Analysis

  • max time kernel
    134s
  • max time network
    141s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 13:11

General

  • Target

    2947aa958d1b2c3dc0d02ab702986d2c9155f9e986874ea05d0ae6c3db41ad47.exe

  • Size

    1022KB

  • MD5

    696fa96da2b7a2598fa09fa9a022a99f

  • SHA1

    f11079cc28dec7bcbf96531ffe4cda43361a7811

  • SHA256

    2947aa958d1b2c3dc0d02ab702986d2c9155f9e986874ea05d0ae6c3db41ad47

  • SHA512

    bae55535982f237df384141075f6c1ae6d7154c5f3d0cc26ec9e42779033ede28b8b5602d4761081d8faa39207dd31215bc2bc5e5c620cdd6468be3eea477715

  • SSDEEP

    12288:1MrBy90+aJIG2o6WEuFjp948wMhBvKV5YgN58OERa1hZKHPykboT0OubpjlK2Mjl:gyYZ2olEewM3+SoZKHPyCpurh

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

vila

C2

193.233.20.33:4125

Attributes
  • auth_value

    94b115d79ddcab0a0fb9dfab8e225c3b

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2947aa958d1b2c3dc0d02ab702986d2c9155f9e986874ea05d0ae6c3db41ad47.exe
    "C:\Users\Admin\AppData\Local\Temp\2947aa958d1b2c3dc0d02ab702986d2c9155f9e986874ea05d0ae6c3db41ad47.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3516
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap3845.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap3845.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1676
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap6195.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap6195.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3240
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap4024.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap4024.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4888
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9820.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9820.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2076
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1190Fw.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1190Fw.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3132
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w07GC43.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w07GC43.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2212
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xVvDS99.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xVvDS99.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4304
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y03nL16.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y03nL16.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4352
      • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
        "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2052
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3452
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3632
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:5000
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "legenda.exe" /P "Admin:N"
              5⤵
                PID:5036
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "legenda.exe" /P "Admin:R" /E
                5⤵
                  PID:4660
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:5004
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\f22b669919" /P "Admin:N"
                    5⤵
                      PID:4648
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\f22b669919" /P "Admin:R" /E
                      5⤵
                        PID:4656
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:4936
              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                1⤵
                • Executes dropped EXE
                PID:3432
              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                1⤵
                • Executes dropped EXE
                PID:3272

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y03nL16.exe

                Filesize

                236KB

                MD5

                6198fb7510a8d413aaf97a3cebf2d2a6

                SHA1

                8f80aa81c3a71708fe6091bf44cb5a19dfc64f2b

                SHA256

                91f1101e44f85975251c3c3807c12b7bf1afdd8d59d6d714d5da2880d36be147

                SHA512

                df35cc56337104faaf41ee269aa7ce5a49282a341a12130a3d4a599fa96d7862e922c9c34e7a4084628198ae14f730fd27a3a01af259e6a71b4d0bd6576a5caf

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y03nL16.exe

                Filesize

                236KB

                MD5

                6198fb7510a8d413aaf97a3cebf2d2a6

                SHA1

                8f80aa81c3a71708fe6091bf44cb5a19dfc64f2b

                SHA256

                91f1101e44f85975251c3c3807c12b7bf1afdd8d59d6d714d5da2880d36be147

                SHA512

                df35cc56337104faaf41ee269aa7ce5a49282a341a12130a3d4a599fa96d7862e922c9c34e7a4084628198ae14f730fd27a3a01af259e6a71b4d0bd6576a5caf

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap3845.exe

                Filesize

                838KB

                MD5

                11398bfcc1879aa7eda5fcbbff10771e

                SHA1

                d7d130b7384f0a9c47c9f26c2f7d535b3837f89c

                SHA256

                aeb606fe6dfd4375d6f3176f4344ce5f233eb484f32147e706d4fd32578919ed

                SHA512

                579c6054130b4d9d8071c7bd492d0dfd5120ec4dc5a7c2ba3f4d22ac8b202fe389cac50df0ab71c88cded0d15621f2319c8c13af558d80d947e9ba8c79676fc3

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap3845.exe

                Filesize

                838KB

                MD5

                11398bfcc1879aa7eda5fcbbff10771e

                SHA1

                d7d130b7384f0a9c47c9f26c2f7d535b3837f89c

                SHA256

                aeb606fe6dfd4375d6f3176f4344ce5f233eb484f32147e706d4fd32578919ed

                SHA512

                579c6054130b4d9d8071c7bd492d0dfd5120ec4dc5a7c2ba3f4d22ac8b202fe389cac50df0ab71c88cded0d15621f2319c8c13af558d80d947e9ba8c79676fc3

