Analysis

  • max time kernel
    109s
  • max time network
    111s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26-03-2023 06:36

General

  • Target

    7f57cd475c879e257b501ab11333d2d3418e9874f7d4ec9fa8b353ba82fff240.exe

  • Size

    1.0MB

  • MD5

    3ac28fdb986ecccfd18f292bf5e306b7

  • SHA1

    df345c09695f838006a0d6c137539524d9e71c80

  • SHA256

    7f57cd475c879e257b501ab11333d2d3418e9874f7d4ec9fa8b353ba82fff240

  • SHA512

    df50f1767d0cbf243a015d87d2d0df031c842ad6d83db0386590833896127b21913cf6caaa5eb7495e57eb3471a160d5f2749beec514327aef4225646db64f07

  • SSDEEP

    12288:oMrZy90pLgG7AbOZC85rY7H0KnH9zrF6kDq1lecBdzAaCMfNTeJvBCB6HApNfz53:RynjKu9V6/leAdzA7LCcEzXm8

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

netu

C2

193.233.20.32:4125

Attributes
  • auth_value

    9641925ae487005582b5cf30476dd305

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f57cd475c879e257b501ab11333d2d3418e9874f7d4ec9fa8b353ba82fff240.exe
    "C:\Users\Admin\AppData\Local\Temp\7f57cd475c879e257b501ab11333d2d3418e9874f7d4ec9fa8b353ba82fff240.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap2492.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap2492.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:512
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7090.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7090.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:924
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap9226.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap9226.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2604
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3655.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3655.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:988
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4949Ns.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4949Ns.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4816
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w26jh00.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w26jh00.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1284
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xxxOA89.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xxxOA89.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4172
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y94vQ87.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y94vQ87.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3540
      • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
        "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:768
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:5024
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4496
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:2740
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "legenda.exe" /P "Admin:N"
              5⤵
                PID:4132
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "legenda.exe" /P "Admin:R" /E
                5⤵
                  PID:4464
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:1748
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\f22b669919" /P "Admin:N"
                    5⤵
                      PID:5060
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\f22b669919" /P "Admin:R" /E
                      5⤵
                        PID:5044
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:3364
              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                1⤵
                • Executes dropped EXE
                PID:5104

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Defense Evasion

              Modify Registry

              3
              T1112

              Disabling Security Tools

              2
              T1089

              Credential Access

              Credentials in Files

              2
              T1081

              Discovery

              Query Registry

              1
              T1012

              System Information Discovery

              1
              T1082

              Collection

              Data from Local System

              2
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y94vQ87.exe
                Filesize

                235KB

                MD5

                39222b109303d0d0e20d9481f3f05218

                SHA1

                687c61adf5a360116436122de63b4c88a02753eb

                SHA256

                9fd32a25f73498ccb9a521b293c73dfba6f923354b5ebb82240f10cb7a94abcc

                SHA512

                05cbd68918ea6737a4bf119b2eaaa87795bcea9cf77a46a1342d57cf0ca294a65c9ee48efe2767a92e68b3a18dd4e14dd67fbb830b2ca4c1fc0893628ca282ac

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y94vQ87.exe
                Filesize

                235KB

                MD5

                39222b109303d0d0e20d9481f3f05218

                SHA1

                687c61adf5a360116436122de63b4c88a02753eb

                SHA256

                9fd32a25f73498ccb9a521b293c73dfba6f923354b5ebb82240f10cb7a94abcc

                SHA512

                05cbd68918ea6737a4bf119b2eaaa87795bcea9cf77a46a1342d57cf0ca294a65c9ee48efe2767a92e68b3a18dd4e14dd67fbb830b2ca4c1fc0893628ca282ac

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap2492.exe
                Filesize

                853KB

                MD5

                77bd229d97e42dfa88095a0f342da4b6

                SHA1

                aef280a27bb73042309245a7f635dc25446fff7f

                SHA256

                80ad70ff659e71d6b604eb1b9ae7f221893bed8de36f7bedfe6f85455b45bb46

                SHA512

                d54dc6c2f76dce179e0be46101fc1c6c6e32f79e26d5afa8689d738f84964560cb78ce903ebd901c11c927e25d5188d09591aff931a37a1ce013a2981fd6c721

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap2492.exe
                Filesize

