Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2023 18:32

General

  • Target

    c46e12e7a08cfd17858543a034ae370ec8d3568c99e92d50913af07b365ca804.exe

  • Size

    1.1MB

  • MD5

    4b8a519411dc1ed17be7ba4f65f87412

  • SHA1

    492df258d68db191ff69786ca91456901f24a4e0

  • SHA256

    c46e12e7a08cfd17858543a034ae370ec8d3568c99e92d50913af07b365ca804

  • SHA512

    ef66783d35dd42024c93115fc6deecdfe5c93552de00305c711b4d9387834827ba06090de364ea121caed3e171aff64b7072fd351f908787b7f08b02d0901d27

  • SSDEEP

    24576:xyTKavwsxDN8rkNXw0c9FI5eg33Jxaf7snPYxyZRoFHTN6VvHA8:kTFvTD3NXRACrxlEyZRGh6Bg

Malware Config

Extracted

Family

redline

Botnet

luka

C2

185.161.248.75:4132

Attributes
  • auth_value

    44560bcd37d6bf076da309730fdb519a

Extracted

Family

redline

Botnet

terra

C2

185.161.248.75:4132

Attributes
  • auth_value

    60df3f535f8aa4e264f78041983592d2

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c46e12e7a08cfd17858543a034ae370ec8d3568c99e92d50913af07b365ca804.exe
    "C:\Users\Admin\AppData\Local\Temp\c46e12e7a08cfd17858543a034ae370ec8d3568c99e92d50913af07b365ca804.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4380
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9053206.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9053206.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3432
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5631244.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5631244.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:5100
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3259729.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3259729.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2436
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8704566.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8704566.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2844
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 928
            5⤵
            • Program crash
            PID:792
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6744974.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6744974.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:572
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6744974.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6744974.exe
          4⤵
          • Executes dropped EXE
          PID:4572
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6193817.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6193817.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3488
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6193817.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6193817.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4940
        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
          "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3900
          • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            5⤵
            • Executes dropped EXE
            PID:1792
          • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:5024
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legends.exe /TR "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:4328
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legends.exe" /P "Admin:N"&&CACLS "legends.exe" /P "Admin:R" /E&&echo Y|CACLS "..\41bde21dc7" /P "Admin:N"&&CACLS "..\41bde21dc7" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4548
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:1272
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "legends.exe" /P "Admin:N"
                  7⤵
                    PID:3604
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "legends.exe" /P "Admin:R" /E
                    7⤵
                      PID:1252
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:2032
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\41bde21dc7" /P "Admin:N"
                        7⤵
                          PID:496
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\41bde21dc7" /P "Admin:R" /E
                          7⤵
                            PID:1560
              • C:\Windows\system32\WerFaultSecure.exe
                "C:\Windows\system32\WerFaultSecure.exe" -protectedcrash -p 2364 -i 2364 -h 460 -j 420 -s 456 -d 4704
                1⤵
                  PID:3892
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2844 -ip 2844
                  1⤵
                    PID:1196

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Execution

                  Scheduled Task

                  1
                  T1053

                  Persistence

                  Modify Existing Service

                  1
                  T1031

                  Registry Run Keys / Startup Folder

                  1
                  T1060

                  Scheduled Task

                  1
                  T1053

                  Privilege Escalation

                  Scheduled Task

                  1
                  T1053

                  Defense Evasion

                  Modify Registry

                  3
                  T1112

                  Disabling Security Tools

                  2
                  T1089

                  Discovery

                  Query Registry

                  1
                  T1012

                  System Information Discovery

                  2
                  T1082

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                    Filesize

                    961KB

                    MD5

                    a4e75327e7950737324decfd158ea137

                    SHA1

                    5d1f5cd1eca1c69e6a9c98e3889c05d9ee4aecae

                    SHA256

                    52834d9b9dc23d4152d3cddce15dd95d7ef3acd4047058072dc564f0aa80fd56

                    SHA512

                    70076568d280bbf2965b71a82a0982b9f50696611add79d71773f204a5d1cf55b098182411a886d813e2cfc00a7fae88f8123f9cf3cea0b84ec3e413291e901b

