5bcd8f19e271a0bfd5d5a4a2d2be95a9f4744cb8ae5ea3a51fd6cb6ff4626f

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3238if.exe
                Filesize

                322KB

                MD5

                b9f3e4b13754150cc1e7b3b4f81260e0

                SHA1

                ea9049af1402c5f5210b0de22d958bb7a5239529

                SHA256

                384c4ed1320fa5f0464c22f98af77c3d784d350315c7ba98af80fc8a706bf202

                SHA512

                1080cb97aef595beef40efc1a717d846650a75629167458fb3e9bd2ce22fbdecfe5bcd8f19e271a0bfd5d5a4a2d2be95a9f4744cb8ae5ea3a51fd6cb6ff4626f

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                Filesize

                236KB

                MD5

                838610c2d22d997a02b24ca9d0e7eea1

                SHA1

                e603fe84a3d044174dfd97abda849aa16ef6f5ef

                SHA256

                3c86ddd6d83d292f52c6c218a86b4d88af98a9bd6718387beec844a85d6b28fd

                SHA512

                d34973739be43566ae629a8a5f07603daa9f53e5fbaa14a9448830442c934a243e87721352d4199b608c1239c543c9388ec5ce590e5db9d2fdac105db3d6a9d3

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                Filesize

                236KB

                MD5

                838610c2d22d997a02b24ca9d0e7eea1

                SHA1

                e603fe84a3d044174dfd97abda849aa16ef6f5ef

                SHA256

                3c86ddd6d83d292f52c6c218a86b4d88af98a9bd6718387beec844a85d6b28fd

                SHA512

                d34973739be43566ae629a8a5f07603daa9f53e5fbaa14a9448830442c934a243e87721352d4199b608c1239c543c9388ec5ce590e5db9d2fdac105db3d6a9d3

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                Filesize

                236KB

                MD5

                838610c2d22d997a02b24ca9d0e7eea1

                SHA1

                e603fe84a3d044174dfd97abda849aa16ef6f5ef

                SHA256

                3c86ddd6d83d292f52c6c218a86b4d88af98a9bd6718387beec844a85d6b28fd

                SHA512

                d34973739be43566ae629a8a5f07603daa9f53e5fbaa14a9448830442c934a243e87721352d4199b608c1239c543c9388ec5ce590e5db9d2fdac105db3d6a9d3

              • C:\Users\Admin\AppData\Roaming\1000177000\2023.exe
                Filesize

                3.1MB

                MD5

                027a60b4337dd0847d0414aa8719ffec

                SHA1

                80f78f880e891adfa8f71fb1447ed19734077062

                SHA256

                3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168

                SHA512

                009703b2c57258ccec76aa97807976e3ad693f3ff90b5417ae920e5860354bdaf4b01caaa850f1996391da5b6d75ebc38509a9b124fd9ae0660d7002b54b606d

              • C:\Users\Admin\AppData\Roaming\1000177000\2023.exe
                Filesize

                3.1MB

                MD5

                027a60b4337dd0847d0414aa8719ffec

                SHA1

                80f78f880e891adfa8f71fb1447ed19734077062

                SHA256

                3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168

                SHA512

                009703b2c57258ccec76aa97807976e3ad693f3ff90b5417ae920e5860354bdaf4b01caaa850f1996391da5b6d75ebc38509a9b124fd9ae0660d7002b54b606d

              • C:\Users\Admin\AppData\Roaming\1000177000\2023.exe
                Filesize

                3.1MB

                MD5

                027a60b4337dd0847d0414aa8719ffec

                SHA1

                80f78f880e891adfa8f71fb1447ed19734077062

                SHA256

                3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168

                SHA512

                009703b2c57258ccec76aa97807976e3ad693f3ff90b5417ae920e5860354bdaf4b01caaa850f1996391da5b6d75ebc38509a9b124fd9ae0660d7002b54b606d

              • memory/1460-181-0x0000000007100000-0x0000000007112000-memory.dmp
                Filesize

                72KB

              • memory/1460-200-0x0000000000400000-0x0000000002B7E000-memory.dmp
                Filesize

                39.5MB

              • memory/1460-185-0x0000000007100000-0x0000000007112000-memory.dmp
                Filesize

                72KB

              • memory/1460-187-0x0000000007100000-0x0000000007112000-memory.dmp
                Filesize

                72KB

              • memory/1460-189-0x0000000007100000-0x0000000007112000-memory.dmp
                Filesize

                72KB

              • memory/1460-191-0x0000000007100000-0x0000000007112000-memory.dmp
                Filesize

                72KB

              • memory/1460-193-0x0000000007100000-0x0000000007112000-memory.dmp
                Filesize

                72KB

              • memory/1460-195-0x0000000007100000-0x0000000007112000-memory.dmp
                Filesize

                72KB

              • memory/1460-197-0x0000000007100000-0x0000000007112000-memory.dmp
                Filesize

                72KB

              • memory/1460-198-0x00000000071B0000-0x00000000071C0000-memory.dmp
                Filesize

                64KB

              • memory/1460-199-0x00000000071B0000-0x00000000071C0000-memory.dmp
                Filesize

                64KB

              • memory/1460-183-0x0000000007100000-0x0000000007112000-memory.dmp
                Filesize

                72KB

              • memory/1460-201-0x00000000071B0000-0x00000000071C0000-memory.dmp
                Filesize

                64KB

              • memory/1460-203-0x0000000000400000-0x0000000002B7E000-memory.dmp
                Filesize

                39.5MB

              • memory/1460-179-0x0000000007100000-0x0000000007112000-memory.dmp
                Filesize

                72KB

              • memory/1460-177-0x0000000007100000-0x0000000007112000-memory.dmp
                Filesize

