Analysis

  • max time kernel
    135s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2023 18:33

General

  • Target

    ca3a55dd946cad30a880e70454231f3e876be72c33d01a01284151f73ce1774f.exe

  • Size

    1.1MB

  • MD5

    6194b0417544edcdd770b1bc7fb8b62b

  • SHA1

    08aae9ccd2238ad0c5b96683a88c9d1c86e8d401

  • SHA256

    ca3a55dd946cad30a880e70454231f3e876be72c33d01a01284151f73ce1774f

  • SHA512

    779c27dfb341815d811382713deab9c359e02b611935ec60e2583342d83bc2a9fb10a72cc02468b98f125b49faeb709f1a1a58182567f27081721de3f4f9ac40

  • SSDEEP

    24576:/yDwP+vzZ5hix05K0KnX44EaKqsvjuV03NuzuO6gFMz3:KDwP+vz/hi6K1cQGJ9uzulL

Malware Config

Extracted

Family

redline

Botnet

larry

C2

185.161.248.75:4132

Attributes
  • auth_value

    9039557bb7a08f5f2f60e2b71e1dee0e

Extracted

Family

redline

Botnet

warum

C2

185.161.248.75:4132

Attributes
  • auth_value

    0bdb2dda91dadc65f555dee088a6a2a4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca3a55dd946cad30a880e70454231f3e876be72c33d01a01284151f73ce1774f.exe
    "C:\Users\Admin\AppData\Local\Temp\ca3a55dd946cad30a880e70454231f3e876be72c33d01a01284151f73ce1774f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2292839.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2292839.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4700
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8912077.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8912077.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4720
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0689072.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0689072.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4880
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1377043.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1377043.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:212
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0410572.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0410572.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3288
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0410572.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0410572.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2996
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6119780.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6119780.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5116
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6119780.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6119780.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:5112
        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
          "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4284
          • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4240
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legends.exe /TR "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:1232
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legends.exe" /P "Admin:N"&&CACLS "legends.exe" /P "Admin:R" /E&&echo Y|CACLS "..\41bde21dc7" /P "Admin:N"&&CACLS "..\41bde21dc7" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2404
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:880
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "legends.exe" /P "Admin:N"
                  7⤵
                    PID:4120
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "legends.exe" /P "Admin:R" /E
                    7⤵
                      PID:2988
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:2628
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\41bde21dc7" /P "Admin:N"
                        7⤵
                          PID:4936
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\41bde21dc7" /P "Admin:R" /E
                          7⤵
                            PID:1880

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Defense Evasion

              Modify Registry

              3
              T1112

              Disabling Security Tools

              2
              T1089

              Credential Access

              Credentials in Files

              1
              T1081

              Discovery

              Query Registry

              2
              T1012

              System Information Discovery

              2
              T1082

              Collection

              Data from Local System

              1
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\r0410572.exe.log
                Filesize

                425B

                MD5

                4eaca4566b22b01cd3bc115b9b0b2196

                SHA1

                e743e0792c19f71740416e7b3c061d9f1336bf94

                SHA256

                34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

                SHA512

                bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

              • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                Filesize

                962KB

                MD5

                5f9acb51715e5776b2377d71a9d01369

                SHA1

                66a7e767bd39ffe82308bf9135a857d8df7e7e02

                SHA256

                cafa4045987561af173cb34421bb34f743193d8285b44b78f0afbe8ccc41b54b

                SHA512

                9ba8322f0cdd6c66cb3ceaf693c3a4712b8f002012ad52f11c05b9e363bfd3d2c7ea0bce6462e3bc2777dfa39fcd5ab9c5a4fa1c9df0b2b44d27079a03b3af06

              • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                Filesize

                962KB

                MD5

                5f9acb51715e5776b2377d71a9d01369

                SHA1

                66a7e767bd39ffe82308bf9135a857d8df7e7e02

                SHA256

                cafa4045987561af173cb34421bb34f743193d8285b44b78f0afbe8ccc41b54b

                SHA512

                9ba8322f0cdd6c66cb3ceaf693c3a4712b8f002012ad52f11c05b9e363bfd3d2c7ea0bce6462e3bc2777dfa39fcd5ab9c5a4fa1c9df0b2b44d27079a03b3af06

              • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                Filesize

                962KB

                MD5

                5f9acb51715e5776b2377d71a9d01369

                SHA1

                66a7e767bd39ffe82308bf9135a857d8df7e7e02

                SHA256

                cafa4045987561af173cb34421bb34f743193d8285b44b78f0afbe8ccc41b54b

                SHA512

                9ba8322f0cdd6c66cb3ceaf693c3a4712b8f002012ad52f11c05b9e363bfd3d2c7ea0bce6462e3bc2777dfa39fcd5ab9c5a4fa1c9df0b2b44d27079a03b3af06

              • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                Filesize

                962KB

                MD5

                5f9acb51715e5776b2377d71a9d01369

                SHA1

                66a7e767bd39ffe82308bf9135a857d8df7e7e02

                SHA256

                cafa4045987561af173cb34421bb34f743193d8285b44b78f0afbe8ccc41b54b

                SHA512

                9ba8322f0cdd6c66cb3ceaf693c3a4712b8f002012ad52f11c05b9e363bfd3d2c7ea0bce6462e3bc2777dfa39fcd5ab9c5a4fa1c9df0b2b44d27079a03b3af06

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6119780.exe
                Filesize

                962KB

                MD5

                5f9acb51715e5776b2377d71a9d01369

                SHA1

                66a7e767bd39ffe82308bf9135a857d8df7e7e02

                SHA256

                cafa4045987561af173cb34421bb34f743193d8285b44b78f0afbe8ccc41b54b

                SHA512

                9ba8322f0cdd6c66cb3ceaf693c3a4712b8f002012ad52f11c05b9e363bfd3d2c7ea0bce6462e3bc2777dfa39fcd5ab9c5a4fa1c9df0b2b44d27079a03b3af06

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6119780.exe
                Filesize

                962KB

                MD5

                5f9acb51715e5776b2377d71a9d01369

                SHA1

                66a7e767bd39ffe82308bf9135a857d8df7e7e02

                SHA256

                cafa4045987561af173cb34421bb34f743193d8285b44b78f0afbe8ccc41b54b

                SHA512

                9ba8322f0cdd6c66cb3ceaf693c3a4712b8f002012ad52f11c05b9e363bfd3d2c7ea0bce6462e3bc2777dfa39fcd5ab9c5a4fa1c9df0b2b44d27079a03b3af06

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6119780.exe
                Filesize

                962KB

                MD5

                5f9acb51715e5776b2377d71a9d01369

                SHA1

                66a7e767bd39ffe82308bf9135a857d8df7e7e02

                SHA256

                cafa4045987561af173cb34421bb34f743193d8285b44b78f0afbe8ccc41b54b

                SHA512

                9ba8322f0cdd6c66cb3ceaf693c3a4712b8f002012ad52f11c05b9e363bfd3d2c7ea0bce6462e3bc2777dfa39fcd5ab9c5a4fa1c9df0b2b44d27079a03b3af06

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2292839.exe
                Filesize

                702KB

                MD5

                ba29d42f7cf1e0d72e2281246683eace

                SHA1

                e36ba51f51af712175a8630bb3ccf1444b17d8ce

                SHA256

                e40a896439d81b73c5a555a02a546196ba5cc7015d8550f1f4657f98baf2699b

                SHA512

                0e18531aaec60c6cc488a3c069b5676ba62c5f7cdfde2ea8f5afb6f2c8eaa4cccc4823412f0cd24a9d003d2e93b26bf60619c22d46f70bba27d535352915ca78

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2292839.exe
                Filesize