                  • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                    Filesize

                    961KB

                    MD5

                    a4e75327e7950737324decfd158ea137

                    SHA1

                    5d1f5cd1eca1c69e6a9c98e3889c05d9ee4aecae

                    SHA256

                    52834d9b9dc23d4152d3cddce15dd95d7ef3acd4047058072dc564f0aa80fd56

                    SHA512

                    70076568d280bbf2965b71a82a0982b9f50696611add79d71773f204a5d1cf55b098182411a886d813e2cfc00a7fae88f8123f9cf3cea0b84ec3e413291e901b

                  • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                    Filesize

                    961KB

                    MD5

                    a4e75327e7950737324decfd158ea137

                    SHA1

                    5d1f5cd1eca1c69e6a9c98e3889c05d9ee4aecae

                    SHA256

                    52834d9b9dc23d4152d3cddce15dd95d7ef3acd4047058072dc564f0aa80fd56

                    SHA512

                    70076568d280bbf2965b71a82a0982b9f50696611add79d71773f204a5d1cf55b098182411a886d813e2cfc00a7fae88f8123f9cf3cea0b84ec3e413291e901b

                  • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                    Filesize

                    961KB

                    MD5

                    a4e75327e7950737324decfd158ea137

                    SHA1

                    5d1f5cd1eca1c69e6a9c98e3889c05d9ee4aecae

                    SHA256

                    52834d9b9dc23d4152d3cddce15dd95d7ef3acd4047058072dc564f0aa80fd56

                    SHA512

                    70076568d280bbf2965b71a82a0982b9f50696611add79d71773f204a5d1cf55b098182411a886d813e2cfc00a7fae88f8123f9cf3cea0b84ec3e413291e901b

                  • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                    Filesize

                    961KB

                    MD5

                    a4e75327e7950737324decfd158ea137

                    SHA1

                    5d1f5cd1eca1c69e6a9c98e3889c05d9ee4aecae

                    SHA256

                    52834d9b9dc23d4152d3cddce15dd95d7ef3acd4047058072dc564f0aa80fd56

                    SHA512

                    70076568d280bbf2965b71a82a0982b9f50696611add79d71773f204a5d1cf55b098182411a886d813e2cfc00a7fae88f8123f9cf3cea0b84ec3e413291e901b

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6193817.exe
                    Filesize

                    961KB

                    MD5

                    a4e75327e7950737324decfd158ea137

                    SHA1

                    5d1f5cd1eca1c69e6a9c98e3889c05d9ee4aecae

                    SHA256

                    52834d9b9dc23d4152d3cddce15dd95d7ef3acd4047058072dc564f0aa80fd56

                    SHA512

                    70076568d280bbf2965b71a82a0982b9f50696611add79d71773f204a5d1cf55b098182411a886d813e2cfc00a7fae88f8123f9cf3cea0b84ec3e413291e901b

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6193817.exe
                    Filesize

                    961KB

                    MD5

                    a4e75327e7950737324decfd158ea137

                    SHA1

                    5d1f5cd1eca1c69e6a9c98e3889c05d9ee4aecae

                    SHA256

                    52834d9b9dc23d4152d3cddce15dd95d7ef3acd4047058072dc564f0aa80fd56

                    SHA512

                    70076568d280bbf2965b71a82a0982b9f50696611add79d71773f204a5d1cf55b098182411a886d813e2cfc00a7fae88f8123f9cf3cea0b84ec3e413291e901b

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6193817.exe
                    Filesize

