Analysis

  • max time kernel
    76s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/05/2023, 06:40

General

  • Target

    reporter163.exe

  • Size

    1021KB

  • MD5

    8d76b08a5b6cc736a363681616eb8836

  • SHA1

    91914721b74e4556d41e117ac98d409844c983b6

  • SHA256

    9615d71b3324032d22fa07d1ab4c1b0dcc35efb75f48798f98b413eea724a5a3

  • SHA512

    ec12916141e944a3d9ba3a56d7782c1d2f323db9a4bdaf93d55bb38e42c3a39499ee1bbec0c6925d9abd662f76a20678cc5ce5e8580f9b0bf1e36b058a401e8d

  • SSDEEP

    24576:gy7ghSR8zUqvUWCWHHDZq4xwge1i9V4P:nZsUqv9DcUD+

Malware Config

Extracted

Family

redline

Botnet

luza

C2

185.161.248.37:4138

Attributes
  • auth_value

    1261701914d508e02e8b4f25d38bc7f9

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\reporter163.exe
    "C:\Users\Admin\AppData\Local\Temp\reporter163.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2712
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9888570.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9888570.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4756
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9288150.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9288150.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4840
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3340334.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3340334.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4852
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1716272.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1716272.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:228
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7630343.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7630343.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:880
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8199018.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8199018.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1056
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8199018.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8199018.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2560
        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
          "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1264
          • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1312
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legends.exe /TR "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:1144
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legends.exe" /P "Admin:N"&&CACLS "legends.exe" /P "Admin:R" /E&&echo Y|CACLS "..\41bde21dc7" /P "Admin:N"&&CACLS "..\41bde21dc7" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:5044
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:1808
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "legends.exe" /P "Admin:N"
                  7⤵
                    PID:1952
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "legends.exe" /P "Admin:R" /E
                    7⤵
                      PID:524
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\41bde21dc7" /P "Admin:N"
                      7⤵
                        PID:1892
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        7⤵
                          PID:2124
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\41bde21dc7" /P "Admin:R" /E
                          7⤵
                            PID:3344
                        • C:\Users\Admin\AppData\Local\Temp\1000023001\b2.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000023001\b2.exe"
                          6⤵
                          • Executes dropped EXE
                          • Modifies system certificate store
                          PID:4600
                          • C:\Windows\system32\curl.exe
                            curl -s ipinfo.io/country
                            7⤵
                              PID:1060
                            • C:\Windows\system32\curl.exe
                              curl -s ipinfo.io/country
                              7⤵
                                PID:2372
                              • C:\Windows\SYSTEM32\cmd.exe
                                cmd /c
                                7⤵
                                  PID:3776
                                • C:\Windows\system32\curl.exe
                                  curl -s ipinfo.io/country
                                  7⤵
                                    PID:5000

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\1000023001\b2.exe

                        Filesize

                        4.6MB

                        MD5

                        2afcac7aaede32980c96fda99c8c8677

                        SHA1

                        436e83ce6882e798e5bb6d89a31913285886d3a2

                        SHA256

                        1cd60650fa3e560d8f7c80d4d059e669e64486bd3ca6daed52d8fdce14d0455b

                        SHA512

                        5ccba16f2b31f1271487729c6d502529fa329d56dc126f080481d567c37c7ed68760c808e7fb6559293c65cf9ea8deca67ba2670a42a806d7e158ce79a513907

                      • C:\Users\Admin\AppData\Local\Temp\1000023001\b2.exe

                        Filesize

                        4.6MB

                        MD5

                        2afcac7aaede32980c96fda99c8c8677

                        SHA1

                        436e83ce6882e798e5bb6d89a31913285886d3a2

                        SHA256

                        1cd60650fa3e560d8f7c80d4d059e669e64486bd3ca6daed52d8fdce14d0455b

                        SHA512

                        5ccba16f2b31f1271487729c6d502529fa329d56dc126f080481d567c37c7ed68760c808e7fb6559293c65cf9ea8deca67ba2670a42a806d7e158ce79a513907

