Analysis

  • max time kernel
    135s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2023, 21:33

General

  • Target

    d7a348018704c681a5b706313440d081.exe

  • Size

    1021KB

  • MD5

    d7a348018704c681a5b706313440d081

  • SHA1

    21d53b237d9cac972ae8b9ccfe8454e4d77b3902

  • SHA256

    141be433bcb78f4b0460c5f4f1e133d08f236ab8a5ecd0b047ef2b6f85d50173

  • SHA512

    9788f34acc743187434cab8a3bd2576a704a4f270eed3fe15687c57f3eef14b1512777e88423bd8ca9ac11a26b18ade344661dee2547c41ee62f8fba283dce82

  • SSDEEP

    24576:UyXdEq3Tj7BvjqfA2008oEFUk19dJxvbivhfLw38c33NUE:jXx3Tj7RjqR00j+d19r4ZDw3da

Malware Config

Extracted

Family

redline

Botnet

laza

C2

77.91.124.251:19065

Attributes
  • auth_value

    c5e3b769b3929b25aad5a26e2354ccb9

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7a348018704c681a5b706313440d081.exe
    "C:\Users\Admin\AppData\Local\Temp\d7a348018704c681a5b706313440d081.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:372
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5233725.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5233725.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:872
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3784036.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3784036.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2032
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8214800.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8214800.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2732
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0697080.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0697080.exe
          4⤵
          • Executes dropped EXE
          PID:3868
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3868 -s 928
            5⤵
            • Program crash
            PID:1576
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9829883.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9829883.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1260
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8474472.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8474472.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:844
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8474472.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8474472.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2392
        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
          "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4652
          • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4200
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legends.exe /TR "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:4424
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legends.exe" /P "Admin:N"&&CACLS "legends.exe" /P "Admin:R" /E&&echo Y|CACLS "..\41bde21dc7" /P "Admin:N"&&CACLS "..\41bde21dc7" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1340
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:1508
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "legends.exe" /P "Admin:N"
                  7⤵
                    PID:1120
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "legends.exe" /P "Admin:R" /E
                    7⤵
                      PID:1556
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:3224
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\41bde21dc7" /P "Admin:N"
                        7⤵
                          PID:3180
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\41bde21dc7" /P "Admin:R" /E
                          7⤵
                            PID:2436
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                          6⤵
                          • Loads dropped DLL
                          PID:2580
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3868 -ip 3868
                1⤵
                  PID:4304
                • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                  C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                  1⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1852
                  • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                    C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                    2⤵
                    • Executes dropped EXE
                    PID:4720

                Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\legends.exe.log

                        Filesize

                        425B

                        MD5

                        4eaca4566b22b01cd3bc115b9b0b2196

                        SHA1

                        e743e0792c19f71740416e7b3c061d9f1336bf94

                        SHA256

                        34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

                        SHA512

                        bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

                      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                        Filesize

                        962KB

                        MD5

                        6097d3fc1a131dd8fd2be0e9271c1f1f

                        SHA1

                        8d4243a7f5fc4e043d4dd743b1fb4642b57690b6

                        SHA256

                        2868955691503aa2f65e589adacdf37f909472515a3f473a0a3e34f6529f1c88

                        SHA512

                        9344309405ce10f8a7d6a7e8ac729dbe4495dd17a04c710885d23647cf752153fa53090acfcb5ad9772609f4138aabd2b7afbc8e835a24f7fdaca0580833f154

                      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                        Filesize

                        962KB

                        MD5

                        6097d3fc1a131dd8fd2be0e9271c1f1f

                        SHA1

                        8d4243a7f5fc4e043d4dd743b1fb4642b57690b6

                        SHA256

                        2868955691503aa2f65e589adacdf37f909472515a3f473a0a3e34f6529f1c88

                        SHA512

                        9344309405ce10f8a7d6a7e8ac729dbe4495dd17a04c710885d23647cf752153fa53090acfcb5ad9772609f4138aabd2b7afbc8e835a24f7fdaca0580833f154

                      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                        Filesize

