Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-06-2023 10:31

General

  • Target

    5e4ca030cc4389c7c8b6572ace7ffb9786c12729adc2de759b7905c6daea06f8.exe

  • Size

    800KB

  • MD5

    21b6a48b0315a9fa32fba88f52c389be

  • SHA1

    bc18910673f755e87a928dd30d1f01cad307534f

  • SHA256

    5e4ca030cc4389c7c8b6572ace7ffb9786c12729adc2de759b7905c6daea06f8

  • SHA512

    b3d3bc5ccd9a69ef479bc6254c9a8dae7663dadeec76b12c681f00db690aebb2207f69a8d30d5ceb2cdcfc194982157fed8dab9b4c099d8bb797124721607a4f

  • SSDEEP

    12288:DMrTy90nCcIqWtxEco2x4/7oN884/aEpB8G3yLjVNNCFc7G8uhZcYbhkTdr0:wytcVk767tFyjZCFW6nhsr0

Malware Config

Extracted

Family

redline

Botnet

joker

C2

83.97.73.130:19061

Attributes
  • auth_value

    a98d303cc28bb3b32a23c59214ae3bc0

Extracted

Family

redline

Botnet

lana

C2

83.97.73.130:19061

Attributes
  • auth_value

    abf586398e9d8028235753690306b7fa

Extracted

Family

amadey

Version

3.81

C2

95.214.27.98/cronus/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e4ca030cc4389c7c8b6572ace7ffb9786c12729adc2de759b7905c6daea06f8.exe
    "C:\Users\Admin\AppData\Local\Temp\5e4ca030cc4389c7c8b6572ace7ffb9786c12729adc2de759b7905c6daea06f8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:800
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2157261.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2157261.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:544
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7055321.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7055321.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3488
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2876790.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2876790.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1436
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o7285036.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o7285036.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1764
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\p0566431.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\p0566431.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4412
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r2644871.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r2644871.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:668
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s5546712.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s5546712.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t9419907.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t9419907.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:5052
      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
        "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1056
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legends.exe /TR "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4952
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legends.exe" /P "Admin:N"&&CACLS "legends.exe" /P "Admin:R" /E&&echo Y|CACLS "..\41bde21dc7" /P "Admin:N"&&CACLS "..\41bde21dc7" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1148
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3124
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "legends.exe" /P "Admin:N"
              5⤵
                PID:864
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "legends.exe" /P "Admin:R" /E
                5⤵
                  PID:748
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:3664
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\41bde21dc7" /P "Admin:N"
                    5⤵
                      PID:2020
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\41bde21dc7" /P "Admin:R" /E
                      5⤵
                        PID:4288
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:4732
              • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                1⤵
                • Executes dropped EXE
                PID:3388

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                2KB

                MD5

                7f305d024899e4809fb6f4ae00da304c

                SHA1

                f88a0812d36e0562ede3732ab511f459a09faff8

                SHA256

                8fe1088ad55d05a3c2149648c8c1ce55862e925580308afe4a4ff6cfb089c769

                SHA512

                bc40698582400427cd47cf80dcf39202a74148b69ed179483160b4023368d53301fa12fe6d530d9c7cdfe5f78d19ee87a285681f537950334677f8af8dfeb2ae

              • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                Filesize

                204KB

                MD5

                a432cf58e51cf13a386812ca12ed2a7b

                SHA1

                4d4dbaa7bb7b9a6d8d223d4ad38d9cd2d4f7483c

                SHA256

                b68b279219dccff847cd432c07ed6f5a3158191661dd0907c64faf7888e2e173

                SHA512

                7bf3cae2f2918fda6eaf2fbb741591ef015730cbbf24d414ff3a83fdd5af5fce5589a99baa2a707aef7abadea64dfcff09520a67cfacc932e0acd2d52d76daae

              • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                Filesize

                204KB

                MD5

                a432cf58e51cf13a386812ca12ed2a7b

                SHA1

                4d4dbaa7bb7b9a6d8d223d4ad38d9cd2d4f7483c

                SHA256

                b68b279219dccff847cd432c07ed6f5a3158191661dd0907c64faf7888e2e173

                SHA512

                7bf3cae2f2918fda6eaf2fbb741591ef015730cbbf24d414ff3a83fdd5af5fce5589a99baa2a707aef7abadea64dfcff09520a67cfacc932e0acd2d52d76daae

              • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                Filesize

                204KB

                MD5

                a432cf58e51cf13a386812ca12ed2a7b

                SHA1

                4d4dbaa7bb7b9a6d8d223d4ad38d9cd2d4f7483c

                SHA256

                b68b279219dccff847cd432c07ed6f5a3158191661dd0907c64faf7888e2e173

                SHA512

                7bf3cae2f2918fda6eaf2fbb741591ef015730cbbf24d414ff3a83fdd5af5fce5589a99baa2a707aef7abadea64dfcff09520a67cfacc932e0acd2d52d76daae

              • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                Filesize

                204KB

                MD5

                a432cf58e51cf13a386812ca12ed2a7b

                SHA1

                4d4dbaa7bb7b9a6d8d223d4ad38d9cd2d4f7483c

                SHA256

                b68b279219dccff847cd432c07ed6f5a3158191661dd0907c64faf7888e2e173

                SHA512

                7bf3cae2f2918fda6eaf2fbb741591ef015730cbbf24d414ff3a83fdd5af5fce5589a99baa2a707aef7abadea64dfcff09520a67cfacc932e0acd2d52d76daae

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t9419907.exe

                Filesize

                204KB

                MD5

                a432cf58e51cf13a386812ca12ed2a7b

                SHA1

                4d4dbaa7bb7b9a6d8d223d4ad38d9cd2d4f7483c

                SHA256

                b68b279219dccff847cd432c07ed6f5a3158191661dd0907c64faf7888e2e173

                SHA512

                7bf3cae2f2918fda6eaf2fbb741591ef015730cbbf24d414ff3a83fdd5af5fce5589a99baa2a707aef7abadea64dfcff09520a67cfacc932e0acd2d52d76daae

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t9419907.exe

                Filesize

                204KB

                MD5

                a432cf58e51cf13a386812ca12ed2a7b

                SHA1

                4d4dbaa7bb7b9a6d8d223d4ad38d9cd2d4f7483c

                SHA256

                b68b279219dccff847cd432c07ed6f5a3158191661dd0907c64faf7888e2e173

                SHA512

                7bf3cae2f2918fda6eaf2fbb741591ef015730cbbf24d414ff3a83fdd5af5fce5589a99baa2a707aef7abadea64dfcff09520a67cfacc932e0acd2d52d76daae

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2157261.exe

                Filesize

                628KB

                MD5

                a015c61d214e65ed182ba1eacd647040

                SHA1

                60256fa1df75e1e150845dfc23c750ae6e8521f6

                SHA256

                3c21ff559f68d6e7ecad2bd9e782e174993e2386067bdabe4c4f1e6840d10adf

                SHA512

                78954853061ae457689c236a518ccba449113b9d3cbf3eee7aefb47f99e8ee605957cdc8683459d31845e429a1817c1a856721373804057ed8821692664a19b0

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2157261.exe

                Filesize

                628KB

                MD5

                a015c61d214e65ed182ba1eacd647040

                SHA1

                60256fa1df75e1e150845dfc23c750ae6e8521f6

                SHA256

                3c21ff559f68d6e7ecad2bd9e782e174993e2386067bdabe4c4f1e6840d10adf

                SHA512

                78954853061ae457689c236a518ccba449113b9d3cbf3eee7aefb47f99e8ee605957cdc8683459d31845e429a1817c1a856721373804057ed8821692664a19b0

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s5546712.exe

                Filesize

                267KB

                MD5

                6364f24be771c665706c4fe6246a0073

                SHA1

                b2b6793746bcbd2a33f71d73da96c256a2a25745

                SHA256

                d303369dcc0ca0729cc91a11d6db50bef1f319a3dbd7ea83843d829e85bcacd4

                SHA512

                b6995bacdc91770a686ddb1dd4f844f34e23224e96fbe37baa2717ff057996914ec94d4660d752182c94edb121d73e63faf0446db159ed88952d904019a8c22b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s5546712.exe

                Filesize

                267KB

                MD5

                6364f24be771c665706c4fe6246a0073

                SHA1

                b2b6793746bcbd2a33f71d73da96c256a2a25745

                SHA256

                d303369dcc0ca0729cc91a11d6db50bef1f319a3dbd7ea83843d829e85bcacd4

                SHA512

                b6995bacdc91770a686ddb1dd4f844f34e23224e96fbe37baa2717ff057996914ec94d4660d752182c94edb121d73e63faf0446db159ed88952d904019a8c22b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7055321.exe

