Analysis

  • max time kernel
    120s
  • max time network
    109s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26/03/2023, 18:45

General

  • Target

    60ef3d49ff02e5868ef03f8239fc27b2ab317b3c472eada4a15912d014f13089.exe

  • Size

    1.0MB

  • MD5

    b64f3bf40592b14eee5396d542399ab9

  • SHA1

    a751455ea5967f23b07dd64d4a3aa8c24f48c026

  • SHA256

    60ef3d49ff02e5868ef03f8239fc27b2ab317b3c472eada4a15912d014f13089

  • SHA512

    fa17ffa5ad9070656db9485a73757279dff98e2b90d5b64fbafceb410a9828958a5e3549fc49d7e5cca025a6190677191f38caf4ab99965be37c13f6f3df2995

  • SSDEEP

    24576:dymvmXfNfXaKO4kj8o90J60e1Gvzf7wXLz25O:4myCUkYYGLfE

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

fort

C2

193.233.20.33:4125

Attributes
  • auth_value

    5ea5673154a804d8c80f565f7276f720

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60ef3d49ff02e5868ef03f8239fc27b2ab317b3c472eada4a15912d014f13089.exe
    "C:\Users\Admin\AppData\Local\Temp\60ef3d49ff02e5868ef03f8239fc27b2ab317b3c472eada4a15912d014f13089.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3184
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5686.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5686.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap0530.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap0530.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3348
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap1972.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap1972.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4128
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3766.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3766.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1500
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1944RS.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1944RS.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4388
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w06dl47.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w06dl47.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xHgZd98.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xHgZd98.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:508
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y95xX07.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y95xX07.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3420
      • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
        "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:960
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3944
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4424
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:5080
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "legenda.exe" /P "Admin:N"
              5⤵
                PID:4340
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "legenda.exe" /P "Admin:R" /E
                5⤵
                  PID:5008
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4312
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\f22b669919" /P "Admin:N"
                    5⤵
                      PID:4984
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\f22b669919" /P "Admin:R" /E
                      5⤵
                        PID:5032
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:3312
              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                1⤵
                • Executes dropped EXE
                PID:5060
              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                1⤵
                • Executes dropped EXE
                PID:4012

              Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y95xX07.exe

                      Filesize

                      236KB

                      MD5

                      500240b39acb30e5782b302fb1e5ed22

                      SHA1

                      7829d20519c6dc8c603fab4e66274ecb99e19691

                      SHA256

                      1900b92101482c452d419673813392d9621fbbab483198e8077143e03396c903

                      SHA512

                      cf5d47772174e92cd6db826a0381674c581bff6d77b7a48921eff5a12e72d3d3e4882ac3385e6d7a298eba6b2bb4a804ea4e1d713d22dd83590e1259f6630f25

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y95xX07.exe

                      Filesize

                      236KB

                      MD5

                      500240b39acb30e5782b302fb1e5ed22

                      SHA1

                      7829d20519c6dc8c603fab4e66274ecb99e19691

                      SHA256

                      1900b92101482c452d419673813392d9621fbbab483198e8077143e03396c903

                      SHA512

                      cf5d47772174e92cd6db826a0381674c581bff6d77b7a48921eff5a12e72d3d3e4882ac3385e6d7a298eba6b2bb4a804ea4e1d713d22dd83590e1259f6630f25

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5686.exe

                      Filesize

                      854KB

                      MD5

                      4a99c3a366a03e0b4692f9831bbda75d

                      SHA1

                      cec50736c5f38f01a98be32f547765f1923a6412

                      SHA256

                      9ae6f58b3e9e302972e8343a2383a975eea97f041377914a7eaae6f941d3f821

                      SHA512

                      997db7f7d47ce01ff1a84000c03dd4c833785f0a5499355b5cad621d52139701d7aa4ec684632dd88e65692b248dacb95656cfbf3d2d53a7023c51a7d5800149

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5686.exe

                      Filesize

                      854KB

                      MD5

                      4a99c3a366a03e0b4692f9831bbda75d

                      SHA1

                      cec50736c5f38f01a98be32f547765f1923a6412

                      SHA256

                      9ae6f58b3e9e302972e8343a2383a975eea97f041377914a7eaae6f941d3f821

                      SHA512

                      997db7f7d47ce01ff1a84000c03dd4c833785f0a5499355b5cad621d52139701d7aa4ec684632dd88e65692b248dacb95656cfbf3d2d53a7023c51a7d5800149

