Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2023, 16:56

General

  • Target

    f86399c5f44c45da42b78663731c1a04777e9755e142ce149a5489dbddf6b2e6.exe

  • Size

    1.1MB

  • MD5

    11ffc425aa7ffad9b31bf6103d0ff2d5

  • SHA1

    0327fe93183eca081fc02981e483ae94976c14c8

  • SHA256

    f86399c5f44c45da42b78663731c1a04777e9755e142ce149a5489dbddf6b2e6

  • SHA512

    bdfca134b386badc60bac5807d268ff80a170e23bc6f57c25d61ea85c3326b43d88bbbd9f4883bd7bd5eb1b7e6eade65dbff6ece2d4dd62aa9a6ed0b89a4b840

  • SSDEEP

    24576:pys3QoQfcPtfFnowywmUgxRyWEUmOyrmW:c7stdnolwmBRyWFW

Malware Config

Extracted

Family

redline

Botnet

laris

C2

185.161.248.25:4132

Attributes
  • auth_value

    8774964465c41ab67a0a17432b084e1e

Extracted

Family

redline

Botnet

naher

C2

185.161.248.25:4132

Attributes
  • auth_value

    91f06fcf80f600c56b2797e1c73d214d

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f86399c5f44c45da42b78663731c1a04777e9755e142ce149a5489dbddf6b2e6.exe
    "C:\Users\Admin\AppData\Local\Temp\f86399c5f44c45da42b78663731c1a04777e9755e142ce149a5489dbddf6b2e6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4348
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4532845.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4532845.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3712012.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3712012.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3712
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1435889.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1435889.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:560
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1826556.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1826556.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3908
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4828016.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4828016.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:376
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4828016.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4828016.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1536
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9118387.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9118387.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3116
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9118387.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9118387.exe
        3⤵
        • Executes dropped EXE
        PID:1520
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9118387.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9118387.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        PID:892
        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
          "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3852
          • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1468
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legends.exe /TR "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:1240
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legends.exe" /P "Admin:N"&&CACLS "legends.exe" /P "Admin:R" /E&&echo Y|CACLS "..\41bde21dc7" /P "Admin:N"&&CACLS "..\41bde21dc7" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:216
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:1424
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "legends.exe" /P "Admin:N"
                  7⤵
                    PID:4028
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "legends.exe" /P "Admin:R" /E
                    7⤵
                      PID:1656
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:3688
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\41bde21dc7" /P "Admin:N"
                        7⤵
                          PID:3044
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\41bde21dc7" /P "Admin:R" /E
                          7⤵
                            PID:3612
              • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                1⤵
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                PID:5072
                • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                  C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                  2⤵
                    PID:1320
                  • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                    C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                    2⤵
                      PID:4024

                  Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\legends.exe.log

                          Filesize

                          425B

                          MD5

                          4eaca4566b22b01cd3bc115b9b0b2196

                          SHA1

                          e743e0792c19f71740416e7b3c061d9f1336bf94

                          SHA256

                          34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

                          SHA512

                          bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\r4828016.exe.log

                          Filesize

                          425B

                          MD5

                          4eaca4566b22b01cd3bc115b9b0b2196

                          SHA1

                          e743e0792c19f71740416e7b3c061d9f1336bf94

                          SHA256

                          34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

                          SHA512

                          bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9118387.exe

                          Filesize

                          963KB

                          MD5

                          a684c2982fcdeb817b8510487502a859

                          SHA1

                          a081502de04c06f507ba54c01d839241be2a76f9

                          SHA256

                          1ec36605bddfc9294da9759518bf1a89ff1eb61c9b7f1f66889114f30f00cc19

                          SHA512

                          18ce7e4df9b5b32b9eeca6c983fa354e0e606ca8376be9976f2bbdacbac67a643b9574378d1b71cde5e85ab8f6028b53190435bb97d74a14050ab10783b2eaa1

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9118387.exe

                          Filesize

                          963KB

                          MD5

                          a684c2982fcdeb817b8510487502a859

                          SHA1

                          a081502de04c06f507ba54c01d839241be2a76f9

                          SHA256

                          1ec36605bddfc9294da9759518bf1a89ff1eb61c9b7f1f66889114f30f00cc19

                          SHA512

                          18ce7e4df9b5b32b9eeca6c983fa354e0e606ca8376be9976f2bbdacbac67a643b9574378d1b71cde5e85ab8f6028b53190435bb97d74a14050ab10783b2eaa1