                Filesize

                422KB

                MD5

                2be949d13d7c19772438d5d5f1bfebd0

                SHA1

                8081b979a15cb354e16ab8d0f492a7e2fb914e99

                SHA256

                92cbb152528f45fb852cf4dea623bbb6c994a16155bf29ba46b371c7a00b0522

                SHA512

                132dd951e3a9ce7920f6d904e4ccabf16fe9b167f2a3ce141bbbc81814429019ed6b43e3251f2a67dd6bc732c1d483519738537eeeed21c22b06792f84a9b4c0

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7055321.exe

                Filesize

                422KB

                MD5

                2be949d13d7c19772438d5d5f1bfebd0

                SHA1

                8081b979a15cb354e16ab8d0f492a7e2fb914e99

                SHA256

                92cbb152528f45fb852cf4dea623bbb6c994a16155bf29ba46b371c7a00b0522

                SHA512

                132dd951e3a9ce7920f6d904e4ccabf16fe9b167f2a3ce141bbbc81814429019ed6b43e3251f2a67dd6bc732c1d483519738537eeeed21c22b06792f84a9b4c0

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r2644871.exe

                Filesize

                172KB

                MD5

                c12ee921c50e5453bd0c32b9f664a203

                SHA1

                98f5f8843ead85d93ff6e59b589b19d07b5c12e1

                SHA256

                7a569cb8470f4a9742f90c805b79d8c95d76bb314a86ca9f1272e797de12a983

                SHA512

                9388772039b242d4ada02362a0396ce3e0a13778c8656cafeb9e07fff871e6a5ca921bd8037ceefe05a2b2528706fda9b0e80110fd2c69de4a15d00d2d8fa9a5

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r2644871.exe

                Filesize

                172KB

                MD5

                c12ee921c50e5453bd0c32b9f664a203

                SHA1

                98f5f8843ead85d93ff6e59b589b19d07b5c12e1

                SHA256

                7a569cb8470f4a9742f90c805b79d8c95d76bb314a86ca9f1272e797de12a983

                SHA512

                9388772039b242d4ada02362a0396ce3e0a13778c8656cafeb9e07fff871e6a5ca921bd8037ceefe05a2b2528706fda9b0e80110fd2c69de4a15d00d2d8fa9a5

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2876790.exe

                Filesize

                267KB

                MD5

                31d6986046d04310d3ff09c1246d14a9

                SHA1

                c72b3789297e3c81e8dcba937b9328199aa7daa1

                SHA256

                213adefd2bf7668f9d93d74ba1b63e20ca00fc8a0cfd774da52016e21a37a22c

                SHA512

                76306cd23709a0df95bde6d8f0820b521ebab1601dc1225ef9393afcb61b780cac5d16e5aa6059478274c9733ae9d1d78ef924d4eeb5b005eb578a10a532728f

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2876790.exe

                Filesize

                267KB

                MD5

                31d6986046d04310d3ff09c1246d14a9

                SHA1

                c72b3789297e3c81e8dcba937b9328199aa7daa1

                SHA256

                213adefd2bf7668f9d93d74ba1b63e20ca00fc8a0cfd774da52016e21a37a22c

                SHA512

                76306cd23709a0df95bde6d8f0820b521ebab1601dc1225ef9393afcb61b780cac5d16e5aa6059478274c9733ae9d1d78ef924d4eeb5b005eb578a10a532728f

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o7285036.exe

                Filesize

                267KB

                MD5

                99a4cc044f813c34a12a405ee5f1ee5c

                SHA1

                dfc1fb9387537f9eb9556fe571694ae2bb261748

                SHA256

                0fe5118df681f0e2bf870beef79d48de2ab703f23ec6ae047de08fe5be665846

                SHA512

                96f0cf8c83769c1ddc797f8e00a250dd554a0f66bab8226830cdd72d32b8192d800cb08fbed01de5918b02d3b1f910ef15bf4118749bdfc10e007efdd5e8d18f

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o7285036.exe

                Filesize

                267KB

                MD5

                99a4cc044f813c34a12a405ee5f1ee5c

                SHA1

                dfc1fb9387537f9eb9556fe571694ae2bb261748

                SHA256

                0fe5118df681f0e2bf870beef79d48de2ab703f23ec6ae047de08fe5be665846

                SHA512

                96f0cf8c83769c1ddc797f8e00a250dd554a0f66bab8226830cdd72d32b8192d800cb08fbed01de5918b02d3b1f910ef15bf4118749bdfc10e007efdd5e8d18f

