Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23-03-2023 22:54

General

  • Target

    73b610f3768aee63eb53cd287ff428f798afdedd678053e9a3d46d23fc6a853c.exe

  • Size

    1019KB

  • MD5

    b7afd068a7a541f0980f33fdf225f8a8

  • SHA1

    2b24a9b7fb091bf89c4c9edbf8d63530a4a60702

  • SHA256

    73b610f3768aee63eb53cd287ff428f798afdedd678053e9a3d46d23fc6a853c

  • SHA512

    615d2cbee539998b8685e2ba3200c14b7ed31e74c7ec39254cef709960cba24347fe7341f8c24c294744f26cf1bd75dfbbe9259d40604441122c02ad475c205d

  • SSDEEP

    24576:Cy2/fdAM4GfF199HhzblIFuiqGMCMJNod4Qr2P:p2/f6Mzfr99HhVYRqRCDdVS

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

trap

C2

193.233.20.30:4125

Attributes
  • auth_value

    b39a737e2e9eba88e48ab88d1061be9c

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73b610f3768aee63eb53cd287ff428f798afdedd678053e9a3d46d23fc6a853c.exe
    "C:\Users\Admin\AppData\Local\Temp\73b610f3768aee63eb53cd287ff428f798afdedd678053e9a3d46d23fc6a853c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4296
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino3386.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino3386.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino6668.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino6668.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1856
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0806.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0806.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4348
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus8383.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus8383.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4392
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9738.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9738.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4056
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dLf86s45.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dLf86s45.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4788
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en992282.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en992282.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2708
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge418886.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge418886.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4888
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4492
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4852
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4988
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:5032
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:5036
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:5012
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4956
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:5100
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:4936
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:5008

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Defense Evasion

              Modify Registry

              3
              T1112

              Disabling Security Tools

              2
              T1089

              Credential Access

              Credentials in Files

              2
              T1081

              Discovery

              Query Registry

              1
              T1012

              System Information Discovery

              1
              T1082

              Collection

              Data from Local System

              2
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge418886.exe
                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge418886.exe
                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino3386.exe
                Filesize

                837KB

                MD5

                6643038f2c5438695ac4f22e9340ece6

                SHA1

                c9f332306a938adf670ec04d161080a834bdd44c

                SHA256

                f44991154460afd664ddf3e2ec7992777a1d10cb0f37f56a4da201f2a12e3ad9

                SHA512

                fa452952a741a24a566ce4980f4f42c68e53e12feb5cfcd7b2cda97cd2e35f6d378467df11d75169c91f69e602315a08b5c8130656d89691e6bec2e0dfbac30f

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino3386.exe
                Filesize

                837KB

                MD5

                6643038f2c5438695ac4f22e9340ece6

                SHA1

                c9f332306a938adf670ec04d161080a834bdd44c

                SHA256

                f44991154460afd664ddf3e2ec7992777a1d10cb0f37f56a4da201f2a12e3ad9

                SHA512

                fa452952a741a24a566ce4980f4f42c68e53e12feb5cfcd7b2cda97cd2e35f6d378467df11d75169c91f69e602315a08b5c8130656d89691e6bec2e0dfbac30f

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en992282.exe
                Filesize

                175KB

                MD5

                581e8f97deca3769f1bc14882c9f26dc

                SHA1

                b69eb0b0c175888de0fa1ea7a0a045d69138d18e

                SHA256

                b277fd59e05cce33d218d0e9720f041eff2d7a5477b1e2843a6123aad307cd86

                SHA512

                f56835f4598bb5b121071373d760facd9173efdfadb741f99e3752c825f558b92922a3813606130ff0ed0f886d2d2858a0412d42284d3a941f0702d08eaec065

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en992282.exe
                Filesize

                175KB

                MD5

                581e8f97deca3769f1bc14882c9f26dc

                SHA1

                b69eb0b0c175888de0fa1ea7a0a045d69138d18e

                SHA256

                b277fd59e05cce33d218d0e9720f041eff2d7a5477b1e2843a6123aad307cd86

                SHA512

                f56835f4598bb5b121071373d760facd9173efdfadb741f99e3752c825f558b92922a3813606130ff0ed0f886d2d2858a0412d42284d3a941f0702d08eaec065

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino6668.exe
                Filesize

                694KB

                MD5

                509b0395e7a1651b17eb0cca3ca6ef29

                SHA1

                60b9d558e5e9b12f4211aef0dbd7995f9b97ff2e

                SHA256

                4d7cd8dc9ea98085f91a21af54526c6c6847fdbf555846f589748378ff7d35d8

                SHA512

                3e15c422e9767ccfd693b280076cd2f37325a656d98ecdd62aafc21081797148b73d5b39d9264a06bcaf83d0ee33ea894704b81213c06ce3936b0af97bea20df

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino6668.exe
                Filesize