                853KB

                MD5

                77bd229d97e42dfa88095a0f342da4b6

                SHA1

                aef280a27bb73042309245a7f635dc25446fff7f

                SHA256

                80ad70ff659e71d6b604eb1b9ae7f221893bed8de36f7bedfe6f85455b45bb46

                SHA512

                d54dc6c2f76dce179e0be46101fc1c6c6e32f79e26d5afa8689d738f84964560cb78ce903ebd901c11c927e25d5188d09591aff931a37a1ce013a2981fd6c721

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xxxOA89.exe
                Filesize

                175KB

                MD5

                82f8701d57d3800f6d8037c8a8358879

                SHA1

                f3c206ce2bc849da3098663fbf32f5667aa25bf4

                SHA256

                25f567e62b27d72849b73f24e65cfb9bc5793764d19c843479764b22b7c73a71

                SHA512

                203a66c33fe35afcb1c008cb4b5dc9755d3387eb837e39d117b8670bf2964e88a34ae7c400438481ea68c1ca2efff87305c86a44277b167d8dfc72bf6cf8117b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xxxOA89.exe
                Filesize

                175KB

                MD5

                82f8701d57d3800f6d8037c8a8358879

                SHA1

                f3c206ce2bc849da3098663fbf32f5667aa25bf4

                SHA256

                25f567e62b27d72849b73f24e65cfb9bc5793764d19c843479764b22b7c73a71

                SHA512

                203a66c33fe35afcb1c008cb4b5dc9755d3387eb837e39d117b8670bf2964e88a34ae7c400438481ea68c1ca2efff87305c86a44277b167d8dfc72bf6cf8117b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7090.exe
                Filesize

                710KB

                MD5

                c2bb001c62bb798c90c2c1f8b431ffe2

                SHA1

                b385212c7157604388704e6c842ba657d52cf372

                SHA256

                9d67f57857b2664daf39ca7a1f0f0d0bc990c278943a8141f6bbf8f6068fa5c8

                SHA512

                71752219e3df16935dd976441c41f046f10a91b7f151057aa18796b37244c48a340331cc38511949679c3b8e55651524d059bea8ab6b2e87aa88e052a245c814

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7090.exe
                Filesize

                710KB

                MD5

                c2bb001c62bb798c90c2c1f8b431ffe2

                SHA1

                b385212c7157604388704e6c842ba657d52cf372

                SHA256

                9d67f57857b2664daf39ca7a1f0f0d0bc990c278943a8141f6bbf8f6068fa5c8

                SHA512

                71752219e3df16935dd976441c41f046f10a91b7f151057aa18796b37244c48a340331cc38511949679c3b8e55651524d059bea8ab6b2e87aa88e052a245c814

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w26jh00.exe
                Filesize

                383KB

                MD5

                27455dd35839e0bbd1f76d3272791898

                SHA1

                00ca2584da8b2f9f6f1f4858104c0204841dfa44

                SHA256

                a20af198bcb3726afaae90d33dba1b5fe8688182988abf2acdb3b73a9719f6fa

                SHA512

                bf54c61e77a088274197ac1d3f09f0a05970fa4ec846218c39d21de0ab14000668e2048ccb1efc607393d6f73e9bb3297f9edbf84734a73592801938eb3a2bef

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w26jh00.exe
                Filesize

                383KB

                MD5

                27455dd35839e0bbd1f76d3272791898

                SHA1

                00ca2584da8b2f9f6f1f4858104c0204841dfa44

                SHA256

                a20af198bcb3726afaae90d33dba1b5fe8688182988abf2acdb3b73a9719f6fa

                SHA512

                bf54c61e77a088274197ac1d3f09f0a05970fa4ec846218c39d21de0ab14000668e2048ccb1efc607393d6f73e9bb3297f9edbf84734a73592801938eb3a2bef

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap9226.exe
                Filesize

                352KB

                MD5

                00c48aac3beab16138cacb80bc1146a2

                SHA1

                9686b9b0fd3c4e4b2e08b6c4696be83d16e3d0b4

                SHA256

                ac0137273b561d30a59bd9aa052976bbe6e4ef6ce5f43eacfa31188a73b4ab48

                SHA512

                59a3971650327bc330263abdd0cca5c4832c860587112e0ab555b37f72958106fbe0a2b3d90e1f8678f4018cb055eab5081293370d11c1310b1a70c9a08fc450

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap9226.exe
                Filesize

