Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/03/2023, 08:56

General

  • Target

    d2de7bd59fa34b26b54ae482369f55f305c4dedcec53618b8bd9d5b1536ba142.exe

  • Size

    1005KB

  • MD5

    07690cb98daa0629812e8b9eaa7a9e0e

  • SHA1

    6f1162141649955bcd96a4867115167aded44835

  • SHA256

    d2de7bd59fa34b26b54ae482369f55f305c4dedcec53618b8bd9d5b1536ba142

  • SHA512

    ba1fb699458b23668cb30add0565d4b4da03952731015b8c64689b6927a832af9e710ca0ba1784393e574d8980ad551b2d6db44b738fe74b55f94f6136ece781

  • SSDEEP

    24576:KyhY4aegxHDnYuU5XeuAwV//5uxdEaBNxxL:RUxHTYtNAuIv

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

maxi

C2

193.233.20.30:4125

Attributes
  • auth_value

    6e90da232d4c2e35c1a36c250f5f8904

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2de7bd59fa34b26b54ae482369f55f305c4dedcec53618b8bd9d5b1536ba142.exe
    "C:\Users\Admin\AppData\Local\Temp\d2de7bd59fa34b26b54ae482369f55f305c4dedcec53618b8bd9d5b1536ba142.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3244
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino4223.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino4223.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:396
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino3508.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino3508.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3320
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino1812.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino1812.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4180
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus2175.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus2175.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1440
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9073.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9073.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2948
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dys54s64.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dys54s64.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3712
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en120509.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en120509.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4780
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge349896.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge349896.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4484
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3228
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4944
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4912
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:5004
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:4980
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:4984
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4120
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:5024
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:5056
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:4316
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:5112

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge349896.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge349896.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino4223.exe

                Filesize

                823KB

                MD5

                b7249a85c188c90b647fcc57ea54a6d6

                SHA1

                a4044c133adde915b7daa8cd8e40c3d3090710b2

                SHA256

                4fbcf08755c54ff73eed29cd8d3afa5bdec19b7389f012e85db1ec110f717047

                SHA512

                79bea647e7a40a04b64a7b5484bcb4896c0bc94f154cf2c1d5c30030032dcfcd8028b20aee75fce456a9d914ef1a6485aadd554cbb37f0ddb07270a8513f6f4b

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino4223.exe

                Filesize

                823KB

                MD5

                b7249a85c188c90b647fcc57ea54a6d6

                SHA1

                a4044c133adde915b7daa8cd8e40c3d3090710b2

                SHA256

                4fbcf08755c54ff73eed29cd8d3afa5bdec19b7389f012e85db1ec110f717047

                SHA512

                79bea647e7a40a04b64a7b5484bcb4896c0bc94f154cf2c1d5c30030032dcfcd8028b20aee75fce456a9d914ef1a6485aadd554cbb37f0ddb07270a8513f6f4b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en120509.exe

                Filesize

                175KB

                MD5

                0bad76cd3276f38206bf62a5f6061853

                SHA1

                e7f11197db98b02eff7904e04e7a3f6af5bfd898

                SHA256

                5ee4a25885ee8a675008057b7e76ee78f1e6750bc65f673ba260e95525588504

                SHA512

                41d3b0443e4aed4e5e6b4ed285edd1c675f21dfd5db6ccf66be11150bb60a5fbb68f79f835516bad143fbe12d4dfef46a4c80852d9332afb3db50316d83f4f59

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en120509.exe

                Filesize

                175KB

                MD5

                0bad76cd3276f38206bf62a5f6061853

                SHA1

                e7f11197db98b02eff7904e04e7a3f6af5bfd898

                SHA256

                5ee4a25885ee8a675008057b7e76ee78f1e6750bc65f673ba260e95525588504

                SHA512

                41d3b0443e4aed4e5e6b4ed285edd1c675f21dfd5db6ccf66be11150bb60a5fbb68f79f835516bad143fbe12d4dfef46a4c80852d9332afb3db50316d83f4f59

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino3508.exe

                Filesize

                681KB

                MD5

                8a45f1c46dd4bfbef2f02aeb48489d61

                SHA1

                924cc5dc1107d5d7eec440dff2372017da495db1

                SHA256

                e8ce9514ed7c6399034ed93892f36e745a21c4ccb5b62e5c92edf35f73e06f02

                SHA512

                9be6b876306e5b7d22594260d6385ba39fef72c315c3d826a0f9b36c08a71bbff2ae0ea6ea7f58c7017434ab80571e0f032b5a46e583b69e66f504a311a33371

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino3508.exe

                Filesize

                681KB

                MD5

                8a45f1c46dd4bfbef2f02aeb48489d61

                SHA1

                924cc5dc1107d5d7eec440dff2372017da495db1

                SHA256

                e8ce9514ed7c6399034ed93892f36e745a21c4ccb5b62e5c92edf35f73e06f02

                SHA512

                9be6b876306e5b7d22594260d6385ba39fef72c315c3d826a0f9b36c08a71bbff2ae0ea6ea7f58c7017434ab80571e0f032b5a46e583b69e66f504a311a33371