                72KB

              • memory/1460-175-0x0000000007100000-0x0000000007112000-memory.dmp
                Filesize

                72KB

              • memory/1460-173-0x0000000007100000-0x0000000007112000-memory.dmp
                Filesize

                72KB

              • memory/1460-171-0x0000000007100000-0x0000000007112000-memory.dmp
                Filesize

                72KB

              • memory/1460-170-0x0000000007100000-0x0000000007112000-memory.dmp
                Filesize

                72KB

              • memory/1460-169-0x00000000071C0000-0x0000000007764000-memory.dmp
                Filesize

                5.6MB

              • memory/1460-168-0x00000000071B0000-0x00000000071C0000-memory.dmp
                Filesize

                64KB

              • memory/1460-167-0x0000000002B80000-0x0000000002BAD000-memory.dmp
                Filesize

                180KB

              • memory/3412-219-0x0000000004D20000-0x0000000004D5E000-memory.dmp
                Filesize

                248KB

              • memory/3412-1125-0x0000000008460000-0x00000000084C6000-memory.dmp
                Filesize

                408KB

              • memory/3412-229-0x0000000004D20000-0x0000000004D5E000-memory.dmp
                Filesize

                248KB

              • memory/3412-231-0x0000000004D20000-0x0000000004D5E000-memory.dmp
                Filesize

                248KB

              • memory/3412-233-0x0000000004D20000-0x0000000004D5E000-memory.dmp
                Filesize

                248KB

              • memory/3412-235-0x0000000004D20000-0x0000000004D5E000-memory.dmp
                Filesize

                248KB

              • memory/3412-237-0x0000000002B90000-0x0000000002BDB000-memory.dmp
                Filesize

                300KB

              • memory/3412-241-0x0000000007310000-0x0000000007320000-memory.dmp
                Filesize

                64KB

              • memory/3412-239-0x0000000007310000-0x0000000007320000-memory.dmp
                Filesize

                64KB

              • memory/3412-243-0x0000000007310000-0x0000000007320000-memory.dmp
                Filesize

                64KB

              • memory/3412-242-0x0000000004D20000-0x0000000004D5E000-memory.dmp
                Filesize

                248KB

              • memory/3412-238-0x0000000004D20000-0x0000000004D5E000-memory.dmp
                Filesize

                248KB

              • memory/3412-245-0x0000000004D20000-0x0000000004D5E000-memory.dmp
                Filesize

                248KB

              • memory/3412-1118-0x00000000078D0000-0x0000000007EE8000-memory.dmp
                Filesize

                6.1MB

              • memory/3412-1119-0x0000000007F70000-0x000000000807A000-memory.dmp
                Filesize

                1.0MB

              • memory/3412-1120-0x00000000080B0000-0x00000000080C2000-memory.dmp
                Filesize

                72KB

              • memory/3412-1121-0x00000000081D0000-0x000000000820C000-memory.dmp
                Filesize

                240KB

              • memory/3412-1122-0x0000000007310000-0x0000000007320000-memory.dmp
                Filesize

                64KB

              • memory/3412-1124-0x00000000083C0000-0x0000000008452000-memory.dmp
                Filesize

                584KB

              • memory/3412-227-0x0000000004D20000-0x0000000004D5E000-memory.dmp
                Filesize

                248KB

              • memory/3412-1126-0x0000000007310000-0x0000000007320000-memory.dmp
                Filesize

                64KB

              • memory/3412-1127-0x0000000007310000-0x0000000007320000-memory.dmp
                Filesize

                64KB

              • memory/3412-1128-0x0000000007310000-0x0000000007320000-memory.dmp
                Filesize

                64KB

              • memory/3412-1129-0x0000000008E80000-0x0000000009042000-memory.dmp
                Filesize

                1.8MB

              • memory/3412-1130-0x0000000009060000-0x000000000958C000-memory.dmp
                Filesize

                5.2MB

              • memory/3412-1131-0x00000000096C0000-0x0000000009736000-memory.dmp
                Filesize

                472KB

              • memory/3412-1132-0x0000000009750000-0x00000000097A0000-memory.dmp
                Filesize

                320KB

              • memory/3412-225-0x0000000004D20000-0x0000000004D5E000-memory.dmp
                Filesize

                248KB

              • memory/3412-1133-0x0000000007310000-0x0000000007320000-memory.dmp
                Filesize

                64KB

              • memory/3412-208-0x0000000004D20000-0x0000000004D5E000-memory.dmp
                Filesize

                248KB

              • memory/3412-209-0x0000000004D20000-0x0000000004D5E000-memory.dmp
                Filesize

                248KB

              • memory/3412-211-0x0000000004D20000-0x0000000004D5E000-memory.dmp
                Filesize

                248KB

              • memory/3412-223-0x0000000004D20000-0x0000000004D5E000-memory.dmp
                Filesize

                248KB

              • memory/3412-221-0x0000000004D20000-0x0000000004D5E000-memory.dmp
                Filesize

                248KB

              • memory/3412-217-0x0000000004D20000-0x0000000004D5E000-memory.dmp
                Filesize

                248KB

              • memory/3412-215-0x0000000004D20000-0x0000000004D5E000-memory.dmp
                Filesize

                248KB

              • memory/3412-213-0x0000000004D20000-0x0000000004D5E000-memory.dmp
                Filesize

                248KB

              • memory/3820-161-0x0000000000EB0000-0x0000000000EBA000-memory.dmp
                Filesize

                40KB

              • memory/4944-1140-0x0000000005B10000-0x0000000005B20000-memory.dmp
                Filesize

                64KB

              • memory/4944-1139-0x0000000000EC0000-0x0000000000EF2000-memory.dmp
                Filesize

                200KB