Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20-03-2023 20:54

General

  • Target

    fe0dc6ee0979f09e421365ce9063795f67d5923014e820693a6de48188849a93.exe

  • Size

    1.0MB

  • MD5

    a2abd95f23c848b72a0df6108b5a51f1

  • SHA1

    64983a19c63131aec6bdd3204fdc90794042bdb3

  • SHA256

    fe0dc6ee0979f09e421365ce9063795f67d5923014e820693a6de48188849a93

  • SHA512

    c40fec7a08984081847255cf0e6df9fcf17d789a676cee1d17c513a302a10530bd70ff879dcf927a3a5aacafc38ede118e88846737ba70b56acd21bc9b290db9

  • SSDEEP

    24576:qcgl0UbOA38c+nPHiAnKQY6bTOq7l811jmJ:kysFl+PLnKTe37lg1a

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Extracted

Family

redline

Botnet

relon

C2

193.233.20.30:4125

Attributes
  • auth_value

    17da69809725577b595e217ba006b869

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe0dc6ee0979f09e421365ce9063795f67d5923014e820693a6de48188849a93.exe
    "C:\Users\Admin\AppData\Local\Temp\fe0dc6ee0979f09e421365ce9063795f67d5923014e820693a6de48188849a93.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino1618.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino1618.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3736
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino6854.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino6854.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4184
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0437.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0437.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4228
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus0059.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus0059.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4368
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con8652.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con8652.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4924
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\doh00s76.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\doh00s76.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1468
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en788815.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en788815.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge666768.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge666768.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4440
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3860
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4444
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3528
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4120
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:1824
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:4960
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4944
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:4892
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:3384
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:3264
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:3416

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge666768.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge666768.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino1618.exe

                Filesize

                776KB

                MD5

                280eff89dfa9586a6178456c735d1e58

                SHA1

                c50c989515aac3b862ea49da85614f58096287be

                SHA256

                0559822b029b8e01344898fd4ece19d41e8fa2091a25b6ba6163eb343fb077eb

                SHA512

                0db937838c90b3236613e403bd5419f3829e742a697437b5f92437f0852d0503b459c3e11ecd688b787097129d9340b1564de0e923c5e877b3c1efad487b8f3f

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino1618.exe

                Filesize

                776KB

                MD5

                280eff89dfa9586a6178456c735d1e58

                SHA1

                c50c989515aac3b862ea49da85614f58096287be

                SHA256

                0559822b029b8e01344898fd4ece19d41e8fa2091a25b6ba6163eb343fb077eb

                SHA512

                0db937838c90b3236613e403bd5419f3829e742a697437b5f92437f0852d0503b459c3e11ecd688b787097129d9340b1564de0e923c5e877b3c1efad487b8f3f

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en788815.exe

                Filesize

                175KB

                MD5

                6fbff2d7c9ba7f0a71f02a5c70df9dfc

                SHA1

                003da0075734cd2d7f201c5b0e4779b8e1f33621

                SHA256

                cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3

                SHA512

                25842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en788815.exe

                Filesize

                175KB

                MD5

                6fbff2d7c9ba7f0a71f02a5c70df9dfc

                SHA1

                003da0075734cd2d7f201c5b0e4779b8e1f33621

                SHA256

                cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3

                SHA512

                25842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino6854.exe

                Filesize

                634KB

                MD5

                503b0eba729467fa72e24fb4a9c1b862

                SHA1

                8f66520f2fb93b7941e7fb13cdc8722b7322aef0

                SHA256

                f39541613e478b9703c5140cd04827cecf71acaba61b80fd0347992d149fc9c2

                SHA512

                0dcc74a0cca3976310469f0e7b21a00300c04876e3406252fbd95b2ff712bb7fa201fec35cd480084e97a52838a59e96a2136d1fad22a387183706548babc8e1

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino6854.exe

                Filesize

                634KB

                MD5

                503b0eba729467fa72e24fb4a9c1b862

                SHA1

                8f66520f2fb93b7941e7fb13cdc8722b7322aef0

                SHA256

                f39541613e478b9703c5140cd04827cecf71acaba61b80fd0347992d149fc9c2

                SHA512

                0dcc74a0cca3976310469f0e7b21a00300c04876e3406252fbd95b2ff712bb7fa201fec35cd480084e97a52838a59e96a2136d1fad22a387183706548babc8e1

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\doh00s76.exe

                Filesize

                288KB

                MD5

                0818a169bf373fe06b341c43c0137674

                SHA1

                f01d799f5cd75df7101d0ede4070274b61833ede

                SHA256

                6cfa46ffbdcdd4bdb0cecd144f03a20924e2f2d7f19d74138271f2a4afe74404

                SHA512

                8890880dc9525d0b2b5f7e6efbee1d7de261bdb745d2f3e3723b58f7a9255f7157e3b65d2eb788ec72183fb52d006699aa54b1d2b9de888dea40fd1cb16b981f

