Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 02:46

General

  • Target

    81c5039c3ca3f2e074775f7472d38f0c.exe

  • Size

    1.0MB

  • MD5

    81c5039c3ca3f2e074775f7472d38f0c

  • SHA1

    a43ff8435a22f2deeaa8cfdc3c9ab504900b2a65

  • SHA256

    d68d2c2c9fcac54a31eb59bad72fc8d7c48d5bcdb39b17cec886e018936165b7

  • SHA512

    f00a07435214133024c7d6c919868e5043a0e00f6de85b465e36576b55ff4f26fba24abdc6218bea005787e27502826e8644649b0b6bd795cb939c80eb4c0c0c

  • SSDEEP

    24576:Cy4u2oy31+nhZacOFa9eJrzhMWI6wnOW3hr/SY9Qbm//JqNd:pJ2oU1+6a9eJrNJxuOW3tSY2bC/J8

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

fort

C2

193.233.20.33:4125

Attributes
  • auth_value

    5ea5673154a804d8c80f565f7276f720

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81c5039c3ca3f2e074775f7472d38f0c.exe
    "C:\Users\Admin\AppData\Local\Temp\81c5039c3ca3f2e074775f7472d38f0c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap2904.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap2904.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3188
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap8609.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap8609.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3656
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap6707.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap6707.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3696
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3249.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3249.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1292
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0735kw.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0735kw.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:232
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w02sC13.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w02sC13.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3808
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xavUh44.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xavUh44.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3512
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y58iR37.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y58iR37.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
        "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3744
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:948
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4864
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:2736
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "legenda.exe" /P "Admin:N"
              5⤵
                PID:892
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "legenda.exe" /P "Admin:R" /E
                5⤵
                  PID:3812
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4508
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\f22b669919" /P "Admin:N"
                    5⤵
                      PID:2480
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\f22b669919" /P "Admin:R" /E
                      5⤵
                        PID:980
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:4472
              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                1⤵
                • Executes dropped EXE
                PID:3284

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Defense Evasion

              Modify Registry

              3
              T1112

              Disabling Security Tools

              2
              T1089

              Credential Access

              Credentials in Files

              2
              T1081

              Discovery

              Query Registry

              2
              T1012

              System Information Discovery

              2
              T1082

              Collection

              Data from Local System

              2
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y58iR37.exe
                Filesize

                236KB

                MD5

                01c1ecc328e84ba3fb93210cb4e474c2

                SHA1

                9e0dce3df59186f80c6a48e9b0bf1e1cd1bbd03d

                SHA256

                b4871a0034167b5e7f2b3ca80a6203f382fb80e668d4d07bbecdb142729b4047

                SHA512

                5dbf973ffae586c2187f5bbe107918c8b8128fc9d6b3935037f53e1027522463a6f07936be9b24d881966dfb961a602ae5f470e354bc8ab8ba1ae7ffebd12ce3

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y58iR37.exe
                Filesize

                236KB

                MD5

                01c1ecc328e84ba3fb93210cb4e474c2

                SHA1

                9e0dce3df59186f80c6a48e9b0bf1e1cd1bbd03d

                SHA256

                b4871a0034167b5e7f2b3ca80a6203f382fb80e668d4d07bbecdb142729b4047

                SHA512

                5dbf973ffae586c2187f5bbe107918c8b8128fc9d6b3935037f53e1027522463a6f07936be9b24d881966dfb961a602ae5f470e354bc8ab8ba1ae7ffebd12ce3

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap2904.exe
                Filesize

                847KB

                MD5

                aad12f7de2e227738f81c1c7361340ef

                SHA1

                8a2cfdfbb084c1678270e5c784831734d4ff45ae

                SHA256

                b41fe34a114b66f9ede9cfb5783deafcb904632ef8df2e79896285ef1876402c

                SHA512

                0a4d1eb0fb6057e67d3d2265182f2992a6af56c4e682d50b39ebc7682fba296dcf6d999b7ced3ec0516a4b82e5b9d77d7b2cf8aedf74f6b6f41f7bbc9b785ced