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o7285036.exe

                Filesize

                267KB

                MD5

                99a4cc044f813c34a12a405ee5f1ee5c

                SHA1

                dfc1fb9387537f9eb9556fe571694ae2bb261748

                SHA256

                0fe5118df681f0e2bf870beef79d48de2ab703f23ec6ae047de08fe5be665846

                SHA512

                96f0cf8c83769c1ddc797f8e00a250dd554a0f66bab8226830cdd72d32b8192d800cb08fbed01de5918b02d3b1f910ef15bf4118749bdfc10e007efdd5e8d18f

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\p0566431.exe

                Filesize

                106KB

                MD5

                22c76e5df911fe2dc28e24ecb0f73029

                SHA1

                70a602e35c6ea6f7a277e22a689f78d6c28a9848

                SHA256

                817066c182df46a352580732afc8e2344722cc29238e267f87802ce5b5ce8a53

                SHA512

                f21ecd38723b0feab434be13202b8af373cf9390a7c6e8d22afe797fcb0ec9d403484bcd999cf0e03aac571c877a049f9a51bb38764dba048f5a1197c6d54dd2

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\p0566431.exe

                Filesize

                106KB

                MD5

                22c76e5df911fe2dc28e24ecb0f73029

                SHA1

                70a602e35c6ea6f7a277e22a689f78d6c28a9848

                SHA256

                817066c182df46a352580732afc8e2344722cc29238e267f87802ce5b5ce8a53

                SHA512

                f21ecd38723b0feab434be13202b8af373cf9390a7c6e8d22afe797fcb0ec9d403484bcd999cf0e03aac571c877a049f9a51bb38764dba048f5a1197c6d54dd2

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                73c0c85e39b9a63b42f6c4ff6d634f8b

                SHA1

                efb047b4177ad78268f6fc8bf959f58f1123eb51

                SHA256

                477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368

                SHA512

                ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                73c0c85e39b9a63b42f6c4ff6d634f8b

                SHA1

                efb047b4177ad78268f6fc8bf959f58f1123eb51

                SHA256

                477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368

                SHA512

                ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                73c0c85e39b9a63b42f6c4ff6d634f8b

                SHA1

                efb047b4177ad78268f6fc8bf959f58f1123eb51

                SHA256

                477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368

                SHA512

                ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/668-193-0x0000000005480000-0x0000000005490000-memory.dmp

                Filesize

                64KB

              • memory/668-192-0x0000000000B80000-0x0000000000BB0000-memory.dmp

                Filesize

                192KB

              • memory/1764-177-0x0000000004B30000-0x0000000004B40000-memory.dmp

                Filesize

                64KB

              • memory/1764-167-0x000000000A140000-0x000000000A152000-memory.dmp

                Filesize

                72KB

              • memory/1764-176-0x000000000B9A0000-0x000000000BECC000-memory.dmp

                Filesize

                5.2MB

              • memory/1764-175-0x000000000B7C0000-0x000000000B982000-memory.dmp

                Filesize

                1.8MB

              • memory/1764-174-0x000000000B640000-0x000000000B690000-memory.dmp

                Filesize

                320KB

              • memory/1764-161-0x0000000000450000-0x0000000000480000-memory.dmp

                Filesize

                192KB

              • memory/1764-165-0x000000000A5E0000-0x000000000ABF8000-memory.dmp

                Filesize

                6.1MB

              • memory/1764-173-0x000000000B1B0000-0x000000000B216000-memory.dmp

                Filesize

                408KB

              • memory/1764-172-0x000000000AC00000-0x000000000B1A4000-memory.dmp

                Filesize

                5.6MB

              • memory/1764-171-0x000000000A3C0000-0x000000000A452000-memory.dmp

                Filesize

                584KB

              • memory/1764-170-0x000000000A340000-0x000000000A3B6000-memory.dmp

                Filesize

                472KB

              • memory/1764-169-0x0000000004B30000-0x0000000004B40000-memory.dmp

                Filesize

                64KB

              • memory/1764-168-0x000000000A160000-0x000000000A19C000-memory.dmp

                Filesize

                240KB

              • memory/1764-166-0x000000000A000000-0x000000000A10A000-memory.dmp

                Filesize

                1.0MB

              • memory/4412-183-0x00000000001F0000-0x00000000001FA000-memory.dmp

                Filesize

                40KB

              • memory/4920-202-0x0000000004B80000-0x0000000004B90000-memory.dmp

                Filesize

                64KB

              • memory/4920-198-0x0000000000650000-0x0000000000680000-memory.dmp

                Filesize

                192KB