                702KB

                MD5

                ba29d42f7cf1e0d72e2281246683eace

                SHA1

                e36ba51f51af712175a8630bb3ccf1444b17d8ce

                SHA256

                e40a896439d81b73c5a555a02a546196ba5cc7015d8550f1f4657f98baf2699b

                SHA512

                0e18531aaec60c6cc488a3c069b5676ba62c5f7cdfde2ea8f5afb6f2c8eaa4cccc4823412f0cd24a9d003d2e93b26bf60619c22d46f70bba27d535352915ca78

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0410572.exe
                Filesize

                903KB

                MD5

                e5a2072a5023f0904155f2017ed2e102

                SHA1

                5444912cafe3e91c8e8a7224a6ffc46c90e1fb12

                SHA256

                38b5aba80b591c6079b76e61bd1039b4ed522a3cb2fb13c8d5b42e98bc64e47a

                SHA512

                902f78d9a5ae12dca79bdeb5be0f8e1dc7fb542dd104c45912cff0296d15b5eb459ea7438ef054cd7e2ff06301b1a1e7367bafa5b1abf38b464b608c84bb8d6a

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0410572.exe
                Filesize

                903KB

                MD5

                e5a2072a5023f0904155f2017ed2e102

                SHA1

                5444912cafe3e91c8e8a7224a6ffc46c90e1fb12

                SHA256

                38b5aba80b591c6079b76e61bd1039b4ed522a3cb2fb13c8d5b42e98bc64e47a

                SHA512

                902f78d9a5ae12dca79bdeb5be0f8e1dc7fb542dd104c45912cff0296d15b5eb459ea7438ef054cd7e2ff06301b1a1e7367bafa5b1abf38b464b608c84bb8d6a

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0410572.exe
                Filesize

                903KB

                MD5

                e5a2072a5023f0904155f2017ed2e102

                SHA1

                5444912cafe3e91c8e8a7224a6ffc46c90e1fb12

                SHA256

                38b5aba80b591c6079b76e61bd1039b4ed522a3cb2fb13c8d5b42e98bc64e47a

                SHA512

                902f78d9a5ae12dca79bdeb5be0f8e1dc7fb542dd104c45912cff0296d15b5eb459ea7438ef054cd7e2ff06301b1a1e7367bafa5b1abf38b464b608c84bb8d6a

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8912077.exe
                Filesize

                305KB

                MD5

                7692a525459593e4a08ae701a9fc5b54

                SHA1

                837e630c3e934a6d9753a9637b8952cd0d5b509b

                SHA256

                f7c5563e427d0dea5a80e84b503da5652f8fb2d6f002042fd1dd130ec88472c5

                SHA512

                c783ff4120ed94bd2ff552a228654196ddd948a8ab8f93a00275bc297be8da13fae59e0fab45a390ec2db6965e03900abcd010d3281ffa22bbdf38801e04c181

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8912077.exe
                Filesize

                305KB

                MD5

                7692a525459593e4a08ae701a9fc5b54

                SHA1

                837e630c3e934a6d9753a9637b8952cd0d5b509b

                SHA256

                f7c5563e427d0dea5a80e84b503da5652f8fb2d6f002042fd1dd130ec88472c5

                SHA512

                c783ff4120ed94bd2ff552a228654196ddd948a8ab8f93a00275bc297be8da13fae59e0fab45a390ec2db6965e03900abcd010d3281ffa22bbdf38801e04c181

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0689072.exe
                Filesize

                183KB

                MD5

                8698ac9522fc7dc2dd6552ad04638ac0

                SHA1

                5f097b21011bee22719dd2f1011d61e923955964

                SHA256

                42cc7ab8366af35c2b7f6456a8e42e5c97c00dd3bff8d850d19ea4e897e7c76b

                SHA512

                e1615a5a139c4c21a7a4c493a71357d8710593c61b5ad6ad81f19418b53f5c5acfd6729075d7baeb26178aedcb51f7d7aaa0fdef95f2309dd29ebbd542e2a745