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9118387.exe

                          Filesize

                          963KB

                          MD5

                          a684c2982fcdeb817b8510487502a859

                          SHA1

                          a081502de04c06f507ba54c01d839241be2a76f9

                          SHA256

                          1ec36605bddfc9294da9759518bf1a89ff1eb61c9b7f1f66889114f30f00cc19

                          SHA512

                          18ce7e4df9b5b32b9eeca6c983fa354e0e606ca8376be9976f2bbdacbac67a643b9574378d1b71cde5e85ab8f6028b53190435bb97d74a14050ab10783b2eaa1

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9118387.exe

                          Filesize

                          963KB

                          MD5

                          a684c2982fcdeb817b8510487502a859

                          SHA1

                          a081502de04c06f507ba54c01d839241be2a76f9

                          SHA256

                          1ec36605bddfc9294da9759518bf1a89ff1eb61c9b7f1f66889114f30f00cc19

                          SHA512

                          18ce7e4df9b5b32b9eeca6c983fa354e0e606ca8376be9976f2bbdacbac67a643b9574378d1b71cde5e85ab8f6028b53190435bb97d74a14050ab10783b2eaa1

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4532845.exe

                          Filesize

                          702KB

                          MD5

                          11f9cc62c3a95d1814d3fa3c8aebf581

                          SHA1

                          412c03457007af0d3705f3032e63d9be25151126

                          SHA256

                          ae7db3db3af2fb9bc23d08ebc62d5b7dc6bf03d5c1e5050625c2fee6ebef4a49

                          SHA512

                          d47239ef1a7979c93c5779f61a9808a596cef48c6450cd74cfc702871aca3f1590d96c4d657808bf1dd7eb2d747c48cd847af35fc0d090b2094c9b2465ad2937

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4532845.exe

                          Filesize

                          702KB

                          MD5

                          11f9cc62c3a95d1814d3fa3c8aebf581

                          SHA1

                          412c03457007af0d3705f3032e63d9be25151126

                          SHA256

                          ae7db3db3af2fb9bc23d08ebc62d5b7dc6bf03d5c1e5050625c2fee6ebef4a49

                          SHA512

                          d47239ef1a7979c93c5779f61a9808a596cef48c6450cd74cfc702871aca3f1590d96c4d657808bf1dd7eb2d747c48cd847af35fc0d090b2094c9b2465ad2937

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4828016.exe

                          Filesize

                          904KB

                          MD5

                          5644556bd13057a165a13ab0fcb349d8

                          SHA1

                          5d2ed5a10fa362bbf8aa6b7be10ec4acbe440c9f

                          SHA256

                          9482d9bfa40fdcf79b95db0b21473ac3daaadc69389b7620815858720b8312c8

                          SHA512

                          a143a233fdc2cabfba9580a7dbb8aa6112cbabc982beccb7765f757f1f54909af0af9a1cbce5cddcb46c7c7220eacd5dc84dd7a1879c6f5ce614477ee95bb20c

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4828016.exe

                          Filesize

                          904KB

                          MD5

                          5644556bd13057a165a13ab0fcb349d8

                          SHA1

                          5d2ed5a10fa362bbf8aa6b7be10ec4acbe440c9f

                          SHA256

                          9482d9bfa40fdcf79b95db0b21473ac3daaadc69389b7620815858720b8312c8

                          SHA512

                          a143a233fdc2cabfba9580a7dbb8aa6112cbabc982beccb7765f757f1f54909af0af9a1cbce5cddcb46c7c7220eacd5dc84dd7a1879c6f5ce614477ee95bb20c

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4828016.exe

                          Filesize

                          904KB

                          MD5

                          5644556bd13057a165a13ab0fcb349d8

                          SHA1

                          5d2ed5a10fa362bbf8aa6b7be10ec4acbe440c9f

                          SHA256

                          9482d9bfa40fdcf79b95db0b21473ac3daaadc69389b7620815858720b8312c8

                          SHA512

                          a143a233fdc2cabfba9580a7dbb8aa6112cbabc982beccb7765f757f1f54909af0af9a1cbce5cddcb46c7c7220eacd5dc84dd7a1879c6f5ce614477ee95bb20c