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap2904.exe
                Filesize

                847KB

                MD5

                aad12f7de2e227738f81c1c7361340ef

                SHA1

                8a2cfdfbb084c1678270e5c784831734d4ff45ae

                SHA256

                b41fe34a114b66f9ede9cfb5783deafcb904632ef8df2e79896285ef1876402c

                SHA512

                0a4d1eb0fb6057e67d3d2265182f2992a6af56c4e682d50b39ebc7682fba296dcf6d999b7ced3ec0516a4b82e5b9d77d7b2cf8aedf74f6b6f41f7bbc9b785ced

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xavUh44.exe
                Filesize

                175KB

                MD5

                27f20a7454f0cbd0bc19a77c534a09b2

                SHA1

                cbdc601293273c71421e0db4a482ed990f61c4a1

                SHA256

                38b0de83e47a859400cef0d3039ed220b8b56de66107e906e21e606dfe0daee9

                SHA512

                dd943783c99e0250b2f1f80452d7aecf2df1223ff6d09ac749694af9e026cad020ba62e39316e309e4bcebd58e130a3ab891089bd679bc5a806bdb1d416f2885

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xavUh44.exe
                Filesize

                175KB

                MD5

                27f20a7454f0cbd0bc19a77c534a09b2

                SHA1

                cbdc601293273c71421e0db4a482ed990f61c4a1

                SHA256

                38b0de83e47a859400cef0d3039ed220b8b56de66107e906e21e606dfe0daee9

                SHA512

                dd943783c99e0250b2f1f80452d7aecf2df1223ff6d09ac749694af9e026cad020ba62e39316e309e4bcebd58e130a3ab891089bd679bc5a806bdb1d416f2885

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap8609.exe
                Filesize

                704KB

                MD5

                f98e95d65d5586ca40871571a6e6a124

                SHA1

                cbb643963132a36a0b438a0892caee025382cd58

                SHA256

                67cd6c63d3a5465f727a4a5f511586bf473da4f98c48ca8ee86a829cc0ffa929

                SHA512

                d109366f2d019181c3f8612ce89c0984604ffc37f9beeabb6931f82895c13d85187f155e87c9731a26b698e13bb2140397c86604a44c96bb01d7fc50b3a35af4

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap8609.exe
                Filesize

                704KB

                MD5

                f98e95d65d5586ca40871571a6e6a124

                SHA1

                cbb643963132a36a0b438a0892caee025382cd58

                SHA256

                67cd6c63d3a5465f727a4a5f511586bf473da4f98c48ca8ee86a829cc0ffa929

                SHA512

                d109366f2d019181c3f8612ce89c0984604ffc37f9beeabb6931f82895c13d85187f155e87c9731a26b698e13bb2140397c86604a44c96bb01d7fc50b3a35af4

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w02sC13.exe
                Filesize

                379KB

                MD5

                2f141d0149350fabae9f655e14468d92

                SHA1

                d1592ca19ae26a2b803313e07c8ab7d492bbf2cc

                SHA256

                f45dbb5ded8a9db45876b08911d31af693384c43f0643d5fc6c2608ff80e4cda

                SHA512

                7c6edf480493b3879ff131ca51d5e41e8198737b1efecba1ae4659caef442aa064938cbcf48807c83c2638bbc332d91a66be2bede3fbfb4c39efd4f4f9fb50b0

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w02sC13.exe
                Filesize

                379KB

                MD5

                2f141d0149350fabae9f655e14468d92

                SHA1

                d1592ca19ae26a2b803313e07c8ab7d492bbf2cc

                SHA256

                f45dbb5ded8a9db45876b08911d31af693384c43f0643d5fc6c2608ff80e4cda

                SHA512

                7c6edf480493b3879ff131ca51d5e41e8198737b1efecba1ae4659caef442aa064938cbcf48807c83c2638bbc332d91a66be2bede3fbfb4c39efd4f4f9fb50b0