                352KB

                MD5

                00c48aac3beab16138cacb80bc1146a2

                SHA1

                9686b9b0fd3c4e4b2e08b6c4696be83d16e3d0b4

                SHA256

                ac0137273b561d30a59bd9aa052976bbe6e4ef6ce5f43eacfa31188a73b4ab48

                SHA512

                59a3971650327bc330263abdd0cca5c4832c860587112e0ab555b37f72958106fbe0a2b3d90e1f8678f4018cb055eab5081293370d11c1310b1a70c9a08fc450

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3655.exe
                Filesize

                11KB

                MD5

                a4d34446cfdf12793374ccb7ba0da56f

                SHA1

                197dedbeab753c93fb0efd1bf52d7516ec465f06

                SHA256

                015f7b41c79d9f6ab7e5670f55defaaba2a4e8ba56992538856e00e611850b8d

                SHA512

                bfa6d6a60933a90d2603b0e76c5809644c353b09ae6f72f69d5c3780f2c110237ed72b8bb77f2ca606b1c6c0b6db66e15ff54836a60f13140f597bcb78f03fe6

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3655.exe
                Filesize

                11KB

                MD5

                a4d34446cfdf12793374ccb7ba0da56f

                SHA1

                197dedbeab753c93fb0efd1bf52d7516ec465f06

                SHA256

                015f7b41c79d9f6ab7e5670f55defaaba2a4e8ba56992538856e00e611850b8d

                SHA512

                bfa6d6a60933a90d2603b0e76c5809644c353b09ae6f72f69d5c3780f2c110237ed72b8bb77f2ca606b1c6c0b6db66e15ff54836a60f13140f597bcb78f03fe6

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4949Ns.exe
                Filesize

                325KB

                MD5

                0b858719fc72ffad733b1c086365019c

                SHA1

                14bf0ec2edf9a80ed33e2a8f1f19c77cce59ec5e

                SHA256

                90ff42e713d37b73cb76f282214515124f9e12af3939715703878bc287c1bfa1

                SHA512

                f09a60bdb5e977041e2f5880a3b370b03342435da098e1428091a0294605c5b1615fc3c0ec4bb563cb7ede453a5dec02cf1328ab2a01e011a3969b0eab4940a7

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4949Ns.exe
                Filesize

                325KB

                MD5

                0b858719fc72ffad733b1c086365019c

                SHA1

                14bf0ec2edf9a80ed33e2a8f1f19c77cce59ec5e

                SHA256

                90ff42e713d37b73cb76f282214515124f9e12af3939715703878bc287c1bfa1

                SHA512

                f09a60bdb5e977041e2f5880a3b370b03342435da098e1428091a0294605c5b1615fc3c0ec4bb563cb7ede453a5dec02cf1328ab2a01e011a3969b0eab4940a7

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                Filesize

                235KB

                MD5

                39222b109303d0d0e20d9481f3f05218

                SHA1

                687c61adf5a360116436122de63b4c88a02753eb

                SHA256

                9fd32a25f73498ccb9a521b293c73dfba6f923354b5ebb82240f10cb7a94abcc

                SHA512

                05cbd68918ea6737a4bf119b2eaaa87795bcea9cf77a46a1342d57cf0ca294a65c9ee48efe2767a92e68b3a18dd4e14dd67fbb830b2ca4c1fc0893628ca282ac

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                Filesize

                235KB

                MD5

                39222b109303d0d0e20d9481f3f05218

                SHA1

                687c61adf5a360116436122de63b4c88a02753eb

                SHA256

                9fd32a25f73498ccb9a521b293c73dfba6f923354b5ebb82240f10cb7a94abcc

                SHA512

                05cbd68918ea6737a4bf119b2eaaa87795bcea9cf77a46a1342d57cf0ca294a65c9ee48efe2767a92e68b3a18dd4e14dd67fbb830b2ca4c1fc0893628ca282ac

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                Filesize

                235KB

                MD5

                39222b109303d0d0e20d9481f3f05218

                SHA1

                687c61adf5a360116436122de63b4c88a02753eb

                SHA256

                9fd32a25f73498ccb9a521b293c73dfba6f923354b5ebb82240f10cb7a94abcc

                SHA512

                05cbd68918ea6737a4bf119b2eaaa87795bcea9cf77a46a1342d57cf0ca294a65c9ee48efe2767a92e68b3a18dd4e14dd67fbb830b2ca4c1fc0893628ca282ac

