Analysis

  • max time kernel
    107s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15/03/2023, 17:16

General

  • Target

    448c9c58d323558d1a8a3c174c93b30b389d3f435742810adb405291411e985b.exe

  • Size

    1.2MB

  • MD5

    9a3e2dbeba9505ab0c389f06f9590463

  • SHA1

    73a6b409ca1a76762b529f55d41293803f1a5ffe

  • SHA256

    448c9c58d323558d1a8a3c174c93b30b389d3f435742810adb405291411e985b

  • SHA512

    9d71f1bb2b1bccd519d4a22add67db3d12d0f748daa98680c15f393b478a22b38dbff3f6521276739ecb8e05a7698a528381c6cc91af899d7b4a450a795d94f5

  • SSDEEP

    24576:OayERURkqhI9erD91ItsZKbtEkua2XgcqfuM8gTtvo1pvY:OmUf29m6GZMtXufgvf78gTtvo

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

sito

C2

193.233.20.28:4125

Attributes
  • auth_value

    030f94d8e396dbe51ce339b815cdad17

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\448c9c58d323558d1a8a3c174c93b30b389d3f435742810adb405291411e985b.exe
    "C:\Users\Admin\AppData\Local\Temp\448c9c58d323558d1a8a3c174c93b30b389d3f435742810adb405291411e985b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4756
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino2410.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino2410.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3944
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8706.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8706.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3824
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0396.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0396.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4800
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus8532.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus8532.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3096
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con1154.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con1154.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3596
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dlz62s30.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dlz62s30.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en832526.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en832526.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2552
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge541952.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge541952.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3988
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:756
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:760
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:404
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:512
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:428
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:652
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:3948
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:1840
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:924

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge541952.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge541952.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino2410.exe

                Filesize

                849KB

                MD5

                66d0cb456c74b345e15c79a8f3f11e65

                SHA1

                cd28de2f6ecdba3358fc31790e0e0799bda2fda9

                SHA256

                d1bab3c2822a373acd5d2fe05efe85531cae1b39e1229a03e7cec99d10f16221

                SHA512

                21e4f6dea1bd0157b30e7e50f1fd6025b2bb04e044b63f781d986a37734c9810ef3e1cfa763ad8b6ce33f07d3b4e6c0e28cbb9c585076f36ebb659d3fbdeaf91

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino2410.exe

                Filesize

                849KB

                MD5

                66d0cb456c74b345e15c79a8f3f11e65

                SHA1

                cd28de2f6ecdba3358fc31790e0e0799bda2fda9

                SHA256

                d1bab3c2822a373acd5d2fe05efe85531cae1b39e1229a03e7cec99d10f16221

                SHA512

                21e4f6dea1bd0157b30e7e50f1fd6025b2bb04e044b63f781d986a37734c9810ef3e1cfa763ad8b6ce33f07d3b4e6c0e28cbb9c585076f36ebb659d3fbdeaf91

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en832526.exe

                Filesize

                175KB

                MD5

                795f3fe5687db9b19853eaf6acdc389a

                SHA1

                cd1ba862909c58a01d3a8e44c29cb71bb6b50630

                SHA256

                448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56

                SHA512

                d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en832526.exe

                Filesize

                175KB

                MD5

                795f3fe5687db9b19853eaf6acdc389a

                SHA1

                cd1ba862909c58a01d3a8e44c29cb71bb6b50630

                SHA256

                448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56

                SHA512

                d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8706.exe

                Filesize

                707KB

                MD5

                6a1aeef51bec135392e6f022da1d296e

                SHA1

                0d3fed7d43397b38654d7069805a3c5ae7235b50

                SHA256

                3e5bfbe659030da01f72b26f5903b48c07cb861a4f2b4f5bf7ca465a93354718

                SHA512

                911a8f951ee4367c028dcd24f88c2b27a5efed827c69cfda860098a4f36961a0a2342cd117e4980ea1581adcb7cbf4a6fde3c19e5f6caef9f12ce6188e082476