                        962KB

                        MD5

                        6097d3fc1a131dd8fd2be0e9271c1f1f

                        SHA1

                        8d4243a7f5fc4e043d4dd743b1fb4642b57690b6

                        SHA256

                        2868955691503aa2f65e589adacdf37f909472515a3f473a0a3e34f6529f1c88

                        SHA512

                        9344309405ce10f8a7d6a7e8ac729dbe4495dd17a04c710885d23647cf752153fa53090acfcb5ad9772609f4138aabd2b7afbc8e835a24f7fdaca0580833f154

                      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                        Filesize

                        962KB

                        MD5

                        6097d3fc1a131dd8fd2be0e9271c1f1f

                        SHA1

                        8d4243a7f5fc4e043d4dd743b1fb4642b57690b6

                        SHA256

                        2868955691503aa2f65e589adacdf37f909472515a3f473a0a3e34f6529f1c88

                        SHA512

                        9344309405ce10f8a7d6a7e8ac729dbe4495dd17a04c710885d23647cf752153fa53090acfcb5ad9772609f4138aabd2b7afbc8e835a24f7fdaca0580833f154

                      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                        Filesize

                        962KB

                        MD5

                        6097d3fc1a131dd8fd2be0e9271c1f1f

                        SHA1

                        8d4243a7f5fc4e043d4dd743b1fb4642b57690b6

                        SHA256

                        2868955691503aa2f65e589adacdf37f909472515a3f473a0a3e34f6529f1c88

                        SHA512

                        9344309405ce10f8a7d6a7e8ac729dbe4495dd17a04c710885d23647cf752153fa53090acfcb5ad9772609f4138aabd2b7afbc8e835a24f7fdaca0580833f154

                      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                        Filesize

                        962KB

                        MD5

                        6097d3fc1a131dd8fd2be0e9271c1f1f

                        SHA1

                        8d4243a7f5fc4e043d4dd743b1fb4642b57690b6

                        SHA256

                        2868955691503aa2f65e589adacdf37f909472515a3f473a0a3e34f6529f1c88

                        SHA512

                        9344309405ce10f8a7d6a7e8ac729dbe4495dd17a04c710885d23647cf752153fa53090acfcb5ad9772609f4138aabd2b7afbc8e835a24f7fdaca0580833f154

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8474472.exe

                        Filesize

                        962KB

                        MD5

                        6097d3fc1a131dd8fd2be0e9271c1f1f

                        SHA1

                        8d4243a7f5fc4e043d4dd743b1fb4642b57690b6

                        SHA256

                        2868955691503aa2f65e589adacdf37f909472515a3f473a0a3e34f6529f1c88

                        SHA512

                        9344309405ce10f8a7d6a7e8ac729dbe4495dd17a04c710885d23647cf752153fa53090acfcb5ad9772609f4138aabd2b7afbc8e835a24f7fdaca0580833f154

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8474472.exe

                        Filesize

                        962KB

                        MD5

                        6097d3fc1a131dd8fd2be0e9271c1f1f

                        SHA1

                        8d4243a7f5fc4e043d4dd743b1fb4642b57690b6

                        SHA256

                        2868955691503aa2f65e589adacdf37f909472515a3f473a0a3e34f6529f1c88

                        SHA512

                        9344309405ce10f8a7d6a7e8ac729dbe4495dd17a04c710885d23647cf752153fa53090acfcb5ad9772609f4138aabd2b7afbc8e835a24f7fdaca0580833f154

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8474472.exe

                        Filesize

                        962KB

                        MD5

                        6097d3fc1a131dd8fd2be0e9271c1f1f

                        SHA1

                        8d4243a7f5fc4e043d4dd743b1fb4642b57690b6

                        SHA256

                        2868955691503aa2f65e589adacdf37f909472515a3f473a0a3e34f6529f1c88

                        SHA512

                        9344309405ce10f8a7d6a7e8ac729dbe4495dd17a04c710885d23647cf752153fa53090acfcb5ad9772609f4138aabd2b7afbc8e835a24f7fdaca0580833f154

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5233725.exe

                        Filesize

                        576KB

                        MD5

                        46ec94d46928f84ace2f2f71b2d2ef15

                        SHA1

                        8ab84adf392bf315a7354460846b8de0c804490e

                        SHA256

                        27aaafc17a66e81ccf42d6007aaeaf40f875d671ff93647ec77c5e1a9033567c

                        SHA512

                        97cf0d0b1d5812679c4c30647954dff3888442ee0f4d20f22e964d49a9aec46975e977d362d503046b686df61a87236b586039190e0a0f985880db43138b3c05