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dys54s64.exe

                Filesize

                470KB

                MD5

                65e27bb4b634907aea44cbb24306eef2

                SHA1

                432c71b06ef46ffdf9a3457981a13184350c1765

                SHA256

                8c151321dd8e0c61f478960909704601410dd9c835040fae330e6a82531c4090

                SHA512

                35a9b3ba085855da6c20fb0168f5a445a78264e6705eb30814c052e84483e44b8bd11c0e5a8d25ed50b017d7d5c661b62db0e0c2dd8621aafe36a1a394208f12

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dys54s64.exe

                Filesize

                470KB

                MD5

                65e27bb4b634907aea44cbb24306eef2

                SHA1

                432c71b06ef46ffdf9a3457981a13184350c1765

                SHA256

                8c151321dd8e0c61f478960909704601410dd9c835040fae330e6a82531c4090

                SHA512

                35a9b3ba085855da6c20fb0168f5a445a78264e6705eb30814c052e84483e44b8bd11c0e5a8d25ed50b017d7d5c661b62db0e0c2dd8621aafe36a1a394208f12

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino1812.exe

                Filesize

                338KB

                MD5

                8c09450b763eaf9fd1c0ac1c7a065f8e

                SHA1

                1e8beec0c21cba0e41965248fc3cff1ca31ec201

                SHA256

                c84d31df19bf657b458139567fbefb82b41a06558fddf1c73d7db6ae6bbcd939

                SHA512

                9744033511beab3e38447bc05317e0d95881ed2d080c10353b84df55d90d9361cb24fdd113b2842276e346456fbeb50c91f378093035ede64d65c4898071e343

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino1812.exe

                Filesize

                338KB

                MD5

                8c09450b763eaf9fd1c0ac1c7a065f8e

                SHA1

                1e8beec0c21cba0e41965248fc3cff1ca31ec201

                SHA256

                c84d31df19bf657b458139567fbefb82b41a06558fddf1c73d7db6ae6bbcd939

                SHA512

                9744033511beab3e38447bc05317e0d95881ed2d080c10353b84df55d90d9361cb24fdd113b2842276e346456fbeb50c91f378093035ede64d65c4898071e343

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus2175.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus2175.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9073.exe

                Filesize

                411KB

                MD5

                5e548dcd0ca4e51ae231be9adabeea3c

                SHA1

                77cf3b6375960831b92d945d2141440390e7e7f0

                SHA256

                d07395ba70d34024efa2741a38d2a4b693e87a1eee6bcedf377fdbe30eaf47d2

                SHA512

                ca72a1d18bef98ffa37438f7b0aaa12ad3b288f59852f13a1c81abd111ad09707f65b69d2a8c14f64f34e42e8410b1cf0faf79c71647903db8a67ed983dd5645

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9073.exe

                Filesize

                411KB

                MD5

                5e548dcd0ca4e51ae231be9adabeea3c

                SHA1

                77cf3b6375960831b92d945d2141440390e7e7f0

                SHA256

                d07395ba70d34024efa2741a38d2a4b693e87a1eee6bcedf377fdbe30eaf47d2

                SHA512

                ca72a1d18bef98ffa37438f7b0aaa12ad3b288f59852f13a1c81abd111ad09707f65b69d2a8c14f64f34e42e8410b1cf0faf79c71647903db8a67ed983dd5645