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xHgZd98.exe

                      Filesize

                      175KB

                      MD5

                      611009c69ff935caae0bcdfec7217967

                      SHA1

                      6b1fb2b029bdf42b357fc6551b4262168da364b1

                      SHA256

                      1ee259e4d5488d2f5329e1a1a751c096dd106daf96b60f6a87b1c5337b131228

                      SHA512

                      dd0056ddae348822f948ad6561543d6a7f90144993842658bf1fe98c644d291b7d700cebae2704745f5c97c1dc998cfd476b2079de27858f8a6175411f884fe7

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xHgZd98.exe

                      Filesize

                      175KB

                      MD5

                      611009c69ff935caae0bcdfec7217967

                      SHA1

                      6b1fb2b029bdf42b357fc6551b4262168da364b1

                      SHA256

                      1ee259e4d5488d2f5329e1a1a751c096dd106daf96b60f6a87b1c5337b131228

                      SHA512

                      dd0056ddae348822f948ad6561543d6a7f90144993842658bf1fe98c644d291b7d700cebae2704745f5c97c1dc998cfd476b2079de27858f8a6175411f884fe7

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap0530.exe

                      Filesize

                      711KB

                      MD5

                      0218d935f6799445f81e699919bd970e

                      SHA1

                      eb24bbc304dce2f7781c42876f00cff860299f97

                      SHA256

                      bc1889b1b776d4a7dbf77673bb79226253237fae5edfc7f23baad1681f4bbf63

                      SHA512

                      6323724cf5dd21527b7efd9891fa92ba2c203f886a40b64803fce1550422eeaceceadc2f406352e65e935827e09d253e24c942013b3bcdbe9f6a2b33aa54bcc3

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap0530.exe

                      Filesize

                      711KB

                      MD5

                      0218d935f6799445f81e699919bd970e

                      SHA1

                      eb24bbc304dce2f7781c42876f00cff860299f97

                      SHA256

                      bc1889b1b776d4a7dbf77673bb79226253237fae5edfc7f23baad1681f4bbf63

                      SHA512

                      6323724cf5dd21527b7efd9891fa92ba2c203f886a40b64803fce1550422eeaceceadc2f406352e65e935827e09d253e24c942013b3bcdbe9f6a2b33aa54bcc3

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w06dl47.exe

                      Filesize

                      384KB

                      MD5

                      6241958cbab0d088d53382a8764826e9

                      SHA1

                      ef4571a74723d00ed4e032c97a8fc3bfd6d8052d

                      SHA256

                      9f37939610c8d2d8f888a0be374538f100ab174601d37bf81a688fcdcc5462d2

                      SHA512

                      4c33f7bbddbbd9ee6c06ca1bd9c06951a66df07d6b376b1f409e19a7f7c6719b69be51609ce2add5b59e04ee6faf7ce613dde1215c5063a78d82cac053e43b9a

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w06dl47.exe

                      Filesize

                      384KB

                      MD5

                      6241958cbab0d088d53382a8764826e9

                      SHA1

                      ef4571a74723d00ed4e032c97a8fc3bfd6d8052d

                      SHA256

                      9f37939610c8d2d8f888a0be374538f100ab174601d37bf81a688fcdcc5462d2

                      SHA512

                      4c33f7bbddbbd9ee6c06ca1bd9c06951a66df07d6b376b1f409e19a7f7c6719b69be51609ce2add5b59e04ee6faf7ce613dde1215c5063a78d82cac053e43b9a

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap1972.exe

                      Filesize

                      352KB

                      MD5

                      2ba045e3f83e270dd452bb3637dd3c66

                      SHA1

                      ebdb26c21df1ab10434f6064ca11df7f6d6d3907

                      SHA256

                      2affe3f0d127980dd9de6e6d0fa641939540019af2e4def6827a205aa586297d

                      SHA512

                      1ed6d6d8a1f2b2efcf602cf2d250f16c125be21dd9ede00faff060210393c8f70764bdc00fdd524d56e3a45307adff94019612576b2069b344410cd8667c0357

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap1972.exe

                      Filesize

                      352KB

                      MD5

                      2ba045e3f83e270dd452bb3637dd3c66

                      SHA1

                      ebdb26c21df1ab10434f6064ca11df7f6d6d3907

                      SHA256

                      2affe3f0d127980dd9de6e6d0fa641939540019af2e4def6827a205aa586297d

                      SHA512

                      1ed6d6d8a1f2b2efcf602cf2d250f16c125be21dd9ede00faff060210393c8f70764bdc00fdd524d56e3a45307adff94019612576b2069b344410cd8667c0357