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                Filesize

                235KB

                MD5

                39222b109303d0d0e20d9481f3f05218

                SHA1

                687c61adf5a360116436122de63b4c88a02753eb

                SHA256

                9fd32a25f73498ccb9a521b293c73dfba6f923354b5ebb82240f10cb7a94abcc

                SHA512

                05cbd68918ea6737a4bf119b2eaaa87795bcea9cf77a46a1342d57cf0ca294a65c9ee48efe2767a92e68b3a18dd4e14dd67fbb830b2ca4c1fc0893628ca282ac

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                Filesize

                223B

                MD5

                94cbeec5d4343918fd0e48760e40539c

                SHA1

                a049266c5c1131f692f306c8710d7e72586ae79d

                SHA256

                48eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279

                SHA512

                4e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0

              • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • memory/988-146-0x00000000004D0000-0x00000000004DA000-memory.dmp
                Filesize

                40KB

              • memory/1284-1111-0x0000000007B10000-0x0000000007B5B000-memory.dmp
                Filesize

                300KB

              • memory/1284-210-0x0000000004B90000-0x0000000004BCF000-memory.dmp
                Filesize

                252KB

              • memory/1284-1120-0x0000000009420000-0x0000000009470000-memory.dmp
                Filesize

                320KB

              • memory/1284-1119-0x0000000009390000-0x0000000009406000-memory.dmp
                Filesize

                472KB

              • memory/1284-1118-0x0000000008C30000-0x000000000915C000-memory.dmp
                Filesize

                5.2MB

              • memory/1284-1117-0x0000000008A50000-0x0000000008C12000-memory.dmp
                Filesize

                1.8MB

              • memory/1284-1116-0x0000000007D40000-0x0000000007DA6000-memory.dmp
                Filesize

                408KB

              • memory/1284-1115-0x0000000007CA0000-0x0000000007D32000-memory.dmp
                Filesize

                584KB

              • memory/1284-1114-0x0000000007390000-0x00000000073A0000-memory.dmp
                Filesize

                64KB

              • memory/1284-1113-0x0000000007390000-0x00000000073A0000-memory.dmp
                Filesize

                64KB

              • memory/1284-1110-0x00000000079D0000-0x0000000007A0E000-memory.dmp
                Filesize

                248KB

              • memory/1284-1109-0x00000000079B0000-0x00000000079C2000-memory.dmp
                Filesize

                72KB

              • memory/1284-1108-0x00000000078A0000-0x00000000079AA000-memory.dmp
                Filesize

                1.0MB

              • memory/1284-1107-0x0000000007EB0000-0x00000000084B6000-memory.dmp
                Filesize

                6.0MB

              • memory/1284-199-0x0000000004B90000-0x0000000004BCF000-memory.dmp
                Filesize

                252KB

              • memory/1284-197-0x0000000002EB0000-0x0000000002EF6000-memory.dmp
                Filesize

                280KB

              • memory/1284-198-0x0000000004B90000-0x0000000004BD4000-memory.dmp
                Filesize

                272KB

              • memory/1284-202-0x0000000004B90000-0x0000000004BCF000-memory.dmp
                Filesize

                252KB

              • memory/1284-205-0x0000000002CB0000-0x0000000002CFB000-memory.dmp
                Filesize

                300KB

              • memory/1284-207-0x0000000004B90000-0x0000000004BCF000-memory.dmp
                Filesize

                252KB

              • memory/1284-204-0x0000000004B90000-0x0000000004BCF000-memory.dmp
                Filesize

                252KB

              • memory/1284-212-0x0000000004B90000-0x0000000004BCF000-memory.dmp
                Filesize

                252KB

              • memory/1284-216-0x0000000004B90000-0x0000000004BCF000-memory.dmp
                Filesize

                252KB

              • memory/1284-222-0x0000000004B90000-0x0000000004BCF000-memory.dmp
                Filesize

                252KB

              • memory/1284-226-0x0000000004B90000-0x0000000004BCF000-memory.dmp
                Filesize

                252KB

              • memory/1284-224-0x0000000004B90000-0x0000000004BCF000-memory.dmp
                Filesize

                252KB

              • memory/1284-234-0x0000000004B90000-0x0000000004BCF000-memory.dmp
                Filesize

                252KB

              • memory/1284-232-0x0000000004B90000-0x0000000004BCF000-memory.dmp
                Filesize

                252KB

              • memory/1284-230-0x0000000004B90000-0x0000000004BCF000-memory.dmp
                Filesize