                      • C:\Users\Admin\AppData\Local\Temp\1000023001\b2.exe

                        Filesize

                        4.6MB

                        MD5

                        2afcac7aaede32980c96fda99c8c8677

                        SHA1

                        436e83ce6882e798e5bb6d89a31913285886d3a2

                        SHA256

                        1cd60650fa3e560d8f7c80d4d059e669e64486bd3ca6daed52d8fdce14d0455b

                        SHA512

                        5ccba16f2b31f1271487729c6d502529fa329d56dc126f080481d567c37c7ed68760c808e7fb6559293c65cf9ea8deca67ba2670a42a806d7e158ce79a513907

                      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                        Filesize

                        963KB

                        MD5

                        d6d4fa67d6c5859186778f75127bc691

                        SHA1

                        fdd1d219d6ea4f6c575b67236e06a373cb4318f3

                        SHA256

                        42c61196101cb1c94d5c6aa200e88a91563036109b072662fcffa7cc5f4a6a08

                        SHA512

                        714132f9a1443b325def83c1e81186a509a6f4be95351169528622f271485d3109183bbf34992cbf30c3f0a7cbdea98bef4c3f58e8909e0212369967ac8f167b

                      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                        Filesize

                        963KB

                        MD5

                        d6d4fa67d6c5859186778f75127bc691

                        SHA1

                        fdd1d219d6ea4f6c575b67236e06a373cb4318f3

                        SHA256

                        42c61196101cb1c94d5c6aa200e88a91563036109b072662fcffa7cc5f4a6a08

                        SHA512

                        714132f9a1443b325def83c1e81186a509a6f4be95351169528622f271485d3109183bbf34992cbf30c3f0a7cbdea98bef4c3f58e8909e0212369967ac8f167b

                      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                        Filesize

                        963KB

                        MD5

                        d6d4fa67d6c5859186778f75127bc691

                        SHA1

                        fdd1d219d6ea4f6c575b67236e06a373cb4318f3

                        SHA256

                        42c61196101cb1c94d5c6aa200e88a91563036109b072662fcffa7cc5f4a6a08

                        SHA512

                        714132f9a1443b325def83c1e81186a509a6f4be95351169528622f271485d3109183bbf34992cbf30c3f0a7cbdea98bef4c3f58e8909e0212369967ac8f167b

                      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                        Filesize

                        963KB

                        MD5

                        d6d4fa67d6c5859186778f75127bc691

                        SHA1

                        fdd1d219d6ea4f6c575b67236e06a373cb4318f3

                        SHA256

                        42c61196101cb1c94d5c6aa200e88a91563036109b072662fcffa7cc5f4a6a08

                        SHA512

                        714132f9a1443b325def83c1e81186a509a6f4be95351169528622f271485d3109183bbf34992cbf30c3f0a7cbdea98bef4c3f58e8909e0212369967ac8f167b

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8199018.exe

                        Filesize

                        963KB

                        MD5

                        d6d4fa67d6c5859186778f75127bc691

                        SHA1

                        fdd1d219d6ea4f6c575b67236e06a373cb4318f3

                        SHA256

                        42c61196101cb1c94d5c6aa200e88a91563036109b072662fcffa7cc5f4a6a08

                        SHA512

                        714132f9a1443b325def83c1e81186a509a6f4be95351169528622f271485d3109183bbf34992cbf30c3f0a7cbdea98bef4c3f58e8909e0212369967ac8f167b

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8199018.exe

                        Filesize

                        963KB

                        MD5

                        d6d4fa67d6c5859186778f75127bc691

                        SHA1

                        fdd1d219d6ea4f6c575b67236e06a373cb4318f3

                        SHA256

                        42c61196101cb1c94d5c6aa200e88a91563036109b072662fcffa7cc5f4a6a08

                        SHA512

                        714132f9a1443b325def83c1e81186a509a6f4be95351169528622f271485d3109183bbf34992cbf30c3f0a7cbdea98bef4c3f58e8909e0212369967ac8f167b

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8199018.exe

                        Filesize

                        963KB

                        MD5

                        d6d4fa67d6c5859186778f75127bc691

                        SHA1

                        fdd1d219d6ea4f6c575b67236e06a373cb4318f3

                        SHA256

                        42c61196101cb1c94d5c6aa200e88a91563036109b072662fcffa7cc5f4a6a08

                        SHA512

                        714132f9a1443b325def83c1e81186a509a6f4be95351169528622f271485d3109183bbf34992cbf30c3f0a7cbdea98bef4c3f58e8909e0212369967ac8f167b

