Analysis

  • max time kernel
    129s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22-03-2023 18:54

General

  • Target

    4e19845e12e626fd826753358c178fd2f68d7b8cfde5eeabf4a9496489d9c08d.exe

  • Size

    1011KB

  • MD5

    25f1d9dacc2e7e9bae5a12b8a61e257b

  • SHA1

    fc45f798c8325c0cd4178eac2f7f467cbe7010d8

  • SHA256

    4e19845e12e626fd826753358c178fd2f68d7b8cfde5eeabf4a9496489d9c08d

  • SHA512

    7ed034787c40150debbfc5ae49f30f406571f4e0421a57564b80cad30a08b8936edc6e2169442955c340e8564b4eca0f1983e883c87017740cf4f8a8a855ad68

  • SSDEEP

    24576:YyiTPvbTxVW27kxOTv2jQGgshANKZ7NHuRIZ3hTq7:ferPBZehbBuCZ

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

maxi

C2

193.233.20.30:4125

Attributes
  • auth_value

    6e90da232d4c2e35c1a36c250f5f8904

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e19845e12e626fd826753358c178fd2f68d7b8cfde5eeabf4a9496489d9c08d.exe
    "C:\Users\Admin\AppData\Local\Temp\4e19845e12e626fd826753358c178fd2f68d7b8cfde5eeabf4a9496489d9c08d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino8782.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino8782.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2372
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino5586.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino5586.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2540
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino4639.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino4639.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2828
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus6822.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus6822.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4868
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1849.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1849.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4260
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dsn81s28.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dsn81s28.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3888
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en757795.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en757795.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2632
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge927442.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge927442.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3140
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:704
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4388
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4320
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3324
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:3320
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:3144
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4956
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:4964
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:4936
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:4876
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:4892

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge927442.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge927442.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino8782.exe

                Filesize

                829KB

                MD5

                8423127e8becbda1cccb710c48119d7b

                SHA1

                13399a4c2036c03cd1325130a415f5d1bab9c615

                SHA256

                b3401394073fb26ffba7147ce07aa02ed91479fb1e19c77e0b15df99b62069e7

                SHA512

                b1981b7a2b3213245b07e0da285355ed4d96197a326b171282b147f859cad48a737519e98102dd1561754a09962529a18c3c6c107ad6d0cbe74ecbe465374c1c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino8782.exe

                Filesize

                829KB

                MD5

                8423127e8becbda1cccb710c48119d7b

                SHA1

                13399a4c2036c03cd1325130a415f5d1bab9c615

                SHA256

                b3401394073fb26ffba7147ce07aa02ed91479fb1e19c77e0b15df99b62069e7

                SHA512

                b1981b7a2b3213245b07e0da285355ed4d96197a326b171282b147f859cad48a737519e98102dd1561754a09962529a18c3c6c107ad6d0cbe74ecbe465374c1c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en757795.exe

                Filesize

                175KB

                MD5

                0bad76cd3276f38206bf62a5f6061853

                SHA1

                e7f11197db98b02eff7904e04e7a3f6af5bfd898

                SHA256

                5ee4a25885ee8a675008057b7e76ee78f1e6750bc65f673ba260e95525588504

                SHA512

                41d3b0443e4aed4e5e6b4ed285edd1c675f21dfd5db6ccf66be11150bb60a5fbb68f79f835516bad143fbe12d4dfef46a4c80852d9332afb3db50316d83f4f59

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en757795.exe

                Filesize

                175KB

                MD5

                0bad76cd3276f38206bf62a5f6061853

                SHA1

                e7f11197db98b02eff7904e04e7a3f6af5bfd898

                SHA256

                5ee4a25885ee8a675008057b7e76ee78f1e6750bc65f673ba260e95525588504

                SHA512

                41d3b0443e4aed4e5e6b4ed285edd1c675f21dfd5db6ccf66be11150bb60a5fbb68f79f835516bad143fbe12d4dfef46a4c80852d9332afb3db50316d83f4f59