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap6707.exe
                Filesize

                349KB

                MD5

                a14b860222202cdb91ddb809eb72c2bf

                SHA1

                ae7fde932fa3e040c67da5c465e1801cd23ed0fe

                SHA256

                446963d96c423f2d9ff6f970303697fd8a43e664a8e4e43387a75cbebab87ab1

                SHA512

                cb08ccd679ed6c23ea5bc6f6301506d116f7f69e5b54f94f59ef230268736d924b2e6b7a3b415ce19a23f0ce10752911ad324003982d13ede3c1b9bd68d14630

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap6707.exe
                Filesize

                349KB

                MD5

                a14b860222202cdb91ddb809eb72c2bf

                SHA1

                ae7fde932fa3e040c67da5c465e1801cd23ed0fe

                SHA256

                446963d96c423f2d9ff6f970303697fd8a43e664a8e4e43387a75cbebab87ab1

                SHA512

                cb08ccd679ed6c23ea5bc6f6301506d116f7f69e5b54f94f59ef230268736d924b2e6b7a3b415ce19a23f0ce10752911ad324003982d13ede3c1b9bd68d14630

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3249.exe
                Filesize

                12KB

                MD5

                cf6ba42121c91af86dec830e2906ef42

                SHA1

                79fe535af1c317628537504767250650137d3df6

                SHA256

                27a7fba50a19b58755c0581008b7b6127d524b4b536ef9c74610ab12dd066a64

                SHA512

                5edef25160e748ef664149dd7247ba58fca098772de69ee09d0866f222684a73006f3550f8e0d320490d9cdee39cb07a19c56bdf1b53c7a161e2849591096bf5

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3249.exe
                Filesize

                12KB

                MD5

                cf6ba42121c91af86dec830e2906ef42

                SHA1

                79fe535af1c317628537504767250650137d3df6

                SHA256

                27a7fba50a19b58755c0581008b7b6127d524b4b536ef9c74610ab12dd066a64

                SHA512

                5edef25160e748ef664149dd7247ba58fca098772de69ee09d0866f222684a73006f3550f8e0d320490d9cdee39cb07a19c56bdf1b53c7a161e2849591096bf5

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0735kw.exe
                Filesize

                322KB

                MD5

                cc9205f44ba07f3e4bf1951e11c0baf8

                SHA1

                562feb30405750cad6c3eeda04e6c214ecc64870

                SHA256

                0149e5ee232db522a09455a550b360c29d238f4f2848a0db76e8544711e4f11d

                SHA512

                18ec11f038dbfcdac390d4d97fe854afa038293ffed056f602fe12e1b3b71385e3301e765158695da962ab532ceebba274b3c0642af5aad9b5be5db0b7cff8dd

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0735kw.exe
                Filesize

                322KB

                MD5

                cc9205f44ba07f3e4bf1951e11c0baf8

                SHA1

                562feb30405750cad6c3eeda04e6c214ecc64870

                SHA256

                0149e5ee232db522a09455a550b360c29d238f4f2848a0db76e8544711e4f11d

                SHA512

                18ec11f038dbfcdac390d4d97fe854afa038293ffed056f602fe12e1b3b71385e3301e765158695da962ab532ceebba274b3c0642af5aad9b5be5db0b7cff8dd

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                Filesize

                236KB

                MD5

                01c1ecc328e84ba3fb93210cb4e474c2

                SHA1

                9e0dce3df59186f80c6a48e9b0bf1e1cd1bbd03d

                SHA256

                b4871a0034167b5e7f2b3ca80a6203f382fb80e668d4d07bbecdb142729b4047

                SHA512

                5dbf973ffae586c2187f5bbe107918c8b8128fc9d6b3935037f53e1027522463a6f07936be9b24d881966dfb961a602ae5f470e354bc8ab8ba1ae7ffebd12ce3