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\doh00s76.exe

                Filesize

                288KB

                MD5

                0818a169bf373fe06b341c43c0137674

                SHA1

                f01d799f5cd75df7101d0ede4070274b61833ede

                SHA256

                6cfa46ffbdcdd4bdb0cecd144f03a20924e2f2d7f19d74138271f2a4afe74404

                SHA512

                8890880dc9525d0b2b5f7e6efbee1d7de261bdb745d2f3e3723b58f7a9255f7157e3b65d2eb788ec72183fb52d006699aa54b1d2b9de888dea40fd1cb16b981f

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0437.exe

                Filesize

                314KB

                MD5

                4d0ec8a1236e4f2c096edf63a04eabfe

                SHA1

                a21e2119a7825515a0d941d959c65e82c5b6385c

                SHA256

                d8bbfd2ee31fad68bbb8597813df340338ab0e0c0ac94536dc278bf6bc298ad2

                SHA512

                5fff8d3d30f51119e6aa204f279bc9e91a4307142b45667a6799ab40d2d9623a0717f9f303d012540dfcac7d80d3f7f756f4449e2701a1e894f4fb7f503aeeb1

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0437.exe

                Filesize

                314KB

                MD5

                4d0ec8a1236e4f2c096edf63a04eabfe

                SHA1

                a21e2119a7825515a0d941d959c65e82c5b6385c

                SHA256

                d8bbfd2ee31fad68bbb8597813df340338ab0e0c0ac94536dc278bf6bc298ad2

                SHA512

                5fff8d3d30f51119e6aa204f279bc9e91a4307142b45667a6799ab40d2d9623a0717f9f303d012540dfcac7d80d3f7f756f4449e2701a1e894f4fb7f503aeeb1

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus0059.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus0059.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con8652.exe

                Filesize

                230KB

                MD5

                016c4c52f6a4d3a5a8640a78dacfaa30

                SHA1

                448283f933e9d42e8000f08311a7f136d42edeb6

                SHA256

                1bd507b03a9e317ae6fd592bb005306de390469f59a8101ee8f6444ba576cca3

                SHA512

                10a25b4ade60007bf4fb4caca9350a79afa48e786df43e937ee99a8e2b92d682b8eeca170d003c192088a5bce9376baeec0d89d604f97aa06cfc7b49bc400732

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con8652.exe

                Filesize

                230KB

                MD5

                016c4c52f6a4d3a5a8640a78dacfaa30

                SHA1

                448283f933e9d42e8000f08311a7f136d42edeb6

                SHA256

                1bd507b03a9e317ae6fd592bb005306de390469f59a8101ee8f6444ba576cca3

                SHA512

                10a25b4ade60007bf4fb4caca9350a79afa48e786df43e937ee99a8e2b92d682b8eeca170d003c192088a5bce9376baeec0d89d604f97aa06cfc7b49bc400732

              • memory/1468-1118-0x0000000005450000-0x000000000549B000-memory.dmp

                Filesize

                300KB

              • memory/1468-228-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/1468-1130-0x0000000002670000-0x0000000002680000-memory.dmp