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8706.exe

                Filesize

                707KB

                MD5

                6a1aeef51bec135392e6f022da1d296e

                SHA1

                0d3fed7d43397b38654d7069805a3c5ae7235b50

                SHA256

                3e5bfbe659030da01f72b26f5903b48c07cb861a4f2b4f5bf7ca465a93354718

                SHA512

                911a8f951ee4367c028dcd24f88c2b27a5efed827c69cfda860098a4f36961a0a2342cd117e4980ea1581adcb7cbf4a6fde3c19e5f6caef9f12ce6188e082476

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dlz62s30.exe

                Filesize

                399KB

                MD5

                f2666c6b6ec3dc3b712fa1740aa136ad

                SHA1

                9f27869e178c08574f07a02da937e3a05726c40f

                SHA256

                6263b835e13df2591f5fa9a5dcfe7915e6b03beb7ab24f1c23130d6680005bc2

                SHA512

                de132f03c2d50aa36ba7dd1b55c888a508a9ac3c4c71dc834bb1134e68f07270ea638d886fc8726038d2c341f8ca165017e88bf91214ac7e6b265771f0155e10

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dlz62s30.exe

                Filesize

                399KB

                MD5

                f2666c6b6ec3dc3b712fa1740aa136ad

                SHA1

                9f27869e178c08574f07a02da937e3a05726c40f

                SHA256

                6263b835e13df2591f5fa9a5dcfe7915e6b03beb7ab24f1c23130d6680005bc2

                SHA512

                de132f03c2d50aa36ba7dd1b55c888a508a9ac3c4c71dc834bb1134e68f07270ea638d886fc8726038d2c341f8ca165017e88bf91214ac7e6b265771f0155e10

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0396.exe

                Filesize

                350KB

                MD5

                9a0d0cdf9917564da2326c3353038e97

                SHA1

                25af8e2f1996f25111287fa120fd4d8cb43662fc

                SHA256

                c24710e640815047f624ca76d2fdb74243cf55438928b50b97d69fa0e9967882

                SHA512

                88e2ef1287c2cf3ef444967ab36d4f51681d1723471154f5104e7bf4b93b3184b00a2719b884eb56e54986b8dddcb46a0f2eb2bf625e8d91c167a5d85fb9a870

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0396.exe

                Filesize

                350KB

                MD5

                9a0d0cdf9917564da2326c3353038e97

                SHA1

                25af8e2f1996f25111287fa120fd4d8cb43662fc

                SHA256

                c24710e640815047f624ca76d2fdb74243cf55438928b50b97d69fa0e9967882

                SHA512

                88e2ef1287c2cf3ef444967ab36d4f51681d1723471154f5104e7bf4b93b3184b00a2719b884eb56e54986b8dddcb46a0f2eb2bf625e8d91c167a5d85fb9a870

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus8532.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus8532.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con1154.exe

                Filesize

                342KB

                MD5

                8bc9c57aa0937fa5e4e00e3f102dbfc2

                SHA1

                7da0642ebb39df07779b0ae6bd1aeb46cfa1c8f8

                SHA256

                cc5243958b10b02874dee327d7c5c4b1b1561057395622b2c6ada34b3bfdedb1

                SHA512

                de2527ae56fc567dfa6d2bb4215bcce0f64ec721f791c3c77de0a16ed029df5693eb7e5b6ec7888e278ec221738e592088bbd2cf14d3eef3c139a11952dda1d4

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con1154.exe

                Filesize

                342KB

                MD5

                8bc9c57aa0937fa5e4e00e3f102dbfc2

                SHA1

                7da0642ebb39df07779b0ae6bd1aeb46cfa1c8f8

                SHA256

                cc5243958b10b02874dee327d7c5c4b1b1561057395622b2c6ada34b3bfdedb1

                SHA512

                de2527ae56fc567dfa6d2bb4215bcce0f64ec721f791c3c77de0a16ed029df5693eb7e5b6ec7888e278ec221738e592088bbd2cf14d3eef3c139a11952dda1d4