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5233725.exe

                        Filesize

                        576KB

                        MD5

                        46ec94d46928f84ace2f2f71b2d2ef15

                        SHA1

                        8ab84adf392bf315a7354460846b8de0c804490e

                        SHA256

                        27aaafc17a66e81ccf42d6007aaeaf40f875d671ff93647ec77c5e1a9033567c

                        SHA512

                        97cf0d0b1d5812679c4c30647954dff3888442ee0f4d20f22e964d49a9aec46975e977d362d503046b686df61a87236b586039190e0a0f985880db43138b3c05

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9829883.exe

                        Filesize

                        285KB

                        MD5

                        5a6a76e4e2dd632289284dcc892d26aa

                        SHA1

                        970819b6a9b4094f09ceb3667122d5ddc83bc73d

                        SHA256

                        5ec240fc31fc786b67cf66b5b99d7754080f60192272466d079c6ccc2159d04b

                        SHA512

                        b1ec6ba96b6ffab51039c53d0d26007df4c1df17c6412d5683796c8dff1d8c8f61c95e0be53eedc05b46a1794f39dc7f224033ae4c95f77da136183f9b8dacad

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9829883.exe

                        Filesize

                        285KB

                        MD5

                        5a6a76e4e2dd632289284dcc892d26aa

                        SHA1

                        970819b6a9b4094f09ceb3667122d5ddc83bc73d

                        SHA256

                        5ec240fc31fc786b67cf66b5b99d7754080f60192272466d079c6ccc2159d04b

                        SHA512

                        b1ec6ba96b6ffab51039c53d0d26007df4c1df17c6412d5683796c8dff1d8c8f61c95e0be53eedc05b46a1794f39dc7f224033ae4c95f77da136183f9b8dacad

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3784036.exe

                        Filesize

                        305KB

                        MD5

                        15e4bf90e90f36e6a34c3795cd0ba9b4

                        SHA1

                        ca35099aa04c9f1316313aa896effdf3b96a5807

                        SHA256

                        d6229a39a73f38d6ff5a264799b5b87814059639566fff94bd28b58956d1825f

                        SHA512

                        ecb711c871caee865e1afc041a7f0807b49141b442e244c604acb1f23acc08c678a0b64ecff144f7b8afcf524f3f4aa252a2fa2e7ce52ce8d44d1a944db53123

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3784036.exe

                        Filesize

                        305KB

                        MD5

                        15e4bf90e90f36e6a34c3795cd0ba9b4

                        SHA1

                        ca35099aa04c9f1316313aa896effdf3b96a5807

                        SHA256

                        d6229a39a73f38d6ff5a264799b5b87814059639566fff94bd28b58956d1825f

                        SHA512

                        ecb711c871caee865e1afc041a7f0807b49141b442e244c604acb1f23acc08c678a0b64ecff144f7b8afcf524f3f4aa252a2fa2e7ce52ce8d44d1a944db53123

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8214800.exe

                        Filesize

                        184KB

                        MD5

                        0623fd30e7d91a7babe2dbcde5372f52

                        SHA1

                        924a2739bc809b9857d41f97e64bb8685fe5fbec

                        SHA256

                        03d4954eff64f1f22cd8e29873bd5874cbfca41a08119fc88fb74a0525d46825

                        SHA512

                        25db1260d04450c611145a43589a65cd307e64a871ef422ea109efdd97e400224c136bb43ae9d8033ee4280fd5d00395fdcba7511fdf7ac7dfd82a2b10af6947

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8214800.exe

                        Filesize

                        184KB

                        MD5

                        0623fd30e7d91a7babe2dbcde5372f52

                        SHA1

                        924a2739bc809b9857d41f97e64bb8685fe5fbec

                        SHA256

                        03d4954eff64f1f22cd8e29873bd5874cbfca41a08119fc88fb74a0525d46825

                        SHA512

                        25db1260d04450c611145a43589a65cd307e64a871ef422ea109efdd97e400224c136bb43ae9d8033ee4280fd5d00395fdcba7511fdf7ac7dfd82a2b10af6947