                252KB

              • memory/1284-228-0x0000000004B90000-0x0000000004BCF000-memory.dmp
                Filesize

                252KB

              • memory/1284-220-0x0000000004B90000-0x0000000004BCF000-memory.dmp
                Filesize

                252KB

              • memory/1284-218-0x0000000004B90000-0x0000000004BCF000-memory.dmp
                Filesize

                252KB

              • memory/1284-214-0x0000000004B90000-0x0000000004BCF000-memory.dmp
                Filesize

                252KB

              • memory/1284-200-0x0000000004B90000-0x0000000004BCF000-memory.dmp
                Filesize

                252KB

              • memory/1284-208-0x0000000007390000-0x00000000073A0000-memory.dmp
                Filesize

                64KB

              • memory/4172-1126-0x00000000002C0000-0x00000000002F2000-memory.dmp
                Filesize

                200KB

              • memory/4172-1128-0x0000000004AF0000-0x0000000004B00000-memory.dmp
                Filesize

                64KB

              • memory/4172-1127-0x0000000004D00000-0x0000000004D4B000-memory.dmp
                Filesize

                300KB

              • memory/4816-176-0x00000000075C0000-0x00000000075D2000-memory.dmp
                Filesize

                72KB

              • memory/4816-164-0x00000000075C0000-0x00000000075D2000-memory.dmp
                Filesize

                72KB

              • memory/4816-189-0x0000000000400000-0x0000000002B7E000-memory.dmp
                Filesize

                39.5MB

              • memory/4816-168-0x00000000075C0000-0x00000000075D2000-memory.dmp
                Filesize

                72KB

              • memory/4816-190-0x0000000002D90000-0x0000000002DA0000-memory.dmp
                Filesize

                64KB

              • memory/4816-187-0x0000000000400000-0x0000000002B7E000-memory.dmp
                Filesize

                39.5MB

              • memory/4816-186-0x00000000075C0000-0x00000000075D2000-memory.dmp
                Filesize

                72KB

              • memory/4816-184-0x00000000075C0000-0x00000000075D2000-memory.dmp
                Filesize

                72KB

              • memory/4816-182-0x00000000075C0000-0x00000000075D2000-memory.dmp
                Filesize

                72KB

              • memory/4816-180-0x00000000075C0000-0x00000000075D2000-memory.dmp
                Filesize

                72KB

              • memory/4816-178-0x00000000075C0000-0x00000000075D2000-memory.dmp
                Filesize

                72KB

              • memory/4816-174-0x00000000075C0000-0x00000000075D2000-memory.dmp
                Filesize

                72KB

              • memory/4816-166-0x00000000075C0000-0x00000000075D2000-memory.dmp
                Filesize

                72KB

              • memory/4816-191-0x0000000002D90000-0x0000000002DA0000-memory.dmp
                Filesize

                64KB

              • memory/4816-192-0x0000000002D90000-0x0000000002DA0000-memory.dmp
                Filesize

                64KB

              • memory/4816-172-0x00000000075C0000-0x00000000075D2000-memory.dmp
                Filesize

                72KB

              • memory/4816-170-0x00000000075C0000-0x00000000075D2000-memory.dmp
                Filesize

                72KB

              • memory/4816-162-0x00000000075C0000-0x00000000075D2000-memory.dmp
                Filesize

                72KB

              • memory/4816-160-0x00000000075C0000-0x00000000075D2000-memory.dmp
                Filesize

                72KB

              • memory/4816-159-0x00000000075C0000-0x00000000075D2000-memory.dmp
                Filesize

                72KB

              • memory/4816-158-0x0000000002D90000-0x0000000002DA0000-memory.dmp
                Filesize

                64KB

              • memory/4816-157-0x0000000002D90000-0x0000000002DA0000-memory.dmp
                Filesize

                64KB

              • memory/4816-156-0x0000000002D90000-0x0000000002DA0000-memory.dmp
                Filesize

                64KB

              • memory/4816-155-0x00000000075C0000-0x00000000075D8000-memory.dmp
                Filesize

                96KB

              • memory/4816-154-0x0000000007080000-0x000000000757E000-memory.dmp
                Filesize

                5.0MB

              • memory/4816-153-0x0000000002DC0000-0x0000000002DDA000-memory.dmp
                Filesize

                104KB

              • memory/4816-152-0x00000000001D0000-0x00000000001FD000-memory.dmp
                Filesize

                180KB