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino5586.exe

                Filesize

                687KB

                MD5

                50db6cac0504e5d0c8e31defd0f02a8d

                SHA1

                8a46c2a94b69d7609396c04d012c8ea6dc2616cd

                SHA256

                2230e01c5f536fa3814c5737c288cfe8b87e2e5dfa9c602c9453fc75e42f467c

                SHA512

                a5fa971dfd469b7e253664ed3d7e6ee3aa95b3a7934a79483143d02ee7359d95cc868569b9aaa961e2c8b820850def2d7cfe76df6ff0ad4867d5129183cc88bd

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino5586.exe

                Filesize

                687KB

                MD5

                50db6cac0504e5d0c8e31defd0f02a8d

                SHA1

                8a46c2a94b69d7609396c04d012c8ea6dc2616cd

                SHA256

                2230e01c5f536fa3814c5737c288cfe8b87e2e5dfa9c602c9453fc75e42f467c

                SHA512

                a5fa971dfd469b7e253664ed3d7e6ee3aa95b3a7934a79483143d02ee7359d95cc868569b9aaa961e2c8b820850def2d7cfe76df6ff0ad4867d5129183cc88bd

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dsn81s28.exe

                Filesize

                473KB

                MD5

                e4be626461350f11a40165bf2d5930f3

                SHA1

                eb06d5ed01efa085c9f7a22f6972ad0a5926c872

                SHA256

                0f4b9615864bd32c1693fb8f8363c4f67262929c457b81152246a5f5c5ca4368

                SHA512

                d12fb0d82083fee6437dd6b17d18205d2f0cda40cb7ab52a613a747ae8bdf552d42fc95cf4d313d9e95caaf1944d5e03fb429636b862bbe8da5cf7a81a8098bb

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dsn81s28.exe

                Filesize

                473KB

                MD5

                e4be626461350f11a40165bf2d5930f3

                SHA1

                eb06d5ed01efa085c9f7a22f6972ad0a5926c872

                SHA256

                0f4b9615864bd32c1693fb8f8363c4f67262929c457b81152246a5f5c5ca4368

                SHA512

                d12fb0d82083fee6437dd6b17d18205d2f0cda40cb7ab52a613a747ae8bdf552d42fc95cf4d313d9e95caaf1944d5e03fb429636b862bbe8da5cf7a81a8098bb

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino4639.exe

                Filesize

                340KB

                MD5

                d9febabfdecb3c10d5ef6aa2759f3d25

                SHA1

                5d9dd3cca36dcbebbf6ea4f77b69770578a655ae

                SHA256

                011b80a1e4567a462b3b06de1e598f5d6fb4b8cd4d38cc49dd49ccfbe96d9558

                SHA512

                a6f35a8647e85e20317d9488cac41ec38e9d16c4be6497307102a29a4e207f8290f49c637e68e208a8efb63d53fc28312b5be28583d80aa90fed5a8f3fac1dd5

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino4639.exe

                Filesize

                340KB

                MD5

                d9febabfdecb3c10d5ef6aa2759f3d25

                SHA1

                5d9dd3cca36dcbebbf6ea4f77b69770578a655ae

                SHA256

                011b80a1e4567a462b3b06de1e598f5d6fb4b8cd4d38cc49dd49ccfbe96d9558

                SHA512

                a6f35a8647e85e20317d9488cac41ec38e9d16c4be6497307102a29a4e207f8290f49c637e68e208a8efb63d53fc28312b5be28583d80aa90fed5a8f3fac1dd5

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus6822.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus6822.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1849.exe

                Filesize

                415KB

                MD5

                30ee877047c429f40c931dc458c12fbf

                SHA1

                7e60ccbd5e98a60197554436abfa0c21e0df8892

                SHA256

                7fb2b6bb69fe6bbd194c7d3a9a42b7622cd64b5e24045729a6f7d3fb8f9e6237

                SHA512

                13c29aa4f854d68f60b0d5fc7468f49c21a299c380def53e2d1c711283d4316dad8f1e73ef7df007f54ee35af868f18b89841e1274c63a5ac17a10a61dab05d2

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1849.exe

                Filesize

                415KB

                MD5

                30ee877047c429f40c931dc458c12fbf

                SHA1

                7e60ccbd5e98a60197554436abfa0c21e0df8892

                SHA256

                7fb2b6bb69fe6bbd194c7d3a9a42b7622cd64b5e24045729a6f7d3fb8f9e6237

                SHA512

                13c29aa4f854d68f60b0d5fc7468f49c21a299c380def53e2d1c711283d4316dad8f1e73ef7df007f54ee35af868f18b89841e1274c63a5ac17a10a61dab05d2