                    961KB

                    MD5

                    a4e75327e7950737324decfd158ea137

                    SHA1

                    5d1f5cd1eca1c69e6a9c98e3889c05d9ee4aecae

                    SHA256

                    52834d9b9dc23d4152d3cddce15dd95d7ef3acd4047058072dc564f0aa80fd56

                    SHA512

                    70076568d280bbf2965b71a82a0982b9f50696611add79d71773f204a5d1cf55b098182411a886d813e2cfc00a7fae88f8123f9cf3cea0b84ec3e413291e901b

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9053206.exe
                    Filesize

                    703KB

                    MD5

                    d3d28146f4f5bac952bb61bf0ffcf449

                    SHA1

                    a78fb83fc2a3e6f8a0a8f8b21cedab360cefb9dc

                    SHA256

                    89a04d715e57f423d678d95cf7cb7a87dc5b4277cde36638a83b552f481ee2c0

                    SHA512

                    9e6420195a3fe3f5d831d2b00496558fadadacc3c76594590814b6e0f8cdf76462ceb20e26a011b3b0227a9161c04557a7f0995485149d19ef5bde327ffeff17

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9053206.exe
                    Filesize

                    703KB

                    MD5

                    d3d28146f4f5bac952bb61bf0ffcf449

                    SHA1

                    a78fb83fc2a3e6f8a0a8f8b21cedab360cefb9dc

                    SHA256

                    89a04d715e57f423d678d95cf7cb7a87dc5b4277cde36638a83b552f481ee2c0

                    SHA512

                    9e6420195a3fe3f5d831d2b00496558fadadacc3c76594590814b6e0f8cdf76462ceb20e26a011b3b0227a9161c04557a7f0995485149d19ef5bde327ffeff17

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6744974.exe
                    Filesize

                    904KB

                    MD5

                    541ac92b2bb702221f1e9371ef4a6efe

                    SHA1

                    3a7dec92e3740087c8a6781c1bd579040d76fa81

                    SHA256

                    078cea27fa9d4af565ec6878ff7011783b76a55d34915cc0618380045307dc4a

                    SHA512

                    dfed2d2a6e336d3f9fa55a08680c75eeb18f1548840f5498762795226df13e9067f6988746e694bc63f11fb4caf720376d03401f592e8db55f86647d2a099b35

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6744974.exe
                    Filesize

                    904KB

                    MD5

                    541ac92b2bb702221f1e9371ef4a6efe

                    SHA1

                    3a7dec92e3740087c8a6781c1bd579040d76fa81

                    SHA256

                    078cea27fa9d4af565ec6878ff7011783b76a55d34915cc0618380045307dc4a

                    SHA512

                    dfed2d2a6e336d3f9fa55a08680c75eeb18f1548840f5498762795226df13e9067f6988746e694bc63f11fb4caf720376d03401f592e8db55f86647d2a099b35

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6744974.exe
                    Filesize

                    904KB

                    MD5

                    541ac92b2bb702221f1e9371ef4a6efe

                    SHA1

                    3a7dec92e3740087c8a6781c1bd579040d76fa81

                    SHA256

                    078cea27fa9d4af565ec6878ff7011783b76a55d34915cc0618380045307dc4a

                    SHA512

                    dfed2d2a6e336d3f9fa55a08680c75eeb18f1548840f5498762795226df13e9067f6988746e694bc63f11fb4caf720376d03401f592e8db55f86647d2a099b35

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5631244.exe
                    Filesize

                    306KB

                    MD5

                    70fbc0a3dc421cf6bc6727d9afe190d6

                    SHA1

                    f1bffbb2702247822684660cab2fe8ef201cdce2

                    SHA256

                    34861ff318feba68df3e0f0718e89e0ad6a0d51fc257b462cd5efcd3c8eb5a04

                    SHA512

                    6b32d0ea1b088340304516feb5e8cd80266d8c1b234010eade0e506120e2b0ca17dcb2f0d0432e56798b1dbb421c194542a9763f94d094dafc5d684beac6b446

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5631244.exe
                    Filesize