              • memory/1440-149-0x00000000001A0000-0x00000000001AA000-memory.dmp

                Filesize

                40KB

              • memory/2948-162-0x00000000025C0000-0x00000000025D2000-memory.dmp

                Filesize

                72KB

              • memory/2948-187-0x00000000025C0000-0x00000000025D2000-memory.dmp

                Filesize

                72KB

              • memory/2948-165-0x00000000025C0000-0x00000000025D2000-memory.dmp

                Filesize

                72KB

              • memory/2948-167-0x00000000025C0000-0x00000000025D2000-memory.dmp

                Filesize

                72KB

              • memory/2948-169-0x00000000025C0000-0x00000000025D2000-memory.dmp

                Filesize

                72KB

              • memory/2948-171-0x00000000025C0000-0x00000000025D2000-memory.dmp

                Filesize

                72KB

              • memory/2948-173-0x00000000025C0000-0x00000000025D2000-memory.dmp

                Filesize

                72KB

              • memory/2948-175-0x00000000025C0000-0x00000000025D2000-memory.dmp

                Filesize

                72KB

              • memory/2948-177-0x00000000025C0000-0x00000000025D2000-memory.dmp

                Filesize

                72KB

              • memory/2948-179-0x00000000025C0000-0x00000000025D2000-memory.dmp

                Filesize

                72KB

              • memory/2948-181-0x00000000025C0000-0x00000000025D2000-memory.dmp

                Filesize

                72KB

              • memory/2948-183-0x00000000025C0000-0x00000000025D2000-memory.dmp

                Filesize

                72KB

              • memory/2948-185-0x00000000025C0000-0x00000000025D2000-memory.dmp

                Filesize

                72KB

              • memory/2948-163-0x00000000025C0000-0x00000000025D2000-memory.dmp

                Filesize

                72KB

              • memory/2948-189-0x00000000025C0000-0x00000000025D2000-memory.dmp

                Filesize

                72KB

              • memory/2948-190-0x0000000000400000-0x00000000004E8000-memory.dmp

                Filesize

                928KB

              • memory/2948-191-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

                Filesize

                64KB

              • memory/2948-193-0x0000000000400000-0x00000000004E8000-memory.dmp

                Filesize

                928KB

              • memory/2948-161-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

                Filesize

                64KB

              • memory/2948-160-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

                Filesize

                64KB

              • memory/2948-159-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

                Filesize

                64KB

              • memory/2948-158-0x00000000025C0000-0x00000000025D8000-memory.dmp

                Filesize

                96KB

              • memory/2948-157-0x0000000004BD0000-0x00000000050CE000-memory.dmp

                Filesize

                5.0MB

              • memory/2948-156-0x0000000002050000-0x000000000206A000-memory.dmp

                Filesize

                104KB

              • memory/2948-155-0x00000000001D0000-0x00000000001FD000-memory.dmp

                Filesize

                180KB

              • memory/3712-200-0x0000000004AA0000-0x0000000004AE4000-memory.dmp

                Filesize

                272KB

              • memory/3712-1114-0x00000000051F0000-0x000000000522E000-memory.dmp

                Filesize

                248KB

              • memory/3712-209-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

                Filesize

                248KB

              • memory/3712-211-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

                Filesize

                248KB

              • memory/3712-213-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

                Filesize

                248KB

              • memory/3712-215-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

                Filesize

                248KB

              • memory/3712-217-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

                Filesize

                248KB

              • memory/3712-219-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

                Filesize

                248KB

              • memory/3712-221-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

                Filesize

                248KB

              • memory/3712-223-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

                Filesize

                248KB

              • memory/3712-225-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

                Filesize

                248KB

              • memory/3712-227-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

                Filesize

                248KB

              • memory/3712-229-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

                Filesize

                248KB

              • memory/3712-231-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

                Filesize

                248KB

              • memory/3712-235-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

                Filesize

                248KB

              • memory/3712-233-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

                Filesize

                248KB

              • memory/3712-237-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

                Filesize

                248KB

              • memory/3712-1110-0x0000000005620000-0x0000000005C26000-memory.dmp

                Filesize

                6.0MB

              • memory/3712-1111-0x0000000005090000-0x000000000519A000-memory.dmp

                Filesize

                1.0MB

              • memory/3712-1112-0x00000000051D0000-0x00000000051E2000-memory.dmp

                Filesize

                72KB

              • memory/3712-1113-0x0000000004AF0000-0x0000000004B00000-memory.dmp

                Filesize

                64KB

              • memory/3712-207-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

                Filesize

                248KB

              • memory/3712-1115-0x0000000005340000-0x000000000538B000-memory.dmp

                Filesize

                300KB

              • memory/3712-1117-0x0000000004AF0000-0x0000000004B00000-memory.dmp

                Filesize

                64KB

              • memory/3712-1118-0x0000000004AF0000-0x0000000004B00000-memory.dmp

                Filesize

                64KB

              • memory/3712-1119-0x0000000004AF0000-0x0000000004B00000-memory.dmp

                Filesize

                64KB

              • memory/3712-1120-0x00000000054D0000-0x0000000005536000-memory.dmp

                Filesize

                408KB

              • memory/3712-1121-0x00000000061D0000-0x0000000006262000-memory.dmp

                Filesize

                584KB

              • memory/3712-1122-0x0000000006380000-0x00000000063F6000-memory.dmp

                Filesize

                472KB

              • memory/3712-1123-0x0000000006410000-0x0000000006460000-memory.dmp

                Filesize

                320KB

              • memory/3712-1124-0x00000000065C0000-0x0000000006782000-memory.dmp

                Filesize

                1.8MB

              • memory/3712-1125-0x0000000006790000-0x0000000006CBC000-memory.dmp

                Filesize

                5.2MB

              • memory/3712-1126-0x0000000004AF0000-0x0000000004B00000-memory.dmp

                Filesize

                64KB

              • memory/3712-198-0x0000000004A20000-0x0000000004A66000-memory.dmp

                Filesize

                280KB

              • memory/3712-199-0x00000000005D0000-0x000000000061B000-memory.dmp

                Filesize

                300KB

              • memory/3712-202-0x0000000004AF0000-0x0000000004B00000-memory.dmp

                Filesize

                64KB

              • memory/3712-205-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

                Filesize

                248KB

              • memory/3712-204-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

                Filesize

                248KB

              • memory/3712-203-0x0000000004AF0000-0x0000000004B00000-memory.dmp

                Filesize

                64KB

              • memory/3712-201-0x0000000004AF0000-0x0000000004B00000-memory.dmp

                Filesize

                64KB

              • memory/4780-1134-0x00000000053F0000-0x0000000005400000-memory.dmp

                Filesize

                64KB

              • memory/4780-1133-0x0000000005590000-0x00000000055DB000-memory.dmp

                Filesize

                300KB

              • memory/4780-1132-0x0000000000B50000-0x0000000000B82000-memory.dmp

                Filesize

                200KB