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0689072.exe
                Filesize

                183KB

                MD5

                8698ac9522fc7dc2dd6552ad04638ac0

                SHA1

                5f097b21011bee22719dd2f1011d61e923955964

                SHA256

                42cc7ab8366af35c2b7f6456a8e42e5c97c00dd3bff8d850d19ea4e897e7c76b

                SHA512

                e1615a5a139c4c21a7a4c493a71357d8710593c61b5ad6ad81f19418b53f5c5acfd6729075d7baeb26178aedcb51f7d7aaa0fdef95f2309dd29ebbd542e2a745

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1377043.exe
                Filesize

                145KB

                MD5

                8402228ac97052c7406c7efdaf3559bd

                SHA1

                97ac14e064bc057af6bdd92542554bb52719cf28

                SHA256

                efa87a05dad51ecedb97db32bb05f0ff7088122e0271e21cb6ecfe9ebb5adae2

                SHA512

                fc966e845f1303010656b1b61819401d06975934b574e814b144bfb2713bb3b1762791446b1f6920b8c1f973b458a2a6c0b86feb7f67204de8e38b700f16f711

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1377043.exe
                Filesize

                145KB

                MD5

                8402228ac97052c7406c7efdaf3559bd

                SHA1

                97ac14e064bc057af6bdd92542554bb52719cf28

                SHA256

                efa87a05dad51ecedb97db32bb05f0ff7088122e0271e21cb6ecfe9ebb5adae2

                SHA512

                fc966e845f1303010656b1b61819401d06975934b574e814b144bfb2713bb3b1762791446b1f6920b8c1f973b458a2a6c0b86feb7f67204de8e38b700f16f711

              • memory/212-198-0x0000000005340000-0x0000000005350000-memory.dmp
                Filesize

                64KB

              • memory/212-202-0x00000000070A0000-0x00000000075CC000-memory.dmp
                Filesize

                5.2MB

              • memory/212-201-0x0000000006210000-0x00000000063D2000-memory.dmp
                Filesize

                1.8MB

              • memory/212-200-0x0000000005F70000-0x0000000006002000-memory.dmp
                Filesize

                584KB

              • memory/212-199-0x00000000053C0000-0x0000000005426000-memory.dmp
                Filesize

                408KB

              • memory/212-204-0x00000000064F0000-0x0000000006540000-memory.dmp
                Filesize

                320KB

              • memory/212-197-0x0000000005340000-0x0000000005350000-memory.dmp
                Filesize

                64KB

              • memory/212-196-0x00000000050B0000-0x00000000050EC000-memory.dmp
                Filesize

                240KB

              • memory/212-195-0x0000000005050000-0x0000000005062000-memory.dmp
                Filesize

                72KB

              • memory/212-203-0x0000000006B70000-0x0000000006BE6000-memory.dmp
                Filesize

                472KB

              • memory/212-192-0x00000000007C0000-0x00000000007EA000-memory.dmp
                Filesize

                168KB

              • memory/212-193-0x00000000055A0000-0x0000000005BB8000-memory.dmp
                Filesize

                6.1MB

              • memory/212-194-0x0000000005120000-0x000000000522A000-memory.dmp
                Filesize

                1.0MB

              • memory/2996-219-0x0000000005510000-0x0000000005520000-memory.dmp
                Filesize

                64KB

              • memory/2996-242-0x0000000005510000-0x0000000005520000-memory.dmp
                Filesize

                64KB

              • memory/2996-211-0x0000000000400000-0x000000000042A000-memory.dmp
                Filesize

                168KB

              • memory/3288-209-0x0000000000720000-0x0000000000808000-memory.dmp
                Filesize

                928KB

              • memory/3288-210-0x0000000007600000-0x0000000007610000-memory.dmp
                Filesize