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xVvDS99.exe

                Filesize

                175KB

                MD5

                41559b1c610bb97ee3ae67912adc7202

                SHA1

                c632db2f5b5f9e0cdf3c579ab4fa40ac8f3edb0c

                SHA256

                f7695ff94e1061c70f159dfc5912a39418349df058edd331bd76430847d0972f

                SHA512

                45817036aad430a9c00cf22911ca3226f8c8d14cc798f3513b6016aba8f0186b413d62c520b8d2729dcc657266ee3b0f93d8295f9d00f23806764a4e270c6217

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xVvDS99.exe

                Filesize

                175KB

                MD5

                41559b1c610bb97ee3ae67912adc7202

                SHA1

                c632db2f5b5f9e0cdf3c579ab4fa40ac8f3edb0c

                SHA256

                f7695ff94e1061c70f159dfc5912a39418349df058edd331bd76430847d0972f

                SHA512

                45817036aad430a9c00cf22911ca3226f8c8d14cc798f3513b6016aba8f0186b413d62c520b8d2729dcc657266ee3b0f93d8295f9d00f23806764a4e270c6217

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap6195.exe

                Filesize

                696KB

                MD5

                68933ae68f34cb0fca7cc236d809520a

                SHA1

                99911ea748be019c0c23fc9b267ffbe29077a77a

                SHA256

                5dc53fee8cdd51be86e30ed71a2b94be960044c74555f6e76593848581ac4aee

                SHA512

                8021106bef23d2622ae350e6ec7b943dd747505b3031ef7263044d33c20585b6dbbf35673a02a816755517febd72ebcdcc6301de8afbfe8bfea4f5ab98f1cfaa

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap6195.exe

                Filesize

                696KB

                MD5

                68933ae68f34cb0fca7cc236d809520a

                SHA1

                99911ea748be019c0c23fc9b267ffbe29077a77a

                SHA256

                5dc53fee8cdd51be86e30ed71a2b94be960044c74555f6e76593848581ac4aee

                SHA512

                8021106bef23d2622ae350e6ec7b943dd747505b3031ef7263044d33c20585b6dbbf35673a02a816755517febd72ebcdcc6301de8afbfe8bfea4f5ab98f1cfaa

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w07GC43.exe

                Filesize

                350KB

                MD5

                87b66b548812d0f19ff39ce5cf417258

                SHA1

                159d0f180c24f0891ecdbf878d841956dc24d37c

                SHA256

                b5c82f5105f1c4703386661c64347775290b56a0c7df86ed3cb824cf1a712e79

                SHA512

                6e1e17e2e7397a5c5428c0a4b91ae203c3f9f338077d965668819d54b6b5772c1da8f8d70da2297ba541dcec8a0f334d8daf7597e019912e2367b40abb28c532

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w07GC43.exe

                Filesize

                350KB

                MD5

                87b66b548812d0f19ff39ce5cf417258

                SHA1

                159d0f180c24f0891ecdbf878d841956dc24d37c

                SHA256

                b5c82f5105f1c4703386661c64347775290b56a0c7df86ed3cb824cf1a712e79

                SHA512

                6e1e17e2e7397a5c5428c0a4b91ae203c3f9f338077d965668819d54b6b5772c1da8f8d70da2297ba541dcec8a0f334d8daf7597e019912e2367b40abb28c532

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap4024.exe

                Filesize

                345KB

                MD5

                65651029596f46648cfcb2894b7cd20a

                SHA1

                76b87412aeac9b7cb72507750509b98501f6c8fb

                SHA256

                af977d972bfa883ed4aa1eaf5ac72c92a8bb04c79c68a5c876dd58e969a217d1

                SHA512

                c60064b33b9e674a2e633892520fef997f6a55ed19472e664f8f18ba64fc2bee4357b1c033e0eeedb90bacad6aa49c74618d617a37f5c9521090bdc80a62849e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap4024.exe

                Filesize

                345KB

                MD5

                65651029596f46648cfcb2894b7cd20a

                SHA1

                76b87412aeac9b7cb72507750509b98501f6c8fb

                SHA256

                af977d972bfa883ed4aa1eaf5ac72c92a8bb04c79c68a5c876dd58e969a217d1

                SHA512

                c60064b33b9e674a2e633892520fef997f6a55ed19472e664f8f18ba64fc2bee4357b1c033e0eeedb90bacad6aa49c74618d617a37f5c9521090bdc80a62849e