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                Filesize

                236KB

                MD5

                01c1ecc328e84ba3fb93210cb4e474c2

                SHA1

                9e0dce3df59186f80c6a48e9b0bf1e1cd1bbd03d

                SHA256

                b4871a0034167b5e7f2b3ca80a6203f382fb80e668d4d07bbecdb142729b4047

                SHA512

                5dbf973ffae586c2187f5bbe107918c8b8128fc9d6b3935037f53e1027522463a6f07936be9b24d881966dfb961a602ae5f470e354bc8ab8ba1ae7ffebd12ce3

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                Filesize

                236KB

                MD5

                01c1ecc328e84ba3fb93210cb4e474c2

                SHA1

                9e0dce3df59186f80c6a48e9b0bf1e1cd1bbd03d

                SHA256

                b4871a0034167b5e7f2b3ca80a6203f382fb80e668d4d07bbecdb142729b4047

                SHA512

                5dbf973ffae586c2187f5bbe107918c8b8128fc9d6b3935037f53e1027522463a6f07936be9b24d881966dfb961a602ae5f470e354bc8ab8ba1ae7ffebd12ce3

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                Filesize

                236KB

                MD5

                01c1ecc328e84ba3fb93210cb4e474c2

                SHA1

                9e0dce3df59186f80c6a48e9b0bf1e1cd1bbd03d

                SHA256

                b4871a0034167b5e7f2b3ca80a6203f382fb80e668d4d07bbecdb142729b4047

                SHA512

                5dbf973ffae586c2187f5bbe107918c8b8128fc9d6b3935037f53e1027522463a6f07936be9b24d881966dfb961a602ae5f470e354bc8ab8ba1ae7ffebd12ce3

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                Filesize

                223B

                MD5

                94cbeec5d4343918fd0e48760e40539c

                SHA1

                a049266c5c1131f692f306c8710d7e72586ae79d

                SHA256

                48eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279

                SHA512

                4e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0

              • memory/232-184-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/232-172-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/232-188-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/232-190-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/232-192-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/232-194-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/232-196-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/232-198-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/232-199-0x0000000000400000-0x0000000002B7E000-memory.dmp
                Filesize

                39.5MB

              • memory/232-200-0x0000000004980000-0x0000000004990000-memory.dmp
                Filesize

                64KB

              • memory/232-201-0x0000000004980000-0x0000000004990000-memory.dmp
                Filesize

                64KB

              • memory/232-202-0x0000000004980000-0x0000000004990000-memory.dmp
                Filesize

                64KB

              • memory/232-204-0x0000000000400000-0x0000000002B7E000-memory.dmp
                Filesize

                39.5MB

              • memory/232-167-0x0000000002C50000-0x0000000002C7D000-memory.dmp
                Filesize

                180KB

              • memory/232-182-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/232-180-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/232-178-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/232-176-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/232-174-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/232-186-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/232-171-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/232-170-0x0000000007260000-0x0000000007804000-memory.dmp
                Filesize

                5.6MB

              • memory/232-169-0x0000000004980000-0x0000000004990000-memory.dmp
                Filesize

                64KB

              • memory/232-168-0x0000000004980000-0x0000000004990000-memory.dmp
                Filesize

                64KB

              • memory/1292-161-0x00000000009F0000-0x00000000009FA000-memory.dmp
                Filesize

                40KB

              • memory/3512-1141-0x00000000053B0000-0x00000000053C0000-memory.dmp
                Filesize

                64KB

              • memory/3512-1140-0x00000000007E0000-0x0000000000812000-memory.dmp
                Filesize

                200KB

              • memory/3808-216-0x0000000007720000-0x000000000775E000-memory.dmp
                Filesize

                248KB

              • memory/3808-232-0x0000000007720000-0x000000000775E000-memory.dmp
                Filesize

                248KB

              • memory/3808-234-0x0000000007720000-0x000000000775E000-memory.dmp
                Filesize

                248KB

              • memory/3808-236-0x0000000007720000-0x000000000775E000-memory.dmp
                Filesize

