Analysis

  • max time kernel
    110s
  • max time network
    117s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22-03-2023 01:42

General

  • Target

    07049510c9904076813923059fb7f44483631a808603bdf0105255d8a466f44b.exe

  • Size

    992KB

  • MD5

    b109b385040caa1f3eb0d5ca5af0af22

  • SHA1

    e421280f09da2f05544ffe422766ca78dc158756

  • SHA256

    07049510c9904076813923059fb7f44483631a808603bdf0105255d8a466f44b

  • SHA512

    e7274d8d1b09f11d12c1c15d4cc0ca57bc93546b3f09081763d23163b067f53cdf036358ea33643966bb203c2d2ddd2e075f0944d8b489f4e9bde813217d70c3

  • SSDEEP

    24576:Iycl26JIDwQ/OagKwAxjMvUfCL78NZyl/MQHRcPBE1:P+26JSw8Oag6xHQiyGQxc5E

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

maxi

C2

193.233.20.30:4125

Attributes
  • auth_value

    6e90da232d4c2e35c1a36c250f5f8904

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07049510c9904076813923059fb7f44483631a808603bdf0105255d8a466f44b.exe
    "C:\Users\Admin\AppData\Local\Temp\07049510c9904076813923059fb7f44483631a808603bdf0105255d8a466f44b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino2772.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino2772.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino2781.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino2781.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3748
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino5607.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino5607.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4140
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus0470.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus0470.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4196
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0781.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0781.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2084
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dbA68s56.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dbA68s56.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3136
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en703215.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en703215.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3580
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge471227.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge471227.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3012
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3888
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4384
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3776
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4996
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:4936
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:4120
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\5975271bda" /P "Admin:N"
                  5⤵
                    PID:4952
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    5⤵
                      PID:1824
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:4984
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:3428

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge471227.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge471227.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino2772.exe

                Filesize

                809KB

                MD5

                3eb22899dd029318630339bd7bdf86b9

                SHA1

                2cd5691b3fbd4f10f2963212407c74dfbeec1eb5

                SHA256

                8b84d72f7cc1c51e653aef5f7fa30c82c3fde69abce9ea3250cef6d2230915ec

                SHA512

                8726d92f6b91e67d809236ca7489a0814e8841ef8bf407ef549c8b5740ea3c28916731da6ec8879f111d07e3f7312784dbe8898d6d4a25591872cfd6b9181474

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino2772.exe

                Filesize

                809KB

                MD5

                3eb22899dd029318630339bd7bdf86b9

                SHA1

                2cd5691b3fbd4f10f2963212407c74dfbeec1eb5

                SHA256

                8b84d72f7cc1c51e653aef5f7fa30c82c3fde69abce9ea3250cef6d2230915ec

                SHA512

                8726d92f6b91e67d809236ca7489a0814e8841ef8bf407ef549c8b5740ea3c28916731da6ec8879f111d07e3f7312784dbe8898d6d4a25591872cfd6b9181474

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en703215.exe

                Filesize

                175KB

                MD5

                0bad76cd3276f38206bf62a5f6061853

                SHA1

                e7f11197db98b02eff7904e04e7a3f6af5bfd898

                SHA256

                5ee4a25885ee8a675008057b7e76ee78f1e6750bc65f673ba260e95525588504

                SHA512

                41d3b0443e4aed4e5e6b4ed285edd1c675f21dfd5db6ccf66be11150bb60a5fbb68f79f835516bad143fbe12d4dfef46a4c80852d9332afb3db50316d83f4f59

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en703215.exe

                Filesize

                175KB

                MD5

                0bad76cd3276f38206bf62a5f6061853

                SHA1

                e7f11197db98b02eff7904e04e7a3f6af5bfd898

                SHA256

                5ee4a25885ee8a675008057b7e76ee78f1e6750bc65f673ba260e95525588504

                SHA512

                41d3b0443e4aed4e5e6b4ed285edd1c675f21dfd5db6ccf66be11150bb60a5fbb68f79f835516bad143fbe12d4dfef46a4c80852d9332afb3db50316d83f4f59

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino2781.exe

                Filesize

                667KB

                MD5

                815ef1eb70926855b7c72fe8e8c32da3

                SHA1

                943a7a7e7aee4969ea1b73778ba17c211009593e

                SHA256

                05686dbd4542d044df94185581a21da3014d05cc4aca151e1c0abecba5c94da0

                SHA512

                5426323e8e78ba07914995651253253c3f3230a47b64611ef8ccb66a540fec8a4b21ce9f7639e5ce4974985547104ad82e6c30b875ce9fd7fc8dd3a5a3ceca1e