              • memory/2552-1140-0x0000000004BC0000-0x0000000004C0B000-memory.dmp

                Filesize

                300KB

              • memory/2552-1141-0x0000000004A90000-0x0000000004AA0000-memory.dmp

                Filesize

                64KB

              • memory/2552-1139-0x0000000000180000-0x00000000001B2000-memory.dmp

                Filesize

                200KB

              • memory/3096-152-0x0000000000AA0000-0x0000000000AAA000-memory.dmp

                Filesize

                40KB

              • memory/3596-176-0x0000000007040000-0x0000000007052000-memory.dmp

                Filesize

                72KB

              • memory/3596-198-0x00000000071F0000-0x0000000007200000-memory.dmp

                Filesize

                64KB

              • memory/3596-180-0x0000000007040000-0x0000000007052000-memory.dmp

                Filesize

                72KB

              • memory/3596-182-0x0000000007040000-0x0000000007052000-memory.dmp

                Filesize

                72KB

              • memory/3596-184-0x0000000007040000-0x0000000007052000-memory.dmp

                Filesize

                72KB

              • memory/3596-186-0x0000000007040000-0x0000000007052000-memory.dmp

                Filesize

                72KB

              • memory/3596-188-0x0000000007040000-0x0000000007052000-memory.dmp

                Filesize

                72KB

              • memory/3596-190-0x0000000007040000-0x0000000007052000-memory.dmp

                Filesize

                72KB

              • memory/3596-191-0x00000000071F0000-0x0000000007200000-memory.dmp

                Filesize

                64KB

              • memory/3596-192-0x00000000071F0000-0x0000000007200000-memory.dmp

                Filesize

                64KB

              • memory/3596-193-0x00000000071F0000-0x0000000007200000-memory.dmp

                Filesize

                64KB

              • memory/3596-195-0x0000000000400000-0x0000000002B1A000-memory.dmp

                Filesize

                39.1MB

              • memory/3596-197-0x0000000000400000-0x0000000002B1A000-memory.dmp

                Filesize

                39.1MB

              • memory/3596-178-0x0000000007040000-0x0000000007052000-memory.dmp

                Filesize

                72KB

              • memory/3596-174-0x0000000007040000-0x0000000007052000-memory.dmp

                Filesize

                72KB

              • memory/3596-172-0x0000000007040000-0x0000000007052000-memory.dmp

                Filesize

                72KB

              • memory/3596-170-0x0000000007040000-0x0000000007052000-memory.dmp

                Filesize

                72KB

              • memory/3596-168-0x0000000007040000-0x0000000007052000-memory.dmp

                Filesize

                72KB

              • memory/3596-166-0x0000000007040000-0x0000000007052000-memory.dmp

                Filesize

                72KB

              • memory/3596-164-0x0000000007040000-0x0000000007052000-memory.dmp

                Filesize

                72KB

              • memory/3596-163-0x0000000007040000-0x0000000007052000-memory.dmp

                Filesize

                72KB

              • memory/3596-162-0x0000000007040000-0x0000000007058000-memory.dmp

                Filesize

                96KB

              • memory/3596-161-0x0000000007200000-0x00000000076FE000-memory.dmp

                Filesize

                5.0MB

              • memory/3596-160-0x0000000004740000-0x000000000475A000-memory.dmp

                Filesize

                104KB

              • memory/3596-159-0x00000000001D0000-0x00000000001FD000-memory.dmp

                Filesize

                180KB

              • memory/3600-209-0x0000000004B60000-0x0000000004B9E000-memory.dmp

                Filesize

                248KB

              • memory/3600-220-0x0000000004B60000-0x0000000004B9E000-memory.dmp

                Filesize

                248KB

              • memory/3600-222-0x0000000004B60000-0x0000000004B9E000-memory.dmp

                Filesize

                248KB

              • memory/3600-224-0x0000000004B60000-0x0000000004B9E000-memory.dmp

                Filesize

                248KB

              • memory/3600-226-0x0000000004B60000-0x0000000004B9E000-memory.dmp

                Filesize

                248KB

              • memory/3600-228-0x0000000004B60000-0x0000000004B9E000-memory.dmp

                Filesize

                248KB