                    306KB

                    MD5

                    70fbc0a3dc421cf6bc6727d9afe190d6

                    SHA1

                    f1bffbb2702247822684660cab2fe8ef201cdce2

                    SHA256

                    34861ff318feba68df3e0f0718e89e0ad6a0d51fc257b462cd5efcd3c8eb5a04

                    SHA512

                    6b32d0ea1b088340304516feb5e8cd80266d8c1b234010eade0e506120e2b0ca17dcb2f0d0432e56798b1dbb421c194542a9763f94d094dafc5d684beac6b446

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3259729.exe
                    Filesize

                    185KB

                    MD5

                    ab0ef5383fce0cd9ebc4f854367f7e4d

                    SHA1

                    ad8111f07a1e2578aec7ca4905eeef5fdbf629f7

                    SHA256

                    166b4ecf093b07f0363abb8262984e29edaa81662ea3c68188ea6b83418273e3

                    SHA512

                    be98ffc82490da6b0795b0fe10dcd412d41f46576a3e6931f8d03fdfeb1907662d1bc3a969f8fc2c359b21e99fbfd652daeb213a72711ce9b85a7ec3f1b4f6ee

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3259729.exe
                    Filesize

                    185KB

                    MD5

                    ab0ef5383fce0cd9ebc4f854367f7e4d

                    SHA1

                    ad8111f07a1e2578aec7ca4905eeef5fdbf629f7

                    SHA256

                    166b4ecf093b07f0363abb8262984e29edaa81662ea3c68188ea6b83418273e3

                    SHA512

                    be98ffc82490da6b0795b0fe10dcd412d41f46576a3e6931f8d03fdfeb1907662d1bc3a969f8fc2c359b21e99fbfd652daeb213a72711ce9b85a7ec3f1b4f6ee

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8704566.exe
                    Filesize

                    145KB

                    MD5

                    244802eeb5ff362b4c6050f0fb2769a6

                    SHA1

                    49e75cb66389dd06cab2e36e88260829e7957db7

                    SHA256

                    f001fd879859689b5c99ea63815f7ca6d02f881ca4976f4f007fe32f5a96b330

                    SHA512

                    a04f4b26ddd785aa909090f31a86e9917caa575ff1a1418636b4ecbcf4f069f1089902d9d85a9bc82af9907b3484651bb6e9bbc1f972d1f39a92ace167f73114

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8704566.exe
                    Filesize

                    145KB

                    MD5

                    244802eeb5ff362b4c6050f0fb2769a6

                    SHA1

                    49e75cb66389dd06cab2e36e88260829e7957db7

                    SHA256

                    f001fd879859689b5c99ea63815f7ca6d02f881ca4976f4f007fe32f5a96b330

                    SHA512

                    a04f4b26ddd785aa909090f31a86e9917caa575ff1a1418636b4ecbcf4f069f1089902d9d85a9bc82af9907b3484651bb6e9bbc1f972d1f39a92ace167f73114

                  • memory/572-201-0x0000000007350000-0x0000000007360000-memory.dmp
                    Filesize

                    64KB

                  • memory/572-198-0x0000000007350000-0x0000000007360000-memory.dmp
                    Filesize

                    64KB

                  • memory/572-197-0x00000000005A0000-0x0000000000688000-memory.dmp
                    Filesize

                    928KB

                  • memory/2436-169-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
                    Filesize

                    88KB

                  • memory/2436-160-0x0000000004B60000-0x0000000004B70000-memory.dmp
                    Filesize

                    64KB

                  • memory/2436-185-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
                    Filesize

                    88KB

                  • memory/2436-186-0x0000000004B60000-0x0000000004B70000-memory.dmp
                    Filesize

                    64KB

                  • memory/2436-187-0x0000000004B60000-0x0000000004B70000-memory.dmp
                    Filesize

                    64KB

                  • memory/2436-188-0x0000000004B60000-0x0000000004B70000-memory.dmp
                    Filesize

                    64KB

                  • memory/2436-181-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
                    Filesize

                    88KB

                  • memory/2436-179-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
                    Filesize