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3766.exe

                      Filesize

                      11KB

                      MD5

                      e49eca0681185f15c25b546ad6237a1e

                      SHA1

                      4998a405c701830015cd3ecafc2aebd082035d2c

                      SHA256

                      b5105ce5e3dfd2e74deb064f812f11b03b5911a833816a0a609316698be01a72

                      SHA512

                      79c028e86f8334196ab2cc7a40bb82a1bcdf4b0d3359589db77f6158dd5ff0680d00e4405c468343e8eed8258f1088e8e769262bedfef6748db9eca07feb263a

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3766.exe

                      Filesize

                      11KB

                      MD5

                      e49eca0681185f15c25b546ad6237a1e

                      SHA1

                      4998a405c701830015cd3ecafc2aebd082035d2c

                      SHA256

                      b5105ce5e3dfd2e74deb064f812f11b03b5911a833816a0a609316698be01a72

                      SHA512

                      79c028e86f8334196ab2cc7a40bb82a1bcdf4b0d3359589db77f6158dd5ff0680d00e4405c468343e8eed8258f1088e8e769262bedfef6748db9eca07feb263a

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1944RS.exe

                      Filesize

                      325KB

                      MD5

                      2f33d42a36b284e37dc79b714f01644d

                      SHA1

                      5e132f52f3a2c54edef3c36742b05de88bbde761

                      SHA256

                      5b778d65f9db5b4279d9491d9d50d857aea096bfab02a8b5a041322fb7b4f554

                      SHA512

                      ac73d8a950a8892a8350d015821fd5a91b4e1d78bcbf633df50d214c48779ae0c247df2fa18760efc10c7d118484ecac42d1736a7353a4373d845124de296da7

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1944RS.exe

                      Filesize

                      325KB

                      MD5

                      2f33d42a36b284e37dc79b714f01644d

                      SHA1

                      5e132f52f3a2c54edef3c36742b05de88bbde761

                      SHA256

                      5b778d65f9db5b4279d9491d9d50d857aea096bfab02a8b5a041322fb7b4f554

                      SHA512

                      ac73d8a950a8892a8350d015821fd5a91b4e1d78bcbf633df50d214c48779ae0c247df2fa18760efc10c7d118484ecac42d1736a7353a4373d845124de296da7

                    • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                      Filesize

                      236KB

                      MD5

                      500240b39acb30e5782b302fb1e5ed22

                      SHA1

                      7829d20519c6dc8c603fab4e66274ecb99e19691

                      SHA256

                      1900b92101482c452d419673813392d9621fbbab483198e8077143e03396c903

                      SHA512

                      cf5d47772174e92cd6db826a0381674c581bff6d77b7a48921eff5a12e72d3d3e4882ac3385e6d7a298eba6b2bb4a804ea4e1d713d22dd83590e1259f6630f25

                    • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                      Filesize

                      236KB

                      MD5

                      500240b39acb30e5782b302fb1e5ed22

                      SHA1

                      7829d20519c6dc8c603fab4e66274ecb99e19691

                      SHA256

                      1900b92101482c452d419673813392d9621fbbab483198e8077143e03396c903

                      SHA512

                      cf5d47772174e92cd6db826a0381674c581bff6d77b7a48921eff5a12e72d3d3e4882ac3385e6d7a298eba6b2bb4a804ea4e1d713d22dd83590e1259f6630f25

                    • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                      Filesize

                      236KB

                      MD5

                      500240b39acb30e5782b302fb1e5ed22

                      SHA1

                      7829d20519c6dc8c603fab4e66274ecb99e19691

                      SHA256

                      1900b92101482c452d419673813392d9621fbbab483198e8077143e03396c903

                      SHA512

                      cf5d47772174e92cd6db826a0381674c581bff6d77b7a48921eff5a12e72d3d3e4882ac3385e6d7a298eba6b2bb4a804ea4e1d713d22dd83590e1259f6630f25

                    • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                      Filesize

                      236KB

                      MD5

                      500240b39acb30e5782b302fb1e5ed22

                      SHA1

                      7829d20519c6dc8c603fab4e66274ecb99e19691

                      SHA256

                      1900b92101482c452d419673813392d9621fbbab483198e8077143e03396c903

                      SHA512

                      cf5d47772174e92cd6db826a0381674c581bff6d77b7a48921eff5a12e72d3d3e4882ac3385e6d7a298eba6b2bb4a804ea4e1d713d22dd83590e1259f6630f25