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0697080.exe

                        Filesize

                        145KB

                        MD5

                        1b28b14171e3df794ccfcebb573e4669

                        SHA1

                        70e4aeeaa76101289747f33385aff863aecb7d8d

                        SHA256

                        c21d2864207ead5cf96179ca29ffcf0a690374212b9adadb3d64300e00c33568

                        SHA512

                        d5286f192624fcd0715a687acf01702fee1e25142b102f5a0a78a0c9e4f1727d67ec72476737fe9d09140a2a8573dd7bb42d2a947737f756c03789d369b0c702

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0697080.exe

                        Filesize

                        145KB

                        MD5

                        1b28b14171e3df794ccfcebb573e4669

                        SHA1

                        70e4aeeaa76101289747f33385aff863aecb7d8d

                        SHA256

                        c21d2864207ead5cf96179ca29ffcf0a690374212b9adadb3d64300e00c33568

                        SHA512

                        d5286f192624fcd0715a687acf01702fee1e25142b102f5a0a78a0c9e4f1727d67ec72476737fe9d09140a2a8573dd7bb42d2a947737f756c03789d369b0c702

                      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                        Filesize

                        89KB

                        MD5

                        73c0c85e39b9a63b42f6c4ff6d634f8b

                        SHA1

                        efb047b4177ad78268f6fc8bf959f58f1123eb51

                        SHA256

                        477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368

                        SHA512

                        ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643

                      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                        Filesize

                        89KB

                        MD5

                        73c0c85e39b9a63b42f6c4ff6d634f8b

                        SHA1

                        efb047b4177ad78268f6fc8bf959f58f1123eb51

                        SHA256

                        477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368

                        SHA512

                        ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643

                      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                        Filesize

                        89KB

                        MD5

                        73c0c85e39b9a63b42f6c4ff6d634f8b

                        SHA1

                        efb047b4177ad78268f6fc8bf959f58f1123eb51

                        SHA256

                        477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368

                        SHA512

                        ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643

                      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                        Filesize

                        162B

                        MD5

                        1b7c22a214949975556626d7217e9a39

                        SHA1

                        d01c97e2944166ed23e47e4a62ff471ab8fa031f

                        SHA256

                        340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                        SHA512

                        ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                      • memory/844-1124-0x0000000000BF0000-0x0000000000CE8000-memory.dmp