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3712012.exe

                          Filesize

                          306KB

                          MD5

                          9746fd89b02943b18ec19ce4788bdc95

                          SHA1

                          d5e9ee9a4ef7891336b8c8a43f55fceee029b388

                          SHA256

                          1a8e33b0d31f7d8ae389abdddd547b77614cd850216b7f56d029e229e1839ede

                          SHA512

                          df044212db3c9dc1e6f161af4bb577cd9c4881b3922daaec8c32e61471eb63364e078a4a497d3ab92ab7c6f07befb62e10611fe81c93655418b372f881b178e0

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3712012.exe

                          Filesize

                          306KB

                          MD5

                          9746fd89b02943b18ec19ce4788bdc95

                          SHA1

                          d5e9ee9a4ef7891336b8c8a43f55fceee029b388

                          SHA256

                          1a8e33b0d31f7d8ae389abdddd547b77614cd850216b7f56d029e229e1839ede

                          SHA512

                          df044212db3c9dc1e6f161af4bb577cd9c4881b3922daaec8c32e61471eb63364e078a4a497d3ab92ab7c6f07befb62e10611fe81c93655418b372f881b178e0

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1435889.exe

                          Filesize

                          185KB

                          MD5

                          ad39065e16a5af5136a359425d9ebfde

                          SHA1

                          1ea51d14ac41969b6645c628cfb592adc94625eb

                          SHA256

                          1ca27d4da4bbf248af0a0f033beda10c5cae50b4a9a96ed5878f23d2729e6975

                          SHA512

                          15bffd7a07458d6dbe543c971eedae576074a59d40a1aafa82bdbeced5a93b41326efedcc44f64dea713131e0d369e7725df4a3d82489565f979c8139400ebee

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1435889.exe

                          Filesize

                          185KB

                          MD5

                          ad39065e16a5af5136a359425d9ebfde

                          SHA1

                          1ea51d14ac41969b6645c628cfb592adc94625eb

                          SHA256

                          1ca27d4da4bbf248af0a0f033beda10c5cae50b4a9a96ed5878f23d2729e6975

                          SHA512

                          15bffd7a07458d6dbe543c971eedae576074a59d40a1aafa82bdbeced5a93b41326efedcc44f64dea713131e0d369e7725df4a3d82489565f979c8139400ebee

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1826556.exe

                          Filesize

                          145KB

                          MD5

                          033142de5950ee812fc6013df2f83dfe

                          SHA1

                          42c49fd579926b165dfaba99ae207ee4f85c133b

                          SHA256

                          aa19b7d9c5bb70270f5233595ea50f9979926247eb56b0b75f16822e0b1f86ba

                          SHA512

                          c3e6dfb40a01503e6e0eb99a93de05c5df8411a08625485d6ba17011c79486ac8b8d2a6c625429a746f701eba39edaa9c8320f7c7275f318663c324435ce8216

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1826556.exe

                          Filesize

                          145KB

                          MD5

                          033142de5950ee812fc6013df2f83dfe

                          SHA1

                          42c49fd579926b165dfaba99ae207ee4f85c133b

                          SHA256

                          aa19b7d9c5bb70270f5233595ea50f9979926247eb56b0b75f16822e0b1f86ba

                          SHA512

                          c3e6dfb40a01503e6e0eb99a93de05c5df8411a08625485d6ba17011c79486ac8b8d2a6c625429a746f701eba39edaa9c8320f7c7275f318663c324435ce8216

                        • memory/376-211-0x00000000075A0000-0x00000000075B0000-memory.dmp

                          Filesize

                          64KB

                        • memory/376-210-0x0000000000860000-0x0000000000948000-memory.dmp

                          Filesize

                          928KB

                        • memory/560-173-0x0000000004960000-0x0000000004977000-memory.dmp

                          Filesize

                          92KB

                        • memory/560-155-0x0000000004AB0000-0x0000000005054000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/560-181-0x0000000004960000-0x0000000004977000-memory.dmp