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9888570.exe

                        Filesize

                        577KB

                        MD5

                        88a49c7a91ed09d09601d17ff1dfa77e

                        SHA1

                        d6fee1964685cd9b33a769cc312f9e138e0d5b8d

                        SHA256

                        d42a6edde0375b7cbebdab3556d140e3a111cbc70b21178f93a5c216dd20e5bb

                        SHA512

                        2dc316dde9d86073e82358576deed014a8e7c995b4f23cc2d338cda557c895118db65400cd73682db7258169d950e054093e247b39c78e65aca76c093838ffaa

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9888570.exe

                        Filesize

                        577KB

                        MD5

                        88a49c7a91ed09d09601d17ff1dfa77e

                        SHA1

                        d6fee1964685cd9b33a769cc312f9e138e0d5b8d

                        SHA256

                        d42a6edde0375b7cbebdab3556d140e3a111cbc70b21178f93a5c216dd20e5bb

                        SHA512

                        2dc316dde9d86073e82358576deed014a8e7c995b4f23cc2d338cda557c895118db65400cd73682db7258169d950e054093e247b39c78e65aca76c093838ffaa

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7630343.exe

                        Filesize

                        286KB

                        MD5

                        1ba62e456fc93f6be9e4836b29372ad6

                        SHA1

                        fdef59434ead0c13d895a37985cfab96d4455535

                        SHA256

                        f393bae17c78d53b70cff3691e2fd4cf96045dfc37660af67cea84a9ea5e41d9

                        SHA512

                        649fcd9fdcd296c125f6db508d0845faea1cdb9dc4a636f31baf337028e0b2b06fa16ea2265b762fc7e7ed2150428d0c2a3a547c2e49f36267ba5fb7188e08aa

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7630343.exe

                        Filesize

                        286KB

                        MD5

                        1ba62e456fc93f6be9e4836b29372ad6

                        SHA1

                        fdef59434ead0c13d895a37985cfab96d4455535

                        SHA256

                        f393bae17c78d53b70cff3691e2fd4cf96045dfc37660af67cea84a9ea5e41d9

                        SHA512

                        649fcd9fdcd296c125f6db508d0845faea1cdb9dc4a636f31baf337028e0b2b06fa16ea2265b762fc7e7ed2150428d0c2a3a547c2e49f36267ba5fb7188e08aa

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9288150.exe

                        Filesize

                        305KB

                        MD5

                        48ee04fda51646af56997b4d0bff0e5f

                        SHA1

                        8bb619d9d01d6a805c97afef5183b33fea471f11

                        SHA256

                        e355e4640c63a78abc503ade9a5ab6b2f2060fd13c32912ab60c81ec8f195333

                        SHA512

                        d42ee8a8ab43547b7fffda2abeb1bb43c06a403833aac36e037a93bcf4f67b3a610201297f3c0c97e400e0c56e54bdd6cf66515642c0604309a314a55f4a8f51

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9288150.exe

                        Filesize

                        305KB

                        MD5

                        48ee04fda51646af56997b4d0bff0e5f

                        SHA1

                        8bb619d9d01d6a805c97afef5183b33fea471f11

                        SHA256

                        e355e4640c63a78abc503ade9a5ab6b2f2060fd13c32912ab60c81ec8f195333

                        SHA512

                        d42ee8a8ab43547b7fffda2abeb1bb43c06a403833aac36e037a93bcf4f67b3a610201297f3c0c97e400e0c56e54bdd6cf66515642c0604309a314a55f4a8f51

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3340334.exe

                        Filesize

                        186KB

                        MD5

                        1cfc7d3b6c32cccb6da0c3e26a616573

                        SHA1

                        ff5fc390e7f354e621a04911b16fb9d9218b7338

                        SHA256

                        ed9e3d6a9a619958d8c13488cdc6468fdba7087687b227751ed576f4c6215698

                        SHA512

                        210c00525471d41f42e01d5db7df9a21e243a56d20a79b46f4b1887023e1a516b0441284c2fae0aaa72894094bda291746f598e74d9edfb70b9541c342aaa914