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9820.exe

                Filesize

                12KB

                MD5

                5023973d6f79c4c32395e9ed27b7a5d0

                SHA1

                a5afa8ab95116f411f4ea962ce06530fd37002fe

                SHA256

                e2648d7d2883e11486fe08254b89c4fa868725dae673b10f3b69d67b87b79772

                SHA512

                bf17536584183b04749a10ccc565467ce88c5f26b74fad2ffa27ecd4de241624a63c153f9afe75bd355c76615bea3eaa36ad6d972d2f2b8b405e33252c4d9ede

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9820.exe

                Filesize

                12KB

                MD5

                5023973d6f79c4c32395e9ed27b7a5d0

                SHA1

                a5afa8ab95116f411f4ea962ce06530fd37002fe

                SHA256

                e2648d7d2883e11486fe08254b89c4fa868725dae673b10f3b69d67b87b79772

                SHA512

                bf17536584183b04749a10ccc565467ce88c5f26b74fad2ffa27ecd4de241624a63c153f9afe75bd355c76615bea3eaa36ad6d972d2f2b8b405e33252c4d9ede

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1190Fw.exe

                Filesize

                292KB

                MD5

                260d679b198f212559b0b2c2cb20c83a

                SHA1

                3efca56f5ca50c35cef5afb360f400684198c928

                SHA256

                417c06efceb98bfbbbe8938e37ec0f59b3137a6441212504e199fc7a5c5494d3

                SHA512

                145d954c99c0334c33f1da4ef474cddf75d9d415242f9b96738f5ab99d46931bdce1c8ea6e28e2873dadd480ee6168b6144e78a75fbf15f2910dc83283c47952

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1190Fw.exe

                Filesize

                292KB

                MD5

                260d679b198f212559b0b2c2cb20c83a

                SHA1

                3efca56f5ca50c35cef5afb360f400684198c928

                SHA256

                417c06efceb98bfbbbe8938e37ec0f59b3137a6441212504e199fc7a5c5494d3

                SHA512

                145d954c99c0334c33f1da4ef474cddf75d9d415242f9b96738f5ab99d46931bdce1c8ea6e28e2873dadd480ee6168b6144e78a75fbf15f2910dc83283c47952

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                Filesize

                236KB

                MD5

                6198fb7510a8d413aaf97a3cebf2d2a6

                SHA1

                8f80aa81c3a71708fe6091bf44cb5a19dfc64f2b

                SHA256

                91f1101e44f85975251c3c3807c12b7bf1afdd8d59d6d714d5da2880d36be147

                SHA512

                df35cc56337104faaf41ee269aa7ce5a49282a341a12130a3d4a599fa96d7862e922c9c34e7a4084628198ae14f730fd27a3a01af259e6a71b4d0bd6576a5caf

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                Filesize

                236KB

                MD5

                6198fb7510a8d413aaf97a3cebf2d2a6

                SHA1

                8f80aa81c3a71708fe6091bf44cb5a19dfc64f2b

                SHA256

                91f1101e44f85975251c3c3807c12b7bf1afdd8d59d6d714d5da2880d36be147

                SHA512

                df35cc56337104faaf41ee269aa7ce5a49282a341a12130a3d4a599fa96d7862e922c9c34e7a4084628198ae14f730fd27a3a01af259e6a71b4d0bd6576a5caf

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                Filesize

                236KB

                MD5

                6198fb7510a8d413aaf97a3cebf2d2a6

                SHA1

                8f80aa81c3a71708fe6091bf44cb5a19dfc64f2b

                SHA256

                91f1101e44f85975251c3c3807c12b7bf1afdd8d59d6d714d5da2880d36be147

                SHA512

                df35cc56337104faaf41ee269aa7ce5a49282a341a12130a3d4a599fa96d7862e922c9c34e7a4084628198ae14f730fd27a3a01af259e6a71b4d0bd6576a5caf

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                Filesize

                236KB

                MD5

                6198fb7510a8d413aaf97a3cebf2d2a6

                SHA1

                8f80aa81c3a71708fe6091bf44cb5a19dfc64f2b

                SHA256

                91f1101e44f85975251c3c3807c12b7bf1afdd8d59d6d714d5da2880d36be147

                SHA512

                df35cc56337104faaf41ee269aa7ce5a49282a341a12130a3d4a599fa96d7862e922c9c34e7a4084628198ae14f730fd27a3a01af259e6a71b4d0bd6576a5caf