              • memory/3600-230-0x0000000004B60000-0x0000000004B9E000-memory.dmp

                Filesize

                248KB

              • memory/3600-232-0x0000000004B60000-0x0000000004B9E000-memory.dmp

                Filesize

                248KB

              • memory/3600-234-0x0000000004B60000-0x0000000004B9E000-memory.dmp

                Filesize

                248KB

              • memory/3600-236-0x0000000004B60000-0x0000000004B9E000-memory.dmp

                Filesize

                248KB

              • memory/3600-238-0x0000000004B60000-0x0000000004B9E000-memory.dmp

                Filesize

                248KB

              • memory/3600-240-0x0000000004B60000-0x0000000004B9E000-memory.dmp

                Filesize

                248KB

              • memory/3600-1116-0x0000000007DC0000-0x00000000083C6000-memory.dmp

                Filesize

                6.0MB

              • memory/3600-1117-0x00000000077B0000-0x00000000078BA000-memory.dmp

                Filesize

                1.0MB

              • memory/3600-1118-0x00000000071E0000-0x00000000071F2000-memory.dmp

                Filesize

                72KB

              • memory/3600-1119-0x00000000072A0000-0x00000000072B0000-memory.dmp

                Filesize

                64KB

              • memory/3600-1120-0x0000000007200000-0x000000000723E000-memory.dmp

                Filesize

                248KB

              • memory/3600-1121-0x0000000007250000-0x000000000729B000-memory.dmp

                Filesize

                300KB

              • memory/3600-1123-0x0000000007B00000-0x0000000007B92000-memory.dmp

                Filesize

                584KB

              • memory/3600-1124-0x0000000007BA0000-0x0000000007C06000-memory.dmp

                Filesize

                408KB

              • memory/3600-1125-0x00000000072A0000-0x00000000072B0000-memory.dmp

                Filesize

                64KB

              • memory/3600-1126-0x00000000072A0000-0x00000000072B0000-memory.dmp

                Filesize

                64KB

              • memory/3600-1127-0x00000000072A0000-0x00000000072B0000-memory.dmp

                Filesize

                64KB

              • memory/3600-1129-0x00000000072A0000-0x00000000072B0000-memory.dmp

                Filesize

                64KB

              • memory/3600-1130-0x00000000089F0000-0x0000000008A66000-memory.dmp

                Filesize

                472KB

              • memory/3600-1131-0x0000000008A80000-0x0000000008AD0000-memory.dmp

                Filesize

                320KB

              • memory/3600-1132-0x0000000008D30000-0x0000000008EF2000-memory.dmp

                Filesize

                1.8MB

              • memory/3600-1133-0x0000000008F00000-0x000000000942C000-memory.dmp

                Filesize

                5.2MB

              • memory/3600-218-0x0000000004B60000-0x0000000004B9E000-memory.dmp

                Filesize

                248KB

              • memory/3600-216-0x0000000004B60000-0x0000000004B9E000-memory.dmp

                Filesize

                248KB

              • memory/3600-214-0x0000000004B60000-0x0000000004B9E000-memory.dmp

                Filesize

                248KB

              • memory/3600-212-0x0000000004B60000-0x0000000004B9E000-memory.dmp

                Filesize

                248KB

              • memory/3600-207-0x00000000072A0000-0x00000000072B0000-memory.dmp

                Filesize

                64KB

              • memory/3600-210-0x00000000072A0000-0x00000000072B0000-memory.dmp

                Filesize

                64KB

              • memory/3600-208-0x0000000004B60000-0x0000000004B9E000-memory.dmp

                Filesize

                248KB

              • memory/3600-206-0x00000000072A0000-0x00000000072B0000-memory.dmp

                Filesize

                64KB

              • memory/3600-205-0x0000000002D20000-0x0000000002D6B000-memory.dmp

                Filesize

                300KB

              • memory/3600-204-0x0000000004B60000-0x0000000004BA4000-memory.dmp

                Filesize

                272KB

              • memory/3600-203-0x00000000049B0000-0x00000000049F6000-memory.dmp

                Filesize

                280KB

              • memory/4756-127-0x0000000004830000-0x0000000004933000-memory.dmp

                Filesize

                1.0MB

              • memory/4756-153-0x0000000000400000-0x0000000000941000-memory.dmp

                Filesize

                5.3MB