                    • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                      Filesize

                      236KB

                      MD5

                      500240b39acb30e5782b302fb1e5ed22

                      SHA1

                      7829d20519c6dc8c603fab4e66274ecb99e19691

                      SHA256

                      1900b92101482c452d419673813392d9621fbbab483198e8077143e03396c903

                      SHA512

                      cf5d47772174e92cd6db826a0381674c581bff6d77b7a48921eff5a12e72d3d3e4882ac3385e6d7a298eba6b2bb4a804ea4e1d713d22dd83590e1259f6630f25

                    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                      Filesize

                      89KB

                      MD5

                      16cf28ebb6d37dbaba93f18320c6086e

                      SHA1

                      eae7d4b7a9636329065877aabe8d4f721a26ab25

                      SHA256

                      c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                      SHA512

                      f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

                    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                      Filesize

                      89KB

                      MD5

                      16cf28ebb6d37dbaba93f18320c6086e

                      SHA1

                      eae7d4b7a9636329065877aabe8d4f721a26ab25

                      SHA256

                      c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                      SHA512

                      f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

                    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                      Filesize

                      223B

                      MD5

                      94cbeec5d4343918fd0e48760e40539c

                      SHA1

                      a049266c5c1131f692f306c8710d7e72586ae79d

                      SHA256

                      48eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279

                      SHA512

                      4e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0

                    • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                      Filesize

                      89KB

                      MD5

                      16cf28ebb6d37dbaba93f18320c6086e

                      SHA1

                      eae7d4b7a9636329065877aabe8d4f721a26ab25

                      SHA256

                      c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                      SHA512

                      f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

                    • memory/508-1132-0x0000000000E90000-0x0000000000EC2000-memory.dmp

                      Filesize

                      200KB

                    • memory/508-1133-0x00000000058D0000-0x000000000591B000-memory.dmp

                      Filesize

                      300KB

                    • memory/508-1134-0x00000000056D0000-0x00000000056E0000-memory.dmp

                      Filesize

                      64KB

                    • memory/1120-1118-0x0000000003000000-0x0000000003010000-memory.dmp

                      Filesize

                      64KB

                    • memory/1120-237-0x0000000004D00000-0x0000000004D3E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1120-1126-0x0000000009420000-0x0000000009470000-memory.dmp

                      Filesize

                      320KB

                    • memory/1120-1125-0x0000000009390000-0x0000000009406000-memory.dmp

                      Filesize

                      472KB

                    • memory/1120-1124-0x0000000003000000-0x0000000003010000-memory.dmp

                      Filesize

                      64KB

                    • memory/1120-1123-0x0000000008AF0000-0x000000000901C000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/1120-1122-0x0000000008920000-0x0000000008AE2000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/1120-1121-0x0000000007C00000-0x0000000007C66000-memory.dmp

                      Filesize

                      408KB

                    • memory/1120-1120-0x0000000007B60000-0x0000000007BF2000-memory.dmp

                      Filesize

                      584KB

                    • memory/1120-1119-0x0000000003000000-0x0000000003010000-memory.dmp

                      Filesize

                      64KB

                    • memory/1120-198-0x0000000004810000-0x0000000004856000-memory.dmp

                      Filesize

                      280KB

                    • memory/1120-199-0x0000000004D00000-0x0000000004D44000-memory.dmp

                      Filesize

                      272KB

                    • memory/1120-200-0x0000000004D00000-0x0000000004D3E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1120-203-0x0000000004D00000-0x0000000004D3E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1120-201-0x0000000004D00000-0x0000000004D3E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1120-205-0x0000000004D00000-0x0000000004D3E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1120-207-0x0000000004D00000-0x0000000004D3E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1120-209-0x0000000004D00000-0x0000000004D3E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1120-211-0x0000000004D00000-0x0000000004D3E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1120-213-0x0000000004D00000-0x0000000004D3E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1120-215-0x0000000004D00000-0x0000000004D3E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1120-218-0x0000000002B90000-0x0000000002BDB000-memory.dmp

                      Filesize

                      300KB

                    • memory/1120-217-0x0000000004D00000-0x0000000004D3E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1120-220-0x0000000003000000-0x0000000003010000-memory.dmp