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                Filesize

                236KB

                MD5

                6198fb7510a8d413aaf97a3cebf2d2a6

                SHA1

                8f80aa81c3a71708fe6091bf44cb5a19dfc64f2b

                SHA256

                91f1101e44f85975251c3c3807c12b7bf1afdd8d59d6d714d5da2880d36be147

                SHA512

                df35cc56337104faaf41ee269aa7ce5a49282a341a12130a3d4a599fa96d7862e922c9c34e7a4084628198ae14f730fd27a3a01af259e6a71b4d0bd6576a5caf

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                Filesize

                223B

                MD5

                94cbeec5d4343918fd0e48760e40539c

                SHA1

                a049266c5c1131f692f306c8710d7e72586ae79d

                SHA256

                48eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279

                SHA512

                4e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0

              • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • memory/2076-147-0x00000000008F0000-0x00000000008FA000-memory.dmp

                Filesize

                40KB

              • memory/2212-1115-0x0000000005E40000-0x0000000005ED2000-memory.dmp

                Filesize

                584KB

              • memory/2212-236-0x0000000002770000-0x00000000027AE000-memory.dmp

                Filesize

                248KB

              • memory/2212-1125-0x0000000004D80000-0x0000000004D90000-memory.dmp

                Filesize

                64KB

              • memory/2212-1124-0x0000000008170000-0x00000000081C0000-memory.dmp

                Filesize

                320KB

              • memory/2212-1123-0x00000000080E0000-0x0000000008156000-memory.dmp

                Filesize

                472KB

              • memory/2212-1122-0x0000000004D80000-0x0000000004D90000-memory.dmp

                Filesize

                64KB

              • memory/2212-1121-0x0000000004D80000-0x0000000004D90000-memory.dmp

                Filesize

                64KB

              • memory/2212-1120-0x0000000004D80000-0x0000000004D90000-memory.dmp

                Filesize

                64KB

              • memory/2212-1119-0x00000000067B0000-0x0000000006CDC000-memory.dmp

                Filesize

                5.2MB

              • memory/2212-1118-0x00000000065E0000-0x00000000067A2000-memory.dmp

                Filesize

                1.8MB

              • memory/2212-1116-0x0000000005EE0000-0x0000000005F46000-memory.dmp

                Filesize

                408KB

              • memory/2212-1114-0x0000000004D80000-0x0000000004D90000-memory.dmp

                Filesize

                64KB

              • memory/2212-1113-0x0000000005CB0000-0x0000000005CFB000-memory.dmp

                Filesize

                300KB

              • memory/2212-197-0x0000000002580000-0x00000000025C6000-memory.dmp

                Filesize

                280KB

              • memory/2212-198-0x0000000002770000-0x00000000027B4000-memory.dmp

                Filesize

                272KB

              • memory/2212-200-0x0000000002770000-0x00000000027AE000-memory.dmp

                Filesize

                248KB

              • memory/2212-204-0x0000000002770000-0x00000000027AE000-memory.dmp

                Filesize

                248KB

              • memory/2212-202-0x0000000002770000-0x00000000027AE000-memory.dmp

                Filesize

                248KB

              • memory/2212-199-0x0000000002770000-0x00000000027AE000-memory.dmp

                Filesize

                248KB

              • memory/2212-206-0x0000000002770000-0x00000000027AE000-memory.dmp

                Filesize

                248KB

              • memory/2212-208-0x0000000002770000-0x00000000027AE000-memory.dmp

                Filesize

                248KB

              • memory/2212-210-0x0000000002770000-0x00000000027AE000-memory.dmp

                Filesize

                248KB

              • memory/2212-212-0x0000000002770000-0x00000000027AE000-memory.dmp

                Filesize

                248KB

              • memory/2212-214-0x0000000002770000-0x00000000027AE000-memory.dmp

                Filesize

                248KB

              • memory/2212-216-0x0000000002770000-0x00000000027AE000-memory.dmp

                Filesize

                248KB

              • memory/2212-218-0x0000000002770000-0x00000000027AE000-memory.dmp

                Filesize

                248KB

              • memory/2212-220-0x0000000002770000-0x00000000027AE000-memory.dmp

                Filesize

                248KB

              • memory/2212-222-0x0000000002770000-0x00000000027AE000-memory.dmp

                Filesize

                248KB

              • memory/2212-224-0x0000000002770000-0x00000000027AE000-memory.dmp

                Filesize

                248KB

              • memory/2212-226-0x0000000002770000-0x00000000027AE000-memory.dmp

                Filesize

                248KB