                    88KB

                  • memory/2436-154-0x0000000004B70000-0x0000000005114000-memory.dmp
                    Filesize

                    5.6MB

                  • memory/2436-177-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
                    Filesize

                    88KB

                  • memory/2436-175-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
                    Filesize

                    88KB

                  • memory/2436-171-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
                    Filesize

                    88KB

                  • memory/2436-173-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
                    Filesize

                    88KB

                  • memory/2436-155-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
                    Filesize

                    88KB

                  • memory/2436-167-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
                    Filesize

                    88KB

                  • memory/2436-165-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
                    Filesize

                    88KB

                  • memory/2436-163-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
                    Filesize

                    88KB

                  • memory/2436-158-0x0000000004B60000-0x0000000004B70000-memory.dmp
                    Filesize

                    64KB

                  • memory/2436-156-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
                    Filesize

                    88KB

                  • memory/2436-159-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
                    Filesize

                    88KB

                  • memory/2436-183-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
                    Filesize

                    88KB

                  • memory/2436-162-0x0000000004B60000-0x0000000004B70000-memory.dmp
                    Filesize

                    64KB

                  • memory/2844-193-0x0000000000320000-0x000000000034A000-memory.dmp
                    Filesize

                    168KB

                  • memory/3488-207-0x0000000007C40000-0x0000000007C50000-memory.dmp
                    Filesize

                    64KB

                  • memory/3488-206-0x0000000000EC0000-0x0000000000FB6000-memory.dmp
                    Filesize

                    984KB

                  • memory/3900-235-0x0000000006FD0000-0x0000000006FE0000-memory.dmp
                    Filesize

                    64KB

                  • memory/3900-243-0x0000000006FD0000-0x0000000006FE0000-memory.dmp
                    Filesize

                    64KB

                  • memory/4572-199-0x0000000000400000-0x000000000042A000-memory.dmp
                    Filesize

                    168KB

                  • memory/4572-245-0x0000000005E00000-0x0000000005E66000-memory.dmp
                    Filesize

                    408KB

                  • memory/4572-212-0x00000000054D0000-0x00000000054E0000-memory.dmp
                    Filesize

                    64KB

                  • memory/4572-220-0x00000000054D0000-0x00000000054E0000-memory.dmp
                    Filesize

                    64KB

                  • memory/4572-208-0x0000000005750000-0x0000000005D68000-memory.dmp
                    Filesize

                    6.1MB

                  • memory/4572-210-0x00000000051F0000-0x0000000005202000-memory.dmp
                    Filesize

                    72KB

                  • memory/4572-211-0x0000000005250000-0x000000000528C000-memory.dmp
                    Filesize

                    240KB

                  • memory/4572-209-0x00000000052C0000-0x00000000053CA000-memory.dmp
                    Filesize

                    1.0MB

                  • memory/4940-219-0x0000000000400000-0x0000000000438000-memory.dmp
                    Filesize

                    224KB

                  • memory/4940-216-0x0000000000400000-0x0000000000438000-memory.dmp
                    Filesize

                    224KB

                  • memory/4940-213-0x0000000000400000-0x0000000000438000-memory.dmp
                    Filesize

                    224KB

                  • memory/4940-217-0x0000000000400000-0x0000000000438000-memory.dmp
                    Filesize

                    224KB

                  • memory/4940-234-0x0000000000400000-0x0000000000438000-memory.dmp
                    Filesize

                    224KB

                  • memory/5024-239-0x0000000000400000-0x0000000000438000-memory.dmp
                    Filesize

                    224KB

                  • memory/5024-240-0x0000000000400000-0x0000000000438000-memory.dmp
                    Filesize

                    224KB

                  • memory/5024-242-0x0000000000400000-0x0000000000438000-memory.dmp
                    Filesize

                    224KB

                  • memory/5024-246-0x0000000000400000-0x0000000000438000-memory.dmp
                    Filesize

                    224KB