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino2781.exe

                Filesize

                667KB

                MD5

                815ef1eb70926855b7c72fe8e8c32da3

                SHA1

                943a7a7e7aee4969ea1b73778ba17c211009593e

                SHA256

                05686dbd4542d044df94185581a21da3014d05cc4aca151e1c0abecba5c94da0

                SHA512

                5426323e8e78ba07914995651253253c3f3230a47b64611ef8ccb66a540fec8a4b21ce9f7639e5ce4974985547104ad82e6c30b875ce9fd7fc8dd3a5a3ceca1e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dbA68s56.exe

                Filesize

                316KB

                MD5

                f53f2308cb08bcb21ec9b2b731b83552

                SHA1

                a6558a7a78b5ed25f04714e6aa01b883c3fc8365

                SHA256

                b24c977a8a542a0539727478d12867b486fb3423db3ad60e3ae4492dc662c06e

                SHA512

                6312ff6bbdfa586aa82b73e4664ca1048bbf8f4abe31606fd15017b4edb1687b4893f2931d0d2c16038eb5085e5c0f6dce415d71e58ad8f344d3fb9e060c3f30

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dbA68s56.exe

                Filesize

                316KB

                MD5

                f53f2308cb08bcb21ec9b2b731b83552

                SHA1

                a6558a7a78b5ed25f04714e6aa01b883c3fc8365

                SHA256

                b24c977a8a542a0539727478d12867b486fb3423db3ad60e3ae4492dc662c06e

                SHA512

                6312ff6bbdfa586aa82b73e4664ca1048bbf8f4abe31606fd15017b4edb1687b4893f2931d0d2c16038eb5085e5c0f6dce415d71e58ad8f344d3fb9e060c3f30

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino5607.exe

                Filesize

                330KB

                MD5

                252ac72a6956783fd43503b195fcf07a

                SHA1

                432c4130ec2c0ba0357b3190d2d06053f9c7bc81

                SHA256

                3847b40ceb37023e7966db9b484e35f5e10d63f04a79f4ce06c6beaa9de0e017

                SHA512

                d4230516f262b44eb99c73c3eadbdab70e13bced51c5035e582a53998c5588f14b9e951e6a36ec913f3df16e6d64c3d4c913c3054c9fb66037598d1171ad4e2b

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino5607.exe

                Filesize

                330KB

                MD5

                252ac72a6956783fd43503b195fcf07a

                SHA1

                432c4130ec2c0ba0357b3190d2d06053f9c7bc81

                SHA256

                3847b40ceb37023e7966db9b484e35f5e10d63f04a79f4ce06c6beaa9de0e017

                SHA512

                d4230516f262b44eb99c73c3eadbdab70e13bced51c5035e582a53998c5588f14b9e951e6a36ec913f3df16e6d64c3d4c913c3054c9fb66037598d1171ad4e2b

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus0470.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus0470.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0781.exe

                Filesize

                258KB

                MD5

                d13bd6765c6800a4ebfa1269c6f906ea

                SHA1

                7b6df962fddfd52964d6a5626248b659c2d0fe5d

                SHA256

                d9e37add28816cd6586f23dca4e8cacac65d93b25723f7a14cf75c3caa1d3a00

                SHA512

                646ce7baa8e71b7b44b32fd974338be8ed97021082a71d56e4078043368ae882d1fc12176a7477b32cc28ce2e647cbaaa175f8a50f23dc0cfe270517f3887a59

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0781.exe

                Filesize

                258KB

                MD5

                d13bd6765c6800a4ebfa1269c6f906ea

                SHA1

                7b6df962fddfd52964d6a5626248b659c2d0fe5d

                SHA256

                d9e37add28816cd6586f23dca4e8cacac65d93b25723f7a14cf75c3caa1d3a00

                SHA512

                646ce7baa8e71b7b44b32fd974338be8ed97021082a71d56e4078043368ae882d1fc12176a7477b32cc28ce2e647cbaaa175f8a50f23dc0cfe270517f3887a59

              • memory/2084-165-0x0000000004E90000-0x0000000004EA0000-memory.dmp

                Filesize

                64KB

              • memory/2084-184-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2084-162-0x00000000001D0000-0x00000000001FD000-memory.dmp