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3340334.exe

                        Filesize

                        186KB

                        MD5

                        1cfc7d3b6c32cccb6da0c3e26a616573

                        SHA1

                        ff5fc390e7f354e621a04911b16fb9d9218b7338

                        SHA256

                        ed9e3d6a9a619958d8c13488cdc6468fdba7087687b227751ed576f4c6215698

                        SHA512

                        210c00525471d41f42e01d5db7df9a21e243a56d20a79b46f4b1887023e1a516b0441284c2fae0aaa72894094bda291746f598e74d9edfb70b9541c342aaa914

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1716272.exe

                        Filesize

                        145KB

                        MD5

                        76dc340c8194a6d8f8c0677474a343b2

                        SHA1

                        fc586951a24db20abe415572668c6d360acdfbae

                        SHA256

                        20f2d18abe303f3156ece1cfd39a85001f41f3af17cd10988cdb74aa6ff5bb49

                        SHA512

                        de241594313bff89a74651ad85083c14a14d9a88a46b077f22661bce3a73a60c4407b36d469b13dffdd3545fb3b532bed2c6af85c92bb95b14bd7a6f42b7bdc1

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1716272.exe

                        Filesize

                        145KB

                        MD5

                        76dc340c8194a6d8f8c0677474a343b2

                        SHA1

                        fc586951a24db20abe415572668c6d360acdfbae

                        SHA256

                        20f2d18abe303f3156ece1cfd39a85001f41f3af17cd10988cdb74aa6ff5bb49

                        SHA512

                        de241594313bff89a74651ad85083c14a14d9a88a46b077f22661bce3a73a60c4407b36d469b13dffdd3545fb3b532bed2c6af85c92bb95b14bd7a6f42b7bdc1

                      • memory/228-203-0x00000000073F0000-0x000000000791C000-memory.dmp

                        Filesize

                        5.2MB

                      • memory/228-204-0x0000000006630000-0x00000000066A6000-memory.dmp

                        Filesize

                        472KB

                      • memory/228-202-0x0000000006CF0000-0x0000000006EB2000-memory.dmp

                        Filesize

                        1.8MB

                      • memory/228-201-0x00000000062D0000-0x0000000006336000-memory.dmp

                        Filesize

                        408KB

                      • memory/228-200-0x0000000006230000-0x00000000062C2000-memory.dmp

                        Filesize

                        584KB

                      • memory/228-199-0x0000000005630000-0x0000000005640000-memory.dmp

                        Filesize

                        64KB

                      • memory/228-198-0x0000000005630000-0x0000000005640000-memory.dmp

                        Filesize

                        64KB

                      • memory/228-197-0x0000000005380000-0x00000000053BC000-memory.dmp

                        Filesize

                        240KB

                      • memory/228-205-0x00000000066B0000-0x0000000006700000-memory.dmp

                        Filesize

                        320KB

                      • memory/228-196-0x0000000005320000-0x0000000005332000-memory.dmp

                        Filesize

                        72KB

                      • memory/228-193-0x0000000000A90000-0x0000000000ABA000-memory.dmp

                        Filesize

                        168KB

                      • memory/228-194-0x0000000005870000-0x0000000005E88000-memory.dmp

                        Filesize

                        6.1MB

                      • memory/228-195-0x00000000053F0000-0x00000000054FA000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/880-245-0x0000000002550000-0x000000000258C000-memory.dmp