                Filesize

                64KB

              • memory/1468-1129-0x00000000067A0000-0x0000000006CCC000-memory.dmp

                Filesize

                5.2MB

              • memory/1468-1128-0x00000000065D0000-0x0000000006792000-memory.dmp

                Filesize

                1.8MB

              • memory/1468-1127-0x0000000006560000-0x00000000065B0000-memory.dmp

                Filesize

                320KB

              • memory/1468-1126-0x00000000064D0000-0x0000000006546000-memory.dmp

                Filesize

                472KB

              • memory/1468-1125-0x0000000002670000-0x0000000002680000-memory.dmp

                Filesize

                64KB

              • memory/1468-1124-0x0000000002670000-0x0000000002680000-memory.dmp

                Filesize

                64KB

              • memory/1468-1123-0x0000000002670000-0x0000000002680000-memory.dmp

                Filesize

                64KB

              • memory/1468-1122-0x0000000005680000-0x00000000056E6000-memory.dmp

                Filesize

                408KB

              • memory/1468-1121-0x00000000055E0000-0x0000000005672000-memory.dmp

                Filesize

                584KB

              • memory/1468-1117-0x0000000002670000-0x0000000002680000-memory.dmp

                Filesize

                64KB

              • memory/1468-1116-0x0000000005300000-0x000000000533E000-memory.dmp

                Filesize

                248KB

              • memory/1468-1115-0x00000000052E0000-0x00000000052F2000-memory.dmp

                Filesize

                72KB

              • memory/1468-1114-0x00000000051A0000-0x00000000052AA000-memory.dmp

                Filesize

                1.0MB

              • memory/1468-1113-0x0000000005750000-0x0000000005D56000-memory.dmp

                Filesize

                6.0MB

              • memory/1468-201-0x0000000002050000-0x0000000002096000-memory.dmp

                Filesize

                280KB

              • memory/1468-202-0x00000000025E0000-0x0000000002624000-memory.dmp

                Filesize

                272KB

              • memory/1468-204-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/1468-206-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/1468-203-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/1468-208-0x00000000006E0000-0x000000000072B000-memory.dmp

                Filesize

                300KB

              • memory/1468-210-0x0000000002670000-0x0000000002680000-memory.dmp

                Filesize

                64KB

              • memory/1468-209-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/1468-213-0x0000000002670000-0x0000000002680000-memory.dmp

                Filesize

                64KB

              • memory/1468-212-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/1468-216-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/1468-215-0x0000000002670000-0x0000000002680000-memory.dmp

                Filesize

                64KB

              • memory/1468-218-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/1468-220-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/1468-222-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/1468-224-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/1468-238-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/1468-230-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/1468-226-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/1468-232-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/1468-234-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/1468-236-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/2968-1137-0x0000000000780000-0x00000000007B2000-memory.dmp

                Filesize

                200KB

              • memory/2968-1139-0x00000000051C0000-0x000000000520B000-memory.dmp

                Filesize

                300KB

              • memory/2968-1138-0x0000000005010000-0x0000000005020000-memory.dmp

                Filesize

                64KB

              • memory/3240-130-0x0000000004490000-0x0000000004581000-memory.dmp

                Filesize

                964KB

              • memory/3240-153-0x0000000000400000-0x0000000000583000-memory.dmp

                Filesize

                1.5MB

              • memory/4368-152-0x00000000000B0000-0x00000000000BA000-memory.dmp

                Filesize

                40KB

              • memory/4924-191-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

                Filesize

                64KB

              • memory/4924-164-0x00000000049E0000-0x00000000049F2000-memory.dmp

                Filesize

                72KB

              • memory/4924-190-0x00000000049E0000-0x00000000049F2000-memory.dmp

                Filesize

                72KB

              • memory/4924-188-0x00000000049E0000-0x00000000049F2000-memory.dmp

                Filesize

                72KB

              • memory/4924-186-0x00000000049E0000-0x00000000049F2000-memory.dmp

                Filesize

                72KB

              • memory/4924-184-0x00000000049E0000-0x00000000049F2000-memory.dmp

                Filesize

                72KB

              • memory/4924-182-0x00000000049E0000-0x00000000049F2000-memory.dmp

                Filesize

                72KB

              • memory/4924-180-0x00000000049E0000-0x00000000049F2000-memory.dmp

                Filesize

                72KB

              • memory/4924-178-0x00000000049E0000-0x00000000049F2000-memory.dmp

                Filesize

                72KB

              • memory/4924-176-0x00000000049E0000-0x00000000049F2000-memory.dmp

                Filesize

                72KB

              • memory/4924-174-0x00000000049E0000-0x00000000049F2000-memory.dmp

                Filesize

                72KB

              • memory/4924-172-0x00000000049E0000-0x00000000049F2000-memory.dmp

                Filesize

                72KB

              • memory/4924-163-0x00000000049E0000-0x00000000049F2000-memory.dmp

                Filesize

                72KB

              • memory/4924-166-0x00000000049E0000-0x00000000049F2000-memory.dmp

                Filesize

                72KB

              • memory/4924-192-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

                Filesize

                64KB

              • memory/4924-194-0x0000000000400000-0x00000000004BA000-memory.dmp

                Filesize

                744KB

              • memory/4924-162-0x00000000049E0000-0x00000000049F8000-memory.dmp

                Filesize

                96KB

              • memory/4924-161-0x0000000004BC0000-0x00000000050BE000-memory.dmp

                Filesize

                5.0MB

              • memory/4924-160-0x0000000002290000-0x00000000022AA000-memory.dmp

                Filesize

                104KB

              • memory/4924-159-0x00000000004C0000-0x00000000004ED000-memory.dmp

                Filesize

                180KB

              • memory/4924-196-0x0000000000400000-0x00000000004BA000-memory.dmp

                Filesize

                744KB

              • memory/4924-170-0x00000000049E0000-0x00000000049F2000-memory.dmp

                Filesize

                72KB

              • memory/4924-168-0x00000000049E0000-0x00000000049F2000-memory.dmp

                Filesize

                72KB