                64KB

              • memory/4240-251-0x0000000000400000-0x0000000000438000-memory.dmp
                Filesize

                224KB

              • memory/4240-250-0x0000000000400000-0x0000000000438000-memory.dmp
                Filesize

                224KB

              • memory/4240-247-0x0000000000400000-0x0000000000438000-memory.dmp
                Filesize

                224KB

              • memory/4240-248-0x0000000000400000-0x0000000000438000-memory.dmp
                Filesize

                224KB

              • memory/4284-243-0x0000000002660000-0x0000000002670000-memory.dmp
                Filesize

                64KB

              • memory/4880-156-0x0000000004BC0000-0x0000000004BD0000-memory.dmp
                Filesize

                64KB

              • memory/4880-158-0x0000000002460000-0x0000000002476000-memory.dmp
                Filesize

                88KB

              • memory/4880-171-0x0000000002460000-0x0000000002476000-memory.dmp
                Filesize

                88KB

              • memory/4880-173-0x0000000002460000-0x0000000002476000-memory.dmp
                Filesize

                88KB

              • memory/4880-175-0x0000000002460000-0x0000000002476000-memory.dmp
                Filesize

                88KB

              • memory/4880-167-0x0000000002460000-0x0000000002476000-memory.dmp
                Filesize

                88KB

              • memory/4880-165-0x0000000002460000-0x0000000002476000-memory.dmp
                Filesize

                88KB

              • memory/4880-163-0x0000000002460000-0x0000000002476000-memory.dmp
                Filesize

                88KB

              • memory/4880-161-0x0000000002460000-0x0000000002476000-memory.dmp
                Filesize

                88KB

              • memory/4880-186-0x0000000004BC0000-0x0000000004BD0000-memory.dmp
                Filesize

                64KB

              • memory/4880-159-0x0000000002460000-0x0000000002476000-memory.dmp
                Filesize

                88KB

              • memory/4880-185-0x0000000002460000-0x0000000002476000-memory.dmp
                Filesize

                88KB

              • memory/4880-183-0x0000000002460000-0x0000000002476000-memory.dmp
                Filesize

                88KB

              • memory/4880-169-0x0000000002460000-0x0000000002476000-memory.dmp
                Filesize

                88KB

              • memory/4880-181-0x0000000002460000-0x0000000002476000-memory.dmp
                Filesize

                88KB

              • memory/4880-154-0x0000000004BD0000-0x0000000005174000-memory.dmp
                Filesize

                5.6MB

              • memory/4880-179-0x0000000002460000-0x0000000002476000-memory.dmp
                Filesize

                88KB

              • memory/4880-157-0x0000000004BC0000-0x0000000004BD0000-memory.dmp
                Filesize

                64KB

              • memory/4880-187-0x0000000004BC0000-0x0000000004BD0000-memory.dmp
                Filesize

                64KB

              • memory/4880-177-0x0000000002460000-0x0000000002476000-memory.dmp
                Filesize

                88KB

              • memory/4880-155-0x0000000004BC0000-0x0000000004BD0000-memory.dmp
                Filesize

                64KB

              • memory/5112-241-0x0000000000400000-0x0000000000438000-memory.dmp
                Filesize

                224KB

              • memory/5112-227-0x0000000000400000-0x0000000000438000-memory.dmp
                Filesize

                224KB

              • memory/5112-225-0x0000000000400000-0x0000000000438000-memory.dmp
                Filesize

                224KB

              • memory/5112-224-0x0000000000400000-0x0000000000438000-memory.dmp
                Filesize

                224KB

              • memory/5112-221-0x0000000000400000-0x0000000000438000-memory.dmp
                Filesize

                224KB

              • memory/5116-220-0x0000000007EF0000-0x0000000007F00000-memory.dmp
                Filesize

                64KB

              • memory/5116-218-0x0000000000FD0000-0x00000000010C6000-memory.dmp
                Filesize

                984KB