                        Filesize

                        240KB

                      • memory/880-239-0x0000000002550000-0x000000000258C000-memory.dmp

                        Filesize

                        240KB

                      • memory/880-1122-0x0000000004C10000-0x0000000004C20000-memory.dmp

                        Filesize

                        64KB

                      • memory/880-1121-0x0000000004C10000-0x0000000004C20000-memory.dmp

                        Filesize

                        64KB

                      • memory/880-1120-0x0000000004C10000-0x0000000004C20000-memory.dmp

                        Filesize

                        64KB

                      • memory/880-353-0x0000000004C10000-0x0000000004C20000-memory.dmp

                        Filesize

                        64KB

                      • memory/880-352-0x0000000004C10000-0x0000000004C20000-memory.dmp

                        Filesize

                        64KB

                      • memory/880-243-0x0000000002550000-0x000000000258C000-memory.dmp

                        Filesize

                        240KB

                      • memory/880-241-0x0000000002550000-0x000000000258C000-memory.dmp

                        Filesize

                        240KB

                      • memory/880-237-0x0000000002550000-0x000000000258C000-memory.dmp

                        Filesize

                        240KB

                      • memory/880-235-0x0000000002550000-0x000000000258C000-memory.dmp

                        Filesize

                        240KB

                      • memory/880-233-0x0000000002550000-0x000000000258C000-memory.dmp

                        Filesize

                        240KB

                      • memory/880-210-0x0000000002550000-0x000000000258C000-memory.dmp

                        Filesize

                        240KB

                      • memory/880-213-0x0000000002550000-0x000000000258C000-memory.dmp

                        Filesize

                        240KB

                      • memory/880-211-0x0000000002550000-0x000000000258C000-memory.dmp

                        Filesize

                        240KB

                      • memory/880-215-0x0000000002550000-0x000000000258C000-memory.dmp

                        Filesize

                        240KB

                      • memory/880-217-0x0000000002550000-0x000000000258C000-memory.dmp

                        Filesize

                        240KB

                      • memory/880-219-0x0000000002550000-0x000000000258C000-memory.dmp

                        Filesize

                        240KB

                      • memory/880-221-0x0000000002550000-0x000000000258C000-memory.dmp

                        Filesize

                        240KB

                      • memory/880-223-0x0000000002550000-0x000000000258C000-memory.dmp

                        Filesize

                        240KB

                      • memory/880-225-0x0000000002550000-0x000000000258C000-memory.dmp

                        Filesize

                        240KB

                      • memory/880-227-0x0000000002550000-0x000000000258C000-memory.dmp

                        Filesize

                        240KB

                      • memory/880-229-0x0000000002550000-0x000000000258C000-memory.dmp

                        Filesize

                        240KB

                      • memory/880-231-0x0000000002550000-0x000000000258C000-memory.dmp

                        Filesize

                        240KB

                      • memory/1056-1127-0x0000000000950000-0x0000000000A48000-memory.dmp

                        Filesize

                        992KB

                      • memory/1056-1128-0x00000000077E0000-0x00000000077F0000-memory.dmp

                        Filesize

                        64KB

                      • memory/1264-1150-0x0000000007CA0000-0x0000000007CB0000-memory.dmp

                        Filesize

                        64KB

                      • memory/1312-1157-0x0000000000400000-0x0000000000438000-memory.dmp

                        Filesize

                        224KB

                      • memory/2560-1149-0x0000000000400000-0x0000000000438000-memory.dmp

                        Filesize

                        224KB

                      • memory/2560-1138-0x0000000000400000-0x0000000000438000-memory.dmp

                        Filesize

                        224KB

                      • memory/4600-1178-0x00007FF76E570000-0x00007FF76F3C4000-memory.dmp

                        Filesize

                        14.3MB

                      • memory/4852-161-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/4852-181-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/4852-185-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/4852-186-0x0000000002120000-0x0000000002130000-memory.dmp

                        Filesize

                        64KB

                      • memory/4852-187-0x0000000002120000-0x0000000002130000-memory.dmp

                        Filesize

                        64KB

                      • memory/4852-167-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/4852-165-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/4852-177-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/4852-188-0x0000000002120000-0x0000000002130000-memory.dmp

                        Filesize

                        64KB

                      • memory/4852-159-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/4852-183-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/4852-179-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/4852-163-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/4852-158-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/4852-171-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/4852-175-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/4852-156-0x0000000002120000-0x0000000002130000-memory.dmp

                        Filesize

                        64KB

                      • memory/4852-173-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB

                      • memory/4852-157-0x0000000002120000-0x0000000002130000-memory.dmp

                        Filesize

                        64KB

                      • memory/4852-155-0x0000000002120000-0x0000000002130000-memory.dmp

                        Filesize

                        64KB

                      • memory/4852-154-0x0000000004920000-0x0000000004EC4000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/4852-169-0x0000000004F20000-0x0000000004F36000-memory.dmp

                        Filesize

                        88KB