                Filesize

                180KB

              • memory/2084-167-0x0000000004E90000-0x0000000004EA0000-memory.dmp

                Filesize

                64KB

              • memory/2084-163-0x0000000004E90000-0x0000000004EA0000-memory.dmp

                Filesize

                64KB

              • memory/2084-170-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2084-168-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2084-172-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2084-174-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2084-176-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2084-178-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2084-180-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2084-182-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2084-164-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2084-186-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2084-188-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2084-189-0x0000000000400000-0x0000000000703000-memory.dmp

                Filesize

                3.0MB

              • memory/2084-190-0x0000000004E90000-0x0000000004EA0000-memory.dmp

                Filesize

                64KB

              • memory/2084-192-0x0000000004E90000-0x0000000004EA0000-memory.dmp

                Filesize

                64KB

              • memory/2084-193-0x0000000004E90000-0x0000000004EA0000-memory.dmp

                Filesize

                64KB

              • memory/2084-194-0x0000000000400000-0x0000000000703000-memory.dmp

                Filesize

                3.0MB

              • memory/2084-160-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2084-158-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2084-157-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2084-156-0x00000000024C0000-0x00000000024D8000-memory.dmp

                Filesize

                96KB

              • memory/2084-155-0x0000000004EA0000-0x000000000539E000-memory.dmp

                Filesize

                5.0MB

              • memory/2084-154-0x0000000000AA0000-0x0000000000ABA000-memory.dmp

                Filesize

                104KB

              • memory/3136-202-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/3136-1114-0x0000000005550000-0x000000000558E000-memory.dmp

                Filesize

                248KB

              • memory/3136-212-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/3136-214-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/3136-216-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/3136-218-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/3136-220-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/3136-222-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/3136-224-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/3136-226-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/3136-228-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/3136-230-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/3136-231-0x00000000007F0000-0x000000000083B000-memory.dmp

                Filesize

                300KB

              • memory/3136-234-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/3136-233-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

                Filesize

                64KB

              • memory/3136-235-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

                Filesize

                64KB

              • memory/3136-238-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

                Filesize

                64KB

              • memory/3136-237-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/3136-1111-0x00000000059D0000-0x0000000005FD6000-memory.dmp

                Filesize

                6.0MB

              • memory/3136-1112-0x00000000053F0000-0x00000000054FA000-memory.dmp

                Filesize

                1.0MB

              • memory/3136-1113-0x0000000005530000-0x0000000005542000-memory.dmp

                Filesize

                72KB

              • memory/3136-210-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/3136-1115-0x00000000056A0000-0x00000000056EB000-memory.dmp

                Filesize

                300KB

              • memory/3136-1116-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

                Filesize

                64KB

              • memory/3136-1117-0x0000000005830000-0x00000000058C2000-memory.dmp

                Filesize

                584KB

              • memory/3136-1118-0x00000000058D0000-0x0000000005936000-memory.dmp

                Filesize

                408KB

              • memory/3136-1120-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

                Filesize

                64KB

              • memory/3136-1121-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

                Filesize

                64KB

              • memory/3136-1122-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

                Filesize

                64KB

              • memory/3136-1123-0x00000000066E0000-0x00000000068A2000-memory.dmp

                Filesize

                1.8MB

              • memory/3136-1124-0x00000000068C0000-0x0000000006DEC000-memory.dmp

                Filesize

                5.2MB

              • memory/3136-1125-0x0000000007060000-0x00000000070D6000-memory.dmp

                Filesize

                472KB

              • memory/3136-1126-0x00000000070E0000-0x0000000007130000-memory.dmp

                Filesize

                320KB

              • memory/3136-199-0x0000000002490000-0x00000000024D6000-memory.dmp

                Filesize

                280KB

              • memory/3136-200-0x0000000002830000-0x0000000002874000-memory.dmp

                Filesize

                272KB

              • memory/3136-201-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/3136-208-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/3136-206-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/3136-204-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/3580-1134-0x00000000052B0000-0x00000000052C0000-memory.dmp

                Filesize

                64KB

              • memory/3580-1133-0x0000000005460000-0x00000000054AB000-memory.dmp

                Filesize

                300KB

              • memory/3580-1132-0x0000000000A20000-0x0000000000A52000-memory.dmp

                Filesize

                200KB

              • memory/4196-148-0x0000000000980000-0x000000000098A000-memory.dmp

                Filesize

                40KB