                          Filesize

                          92KB

                        • memory/560-183-0x0000000004960000-0x0000000004977000-memory.dmp

                          Filesize

                          92KB

                        • memory/560-184-0x0000000004AA0000-0x0000000004AB0000-memory.dmp

                          Filesize

                          64KB

                        • memory/560-185-0x0000000004AA0000-0x0000000004AB0000-memory.dmp

                          Filesize

                          64KB

                        • memory/560-186-0x0000000004AA0000-0x0000000004AB0000-memory.dmp

                          Filesize

                          64KB

                        • memory/560-187-0x0000000004AA0000-0x0000000004AB0000-memory.dmp

                          Filesize

                          64KB

                        • memory/560-188-0x0000000004AA0000-0x0000000004AB0000-memory.dmp

                          Filesize

                          64KB

                        • memory/560-177-0x0000000004960000-0x0000000004977000-memory.dmp

                          Filesize

                          92KB

                        • memory/560-175-0x0000000004960000-0x0000000004977000-memory.dmp

                          Filesize

                          92KB

                        • memory/560-154-0x0000000004AA0000-0x0000000004AB0000-memory.dmp

                          Filesize

                          64KB

                        • memory/560-179-0x0000000004960000-0x0000000004977000-memory.dmp

                          Filesize

                          92KB

                        • memory/560-156-0x0000000004960000-0x0000000004977000-memory.dmp

                          Filesize

                          92KB

                        • memory/560-157-0x0000000004960000-0x0000000004977000-memory.dmp

                          Filesize

                          92KB

                        • memory/560-159-0x0000000004960000-0x0000000004977000-memory.dmp

                          Filesize

                          92KB

                        • memory/560-161-0x0000000004960000-0x0000000004977000-memory.dmp

                          Filesize

                          92KB

                        • memory/560-163-0x0000000004960000-0x0000000004977000-memory.dmp

                          Filesize

                          92KB

                        • memory/560-165-0x0000000004960000-0x0000000004977000-memory.dmp

                          Filesize

                          92KB

                        • memory/560-167-0x0000000004960000-0x0000000004977000-memory.dmp

                          Filesize

                          92KB

                        • memory/560-169-0x0000000004960000-0x0000000004977000-memory.dmp

                          Filesize

                          92KB

                        • memory/560-171-0x0000000004960000-0x0000000004977000-memory.dmp

                          Filesize

                          92KB

                        • memory/892-230-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/892-223-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/892-226-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/1468-236-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/1468-235-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/1468-238-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/1468-239-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/1536-232-0x0000000005320000-0x0000000005330000-memory.dmp

                          Filesize

                          64KB

                        • memory/1536-212-0x0000000000400000-0x000000000042A000-memory.dmp

                          Filesize

                          168KB

                        • memory/1536-220-0x0000000005320000-0x0000000005330000-memory.dmp

                          Filesize

                          64KB

                        • memory/3116-221-0x00000000076F0000-0x0000000007700000-memory.dmp

                          Filesize

                          64KB

                        • memory/3116-219-0x00000000007C0000-0x00000000008B8000-memory.dmp

                          Filesize

                          992KB

                        • memory/3852-231-0x0000000007CA0000-0x0000000007CB0000-memory.dmp

                          Filesize

                          64KB

                        • memory/3908-199-0x0000000005700000-0x0000000005710000-memory.dmp

                          Filesize

                          64KB

                        • memory/3908-202-0x0000000006DD0000-0x0000000006F92000-memory.dmp

                          Filesize

                          1.8MB

                        • memory/3908-196-0x0000000005670000-0x0000000005682000-memory.dmp

                          Filesize

                          72KB

                        • memory/3908-194-0x0000000005C50000-0x0000000006268000-memory.dmp

                          Filesize

                          6.1MB

                        • memory/3908-197-0x0000000005850000-0x000000000588C000-memory.dmp

                          Filesize

                          240KB

                        • memory/3908-198-0x0000000005700000-0x0000000005710000-memory.dmp

                          Filesize

                          64KB

                        • memory/3908-204-0x00000000070A0000-0x0000000007116000-memory.dmp

                          Filesize

                          472KB

                        • memory/3908-200-0x0000000005B40000-0x0000000005BD2000-memory.dmp

                          Filesize

                          584KB

                        • memory/3908-201-0x0000000005BE0000-0x0000000005C46000-memory.dmp

                          Filesize

                          408KB

                        • memory/3908-195-0x0000000005740000-0x000000000584A000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/3908-203-0x00000000074D0000-0x00000000079FC000-memory.dmp

                          Filesize

                          5.2MB

                        • memory/3908-205-0x0000000007120000-0x0000000007170000-memory.dmp

                          Filesize

                          320KB

                        • memory/3908-193-0x0000000000DE0000-0x0000000000E0A000-memory.dmp

                          Filesize

                          168KB

                        • memory/4024-244-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/4024-245-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/4024-246-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/5072-242-0x0000000007720000-0x0000000007730000-memory.dmp

                          Filesize

                          64KB