                        Filesize

                        992KB

                      • memory/844-1125-0x0000000007A00000-0x0000000007A10000-memory.dmp

                        Filesize

                        64KB

                      • memory/1260-1118-0x0000000006EE0000-0x0000000006F56000-memory.dmp

                        Filesize

                        472KB

                      • memory/1260-1110-0x00000000059B0000-0x00000000059EC000-memory.dmp

                        Filesize

                        240KB

                      • memory/1260-1119-0x0000000006F70000-0x0000000006FC0000-memory.dmp

                        Filesize

                        320KB

                      • memory/1260-1117-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

                        Filesize

                        64KB

                      • memory/1260-1116-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

                        Filesize

                        64KB

                      • memory/1260-1115-0x00000000068C0000-0x0000000006DEC000-memory.dmp

                        Filesize

                        5.2MB

                      • memory/1260-1114-0x00000000066A0000-0x0000000006862000-memory.dmp

                        Filesize

                        1.8MB

                      • memory/1260-197-0x0000000002540000-0x000000000257C000-memory.dmp

                        Filesize

                        240KB

                      • memory/1260-198-0x0000000002540000-0x000000000257C000-memory.dmp

                        Filesize

                        240KB

                      • memory/1260-200-0x0000000002540000-0x000000000257C000-memory.dmp

                        Filesize

                        240KB

                      • memory/1260-202-0x0000000002540000-0x000000000257C000-memory.dmp

                        Filesize

                        240KB

                      • memory/1260-204-0x0000000002540000-0x000000000257C000-memory.dmp

                        Filesize

                        240KB

                      • memory/1260-208-0x0000000002540000-0x000000000257C000-memory.dmp

                        Filesize

                        240KB

                      • memory/1260-206-0x0000000002540000-0x000000000257C000-memory.dmp

                        Filesize

                        240KB

                      • memory/1260-210-0x0000000002540000-0x000000000257C000-memory.dmp

                        Filesize

                        240KB

                      • memory/1260-212-0x0000000002540000-0x000000000257C000-memory.dmp

                        Filesize

                        240KB

                      • memory/1260-214-0x0000000002540000-0x000000000257C000-memory.dmp

                        Filesize

                        240KB

                      • memory/1260-216-0x0000000002540000-0x000000000257C000-memory.dmp

                        Filesize

                        240KB

                      • memory/1260-218-0x0000000002540000-0x000000000257C000-memory.dmp

                        Filesize

                        240KB

                      • memory/1260-220-0x0000000002540000-0x000000000257C000-memory.dmp

                        Filesize

                        240KB

                      • memory/1260-222-0x0000000002540000-0x000000000257C000-memory.dmp

                        Filesize

                        240KB

                      • memory/1260-224-0x0000000002540000-0x000000000257C000-memory.dmp

                        Filesize

                        240KB

                      • memory/1260-226-0x0000000002540000-0x000000000257C000-memory.dmp

                        Filesize

                        240KB

                      • memory/1260-228-0x0000000002540000-0x000000000257C000-memory.dmp

                        Filesize

                        240KB

                      • memory/1260-230-0x0000000002540000-0x000000000257C000-memory.dmp

                        Filesize

                        240KB

                      • memory/1260-232-0x0000000002540000-0x000000000257C000-memory.dmp

                        Filesize

                        240KB

                      • memory/1260-349-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

                        Filesize

                        64KB

                      • memory/1260-350-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

                        Filesize

                        64KB

                      • memory/1260-1107-0x0000000005280000-0x0000000005898000-memory.dmp

                        Filesize

                        6.1MB

                      • memory/1260-1108-0x00000000058A0000-0x00000000059AA000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/1260-1109-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

                        Filesize

                        72KB

                      • memory/1260-1113-0x0000000005D40000-0x0000000005DA6000-memory.dmp

                        Filesize

                        408KB

                      • memory/1260-1111-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

                        Filesize

                        64KB

                      • memory/1260-1112-0x0000000005CA0000-0x0000000005D32000-memory.dmp

                        Filesize

                        584KB

                      • memory/1852-1180-0x0000000007640000-0x0000000007650000-memory.dmp

                        Filesize

                        64KB

                      • memory/2392-1132-0x0000000000400000-0x0000000000438000-memory.dmp

                        Filesize

                        224KB

                      • memory/2392-1146-0x0000000000400000-0x0000000000438000-memory.dmp

                        Filesize

                        224KB

                      • memory/2732-167-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/2732-185-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/2732-181-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/2732-187-0x0000000004950000-0x0000000004960000-memory.dmp

                        Filesize

                        64KB

                      • memory/2732-179-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/2732-177-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/2732-175-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/2732-173-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/2732-171-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/2732-154-0x0000000004960000-0x0000000004F04000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/2732-169-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/2732-188-0x0000000004950000-0x0000000004960000-memory.dmp

                        Filesize

                        64KB

                      • memory/2732-165-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/2732-186-0x0000000004950000-0x0000000004960000-memory.dmp

                        Filesize

                        64KB

                      • memory/2732-183-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/2732-163-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/2732-155-0x0000000004950000-0x0000000004960000-memory.dmp

                        Filesize

                        64KB

                      • memory/2732-156-0x0000000004950000-0x0000000004960000-memory.dmp

                        Filesize

                        64KB

                      • memory/2732-161-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/2732-158-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/2732-159-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/2732-157-0x0000000004950000-0x0000000004960000-memory.dmp

                        Filesize

                        64KB

                      • memory/3868-193-0x00000000000B0000-0x00000000000DA000-memory.dmp

                        Filesize

                        168KB

                      • memory/4200-1157-0x0000000000400000-0x0000000000438000-memory.dmp

                        Filesize

                        224KB

                      • memory/4200-1154-0x0000000000400000-0x0000000000438000-memory.dmp

                        Filesize

                        224KB

                      • memory/4652-1147-0x00000000074C0000-0x00000000074D0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4720-1185-0x0000000000400000-0x0000000000438000-memory.dmp

                        Filesize

                        224KB