                248KB

              • memory/3808-238-0x0000000007720000-0x000000000775E000-memory.dmp
                Filesize

                248KB

              • memory/3808-240-0x0000000007720000-0x000000000775E000-memory.dmp
                Filesize

                248KB

              • memory/3808-242-0x0000000007720000-0x000000000775E000-memory.dmp
                Filesize

                248KB

              • memory/3808-244-0x0000000007720000-0x000000000775E000-memory.dmp
                Filesize

                248KB

              • memory/3808-246-0x0000000007720000-0x000000000775E000-memory.dmp
                Filesize

                248KB

              • memory/3808-1119-0x0000000007790000-0x0000000007DA8000-memory.dmp
                Filesize

                6.1MB

              • memory/3808-1120-0x0000000007E30000-0x0000000007F3A000-memory.dmp
                Filesize

                1.0MB

              • memory/3808-1121-0x0000000007F70000-0x0000000007F82000-memory.dmp
                Filesize

                72KB

              • memory/3808-1122-0x0000000007F90000-0x0000000007FCC000-memory.dmp
                Filesize

                240KB

              • memory/3808-1123-0x0000000007160000-0x0000000007170000-memory.dmp
                Filesize

                64KB

              • memory/3808-1125-0x0000000008280000-0x0000000008312000-memory.dmp
                Filesize

                584KB

              • memory/3808-1126-0x0000000008320000-0x0000000008386000-memory.dmp
                Filesize

                408KB

              • memory/3808-1127-0x0000000008A20000-0x0000000008A96000-memory.dmp
                Filesize

                472KB

              • memory/3808-1128-0x0000000008AB0000-0x0000000008B00000-memory.dmp
                Filesize

                320KB

              • memory/3808-1129-0x0000000008B20000-0x0000000008CE2000-memory.dmp
                Filesize

                1.8MB

              • memory/3808-1130-0x0000000008CF0000-0x000000000921C000-memory.dmp
                Filesize

                5.2MB

              • memory/3808-1131-0x0000000007160000-0x0000000007170000-memory.dmp
                Filesize

                64KB

              • memory/3808-1132-0x0000000007160000-0x0000000007170000-memory.dmp
                Filesize

                64KB

              • memory/3808-1133-0x0000000007160000-0x0000000007170000-memory.dmp
                Filesize

                64KB

              • memory/3808-230-0x0000000007720000-0x000000000775E000-memory.dmp
                Filesize

                248KB

              • memory/3808-228-0x0000000007720000-0x000000000775E000-memory.dmp
                Filesize

                248KB

              • memory/3808-226-0x0000000007720000-0x000000000775E000-memory.dmp
                Filesize

                248KB

              • memory/3808-224-0x0000000007720000-0x000000000775E000-memory.dmp
                Filesize

                248KB

              • memory/3808-222-0x0000000007720000-0x000000000775E000-memory.dmp
                Filesize

                248KB

              • memory/3808-220-0x0000000007720000-0x000000000775E000-memory.dmp
                Filesize

                248KB

              • memory/3808-218-0x0000000007720000-0x000000000775E000-memory.dmp
                Filesize

                248KB

              • memory/3808-214-0x0000000007720000-0x000000000775E000-memory.dmp
                Filesize

                248KB

              • memory/3808-213-0x0000000007720000-0x000000000775E000-memory.dmp
                Filesize

                248KB

              • memory/3808-211-0x0000000007160000-0x0000000007170000-memory.dmp
                Filesize

                64KB

              • memory/3808-212-0x0000000007160000-0x0000000007170000-memory.dmp
                Filesize

                64KB

              • memory/3808-210-0x0000000007160000-0x0000000007170000-memory.dmp
                Filesize

                64KB

              • memory/3808-209-0x0000000002B90000-0x0000000002BDB000-memory.dmp
                Filesize

                300KB

              • memory/3808-1134-0x0000000007160000-0x0000000007170000-memory.dmp
                Filesize

                64KB