              • memory/2212-228-0x0000000002770000-0x00000000027AE000-memory.dmp

                Filesize

                248KB

              • memory/2212-230-0x0000000000990000-0x00000000009DB000-memory.dmp

                Filesize

                300KB

              • memory/2212-231-0x0000000004D80000-0x0000000004D90000-memory.dmp

                Filesize

                64KB

              • memory/2212-233-0x0000000004D80000-0x0000000004D90000-memory.dmp

                Filesize

                64KB

              • memory/2212-232-0x0000000002770000-0x00000000027AE000-memory.dmp

                Filesize

                248KB

              • memory/2212-1112-0x0000000005B60000-0x0000000005B9E000-memory.dmp

                Filesize

                248KB

              • memory/2212-235-0x0000000004D80000-0x0000000004D90000-memory.dmp

                Filesize

                64KB

              • memory/2212-1109-0x0000000005390000-0x0000000005996000-memory.dmp

                Filesize

                6.0MB

              • memory/2212-1110-0x0000000005A00000-0x0000000005B0A000-memory.dmp

                Filesize

                1.0MB

              • memory/2212-1111-0x0000000005B40000-0x0000000005B52000-memory.dmp

                Filesize

                72KB

              • memory/3132-167-0x00000000027F0000-0x0000000002802000-memory.dmp

                Filesize

                72KB

              • memory/3132-192-0x0000000000400000-0x000000000070C000-memory.dmp

                Filesize

                3.0MB

              • memory/3132-177-0x00000000027F0000-0x0000000002802000-memory.dmp

                Filesize

                72KB

              • memory/3132-171-0x00000000027F0000-0x0000000002802000-memory.dmp

                Filesize

                72KB

              • memory/3132-153-0x0000000002630000-0x000000000264A000-memory.dmp

                Filesize

                104KB

              • memory/3132-190-0x00000000027A0000-0x00000000027B0000-memory.dmp

                Filesize

                64KB

              • memory/3132-189-0x00000000027A0000-0x00000000027B0000-memory.dmp

                Filesize

                64KB

              • memory/3132-188-0x0000000000400000-0x000000000070C000-memory.dmp

                Filesize

                3.0MB

              • memory/3132-187-0x00000000027F0000-0x0000000002802000-memory.dmp

                Filesize

                72KB

              • memory/3132-185-0x00000000027F0000-0x0000000002802000-memory.dmp

                Filesize

                72KB

              • memory/3132-183-0x00000000027F0000-0x0000000002802000-memory.dmp

                Filesize

                72KB

              • memory/3132-154-0x0000000004C60000-0x000000000515E000-memory.dmp

                Filesize

                5.0MB

              • memory/3132-179-0x00000000027F0000-0x0000000002802000-memory.dmp

                Filesize

                72KB

              • memory/3132-169-0x00000000027F0000-0x0000000002802000-memory.dmp

                Filesize

                72KB

              • memory/3132-175-0x00000000027F0000-0x0000000002802000-memory.dmp

                Filesize

                72KB

              • memory/3132-173-0x00000000027F0000-0x0000000002802000-memory.dmp

                Filesize

                72KB

              • memory/3132-181-0x00000000027F0000-0x0000000002802000-memory.dmp

                Filesize

                72KB

              • memory/3132-155-0x00000000027F0000-0x0000000002808000-memory.dmp

                Filesize

                96KB

              • memory/3132-165-0x00000000027F0000-0x0000000002802000-memory.dmp

                Filesize

                72KB

              • memory/3132-163-0x00000000027F0000-0x0000000002802000-memory.dmp

                Filesize

                72KB

              • memory/3132-161-0x00000000027F0000-0x0000000002802000-memory.dmp

                Filesize

                72KB

              • memory/3132-160-0x00000000027F0000-0x0000000002802000-memory.dmp

                Filesize

                72KB

              • memory/3132-159-0x00000000027A0000-0x00000000027B0000-memory.dmp

                Filesize

                64KB

              • memory/3132-158-0x00000000027A0000-0x00000000027B0000-memory.dmp

                Filesize

                64KB

              • memory/3132-157-0x00000000027A0000-0x00000000027B0000-memory.dmp

                Filesize

                64KB

              • memory/3132-156-0x00000000020B0000-0x00000000020DD000-memory.dmp

                Filesize

                180KB

              • memory/4304-1133-0x00000000051C0000-0x00000000051D0000-memory.dmp

                Filesize

                64KB

              • memory/4304-1132-0x00000000051D0000-0x000000000521B000-memory.dmp

                Filesize

                300KB

              • memory/4304-1131-0x0000000000910000-0x0000000000942000-memory.dmp

                Filesize

                200KB