                      Filesize

                      64KB

                    • memory/1120-222-0x0000000004D00000-0x0000000004D3E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1120-225-0x0000000004D00000-0x0000000004D3E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1120-223-0x0000000003000000-0x0000000003010000-memory.dmp

                      Filesize

                      64KB

                    • memory/1120-221-0x0000000003000000-0x0000000003010000-memory.dmp

                      Filesize

                      64KB

                    • memory/1120-227-0x0000000004D00000-0x0000000004D3E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1120-229-0x0000000004D00000-0x0000000004D3E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1120-231-0x0000000004D00000-0x0000000004D3E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1120-233-0x0000000004D00000-0x0000000004D3E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1120-235-0x0000000004D00000-0x0000000004D3E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1120-1117-0x0000000003000000-0x0000000003010000-memory.dmp

                      Filesize

                      64KB

                    • memory/1120-1110-0x0000000007D30000-0x0000000008336000-memory.dmp

                      Filesize

                      6.0MB

                    • memory/1120-1111-0x0000000007720000-0x000000000782A000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/1120-1112-0x0000000007860000-0x0000000007872000-memory.dmp

                      Filesize

                      72KB

                    • memory/1120-1113-0x0000000007880000-0x00000000078BE000-memory.dmp

                      Filesize

                      248KB

                    • memory/1120-1114-0x0000000003000000-0x0000000003010000-memory.dmp

                      Filesize

                      64KB

                    • memory/1120-1115-0x00000000079D0000-0x0000000007A1B000-memory.dmp

                      Filesize

                      300KB

                    • memory/1500-149-0x0000000000F20000-0x0000000000F2A000-memory.dmp

                      Filesize

                      40KB

                    • memory/4388-173-0x0000000004960000-0x0000000004972000-memory.dmp

                      Filesize

                      72KB

                    • memory/4388-157-0x00000000071E0000-0x00000000071F0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4388-183-0x0000000004960000-0x0000000004972000-memory.dmp

                      Filesize

                      72KB

                    • memory/4388-193-0x00000000071E0000-0x00000000071F0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4388-192-0x0000000000400000-0x0000000002B7F000-memory.dmp

                      Filesize

                      39.5MB

                    • memory/4388-190-0x0000000000400000-0x0000000002B7F000-memory.dmp

                      Filesize

                      39.5MB

                    • memory/4388-189-0x00000000071E0000-0x00000000071F0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4388-188-0x00000000071E0000-0x00000000071F0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4388-187-0x0000000004960000-0x0000000004972000-memory.dmp

                      Filesize

                      72KB

                    • memory/4388-177-0x0000000004960000-0x0000000004972000-memory.dmp

                      Filesize

                      72KB

                    • memory/4388-175-0x0000000004960000-0x0000000004972000-memory.dmp

                      Filesize

                      72KB

                    • memory/4388-185-0x0000000004960000-0x0000000004972000-memory.dmp

                      Filesize

                      72KB

                    • memory/4388-181-0x0000000004960000-0x0000000004972000-memory.dmp

                      Filesize

                      72KB

                    • memory/4388-167-0x0000000004960000-0x0000000004972000-memory.dmp

                      Filesize

                      72KB

                    • memory/4388-171-0x0000000004960000-0x0000000004972000-memory.dmp

                      Filesize

                      72KB

                    • memory/4388-165-0x0000000004960000-0x0000000004972000-memory.dmp

                      Filesize

                      72KB

                    • memory/4388-163-0x0000000004960000-0x0000000004972000-memory.dmp

                      Filesize

                      72KB

                    • memory/4388-161-0x0000000004960000-0x0000000004972000-memory.dmp

                      Filesize

                      72KB

                    • memory/4388-160-0x0000000004960000-0x0000000004972000-memory.dmp

                      Filesize

                      72KB

                    • memory/4388-159-0x0000000004960000-0x0000000004978000-memory.dmp

                      Filesize

                      96KB

                    • memory/4388-158-0x00000000071F0000-0x00000000076EE000-memory.dmp

                      Filesize

                      5.0MB

                    • memory/4388-169-0x0000000004960000-0x0000000004972000-memory.dmp

                      Filesize

                      72KB

                    • memory/4388-156-0x00000000001D0000-0x00000000001FD000-memory.dmp

                      Filesize

                      180KB

                    • memory/4388-155-0x0000000004940000-0x000000000495A000-memory.dmp

                      Filesize

                      104KB

                    • memory/4388-179-0x0000000004960000-0x0000000004972000-memory.dmp

                      Filesize

                      72KB