              • memory/2632-1131-0x0000000004D20000-0x0000000004D6B000-memory.dmp

                Filesize

                300KB

              • memory/2632-1130-0x00000000002E0000-0x0000000000312000-memory.dmp

                Filesize

                200KB

              • memory/2632-1132-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

                Filesize

                64KB

              • memory/3888-1114-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB

              • memory/3888-232-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/3888-1124-0x0000000006E50000-0x0000000006EA0000-memory.dmp

                Filesize

                320KB

              • memory/3888-1123-0x0000000006DC0000-0x0000000006E36000-memory.dmp

                Filesize

                472KB

              • memory/3888-1122-0x0000000006570000-0x0000000006A9C000-memory.dmp

                Filesize

                5.2MB

              • memory/3888-1121-0x0000000006380000-0x0000000006542000-memory.dmp

                Filesize

                1.8MB

              • memory/3888-1120-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB

              • memory/3888-1119-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB

              • memory/3888-1118-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB

              • memory/3888-1117-0x0000000005B80000-0x0000000005BE6000-memory.dmp

                Filesize

                408KB

              • memory/3888-1116-0x0000000005AE0000-0x0000000005B72000-memory.dmp

                Filesize

                584KB

              • memory/3888-1113-0x0000000005950000-0x000000000599B000-memory.dmp

                Filesize

                300KB

              • memory/3888-1112-0x0000000005800000-0x000000000583E000-memory.dmp

                Filesize

                248KB

              • memory/3888-197-0x0000000004A10000-0x0000000004A56000-memory.dmp

                Filesize

                280KB

              • memory/3888-198-0x0000000004FC0000-0x0000000005004000-memory.dmp

                Filesize

                272KB

              • memory/3888-199-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/3888-200-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/3888-202-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/3888-204-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/3888-206-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/3888-208-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/3888-210-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/3888-212-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/3888-214-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/3888-216-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/3888-218-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/3888-220-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/3888-222-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/3888-224-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/3888-226-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/3888-228-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/3888-1111-0x00000000057E0000-0x00000000057F2000-memory.dmp

                Filesize

                72KB

              • memory/3888-230-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/3888-368-0x0000000000530000-0x000000000057B000-memory.dmp

                Filesize

                300KB

              • memory/3888-369-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB

              • memory/3888-371-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB

              • memory/3888-373-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB

              • memory/3888-1109-0x0000000005010000-0x0000000005616000-memory.dmp

                Filesize

                6.0MB

              • memory/3888-1110-0x00000000056A0000-0x00000000057AA000-memory.dmp

                Filesize

                1.0MB

              • memory/4260-177-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4260-192-0x0000000000400000-0x00000000004E8000-memory.dmp

                Filesize

                928KB

              • memory/4260-181-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4260-173-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4260-171-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4260-190-0x0000000000400000-0x00000000004E8000-memory.dmp

                Filesize

                928KB

              • memory/4260-186-0x00000000004F0000-0x000000000051D000-memory.dmp

                Filesize

                180KB

              • memory/4260-167-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4260-187-0x0000000002060000-0x0000000002070000-memory.dmp

                Filesize

                64KB

              • memory/4260-188-0x0000000002060000-0x0000000002070000-memory.dmp

                Filesize

                64KB

              • memory/4260-183-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4260-185-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4260-179-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4260-175-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4260-189-0x0000000002060000-0x0000000002070000-memory.dmp

                Filesize

                64KB

              • memory/4260-169-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4260-165-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4260-163-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4260-161-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4260-159-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4260-158-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4260-157-0x0000000002590000-0x00000000025A8000-memory.dmp

                Filesize

                96KB

              • memory/4260-156-0x0000000004AC0000-0x0000000004FBE000-memory.dmp

                Filesize

                5.0MB

              • memory/4260-155-0x0000000002230000-0x000000000224A000-memory.dmp

                Filesize

                104KB

              • memory/4868-149-0x0000000000430000-0x000000000043A000-memory.dmp

                Filesize

                40KB