                694KB

                MD5

                509b0395e7a1651b17eb0cca3ca6ef29

                SHA1

                60b9d558e5e9b12f4211aef0dbd7995f9b97ff2e

                SHA256

                4d7cd8dc9ea98085f91a21af54526c6c6847fdbf555846f589748378ff7d35d8

                SHA512

                3e15c422e9767ccfd693b280076cd2f37325a656d98ecdd62aafc21081797148b73d5b39d9264a06bcaf83d0ee33ea894704b81213c06ce3936b0af97bea20df

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dLf86s45.exe
                Filesize

                349KB

                MD5

                89e787c7fe01252e2f7ed7ce53674bb3

                SHA1

                99d55f7cf552fd3046d5f00160077efef65309a4

                SHA256

                ea511c6e34bd28a41aa4624b12a374f05df6f9ebe9e2a6cafa16c7ceec738353

                SHA512

                0559015db3c3123a6fbda489abe4863b500c029404bb174da43194198f824967701be9fabc26fc4d9aa0c6641852f98dab9ea42412811e2ae71fa7e00a38f185

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dLf86s45.exe
                Filesize

                349KB

                MD5

                89e787c7fe01252e2f7ed7ce53674bb3

                SHA1

                99d55f7cf552fd3046d5f00160077efef65309a4

                SHA256

                ea511c6e34bd28a41aa4624b12a374f05df6f9ebe9e2a6cafa16c7ceec738353

                SHA512

                0559015db3c3123a6fbda489abe4863b500c029404bb174da43194198f824967701be9fabc26fc4d9aa0c6641852f98dab9ea42412811e2ae71fa7e00a38f185

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0806.exe
                Filesize

                344KB

                MD5

                ca1f98beab4ddcc6d5322bf1ed027840

                SHA1

                abea732fcee103a9199414c7493ffb9671d0a623

                SHA256

                112c97a50f15233e08c3f96c4d1baf7b01a5f776deed91912ee556e7965daa67

                SHA512

                a17cc3221dd6d415149c7682aa66ffe164b24e9853596035179d35958dc6772ffeec0f96d3771488b7c309e9913b73843f449b0361d9181e6529199df02e082a

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0806.exe
                Filesize

                344KB

                MD5

                ca1f98beab4ddcc6d5322bf1ed027840

                SHA1

                abea732fcee103a9199414c7493ffb9671d0a623

                SHA256

                112c97a50f15233e08c3f96c4d1baf7b01a5f776deed91912ee556e7965daa67

                SHA512

                a17cc3221dd6d415149c7682aa66ffe164b24e9853596035179d35958dc6772ffeec0f96d3771488b7c309e9913b73843f449b0361d9181e6529199df02e082a

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus8383.exe
                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus8383.exe
                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9738.exe
                Filesize

                291KB

                MD5

                cd07381c546bd9faa37f3a68902a60f8

                SHA1

                cdd2c4ddfdaab9823aa348158a7aa942aa4a5714

                SHA256

                402a208a3f9e80582675ff9869f89849532a51935666ca3fe742e46e50ebce15

                SHA512

                3fab4c0cbb8f8d8112d03f48fb74922aadf3a273567a1582ff2fcfcc98e2025c753376fe7702c34ca3b8eb8235bf3269dd99400e6ac1158f3b688fd4f979a52c

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9738.exe
                Filesize

                291KB

                MD5

                cd07381c546bd9faa37f3a68902a60f8

                SHA1

                cdd2c4ddfdaab9823aa348158a7aa942aa4a5714

                SHA256

                402a208a3f9e80582675ff9869f89849532a51935666ca3fe742e46e50ebce15

                SHA512

                3fab4c0cbb8f8d8112d03f48fb74922aadf3a273567a1582ff2fcfcc98e2025c753376fe7702c34ca3b8eb8235bf3269dd99400e6ac1158f3b688fd4f979a52c

              • memory/2708-1128-0x0000000005360000-0x00000000053AB000-memory.dmp
                Filesize

                300KB

              • memory/2708-1129-0x0000000005510000-0x0000000005520000-memory.dmp
                Filesize

                64KB

              • memory/2708-1130-0x0000000005510000-0x0000000005520000-memory.dmp
                Filesize

                64KB

              • memory/2708-1127-0x0000000000920000-0x0000000000952000-memory.dmp
                Filesize

                200KB

              • memory/4056-163-0x0000000005150000-0x0000000005162000-memory.dmp
                Filesize

                72KB

              • memory/4056-186-0x0000000000BB0000-0x0000000000BC0000-memory.dmp
                Filesize

                64KB

              • memory/4056-167-0x0000000005150000-0x0000000005162000-memory.dmp
                Filesize

                72KB

              • memory/4056-169-0x0000000005150000-0x0000000005162000-memory.dmp
                Filesize

                72KB

              • memory/4056-171-0x0000000005150000-0x0000000005162000-memory.dmp
                Filesize

                72KB

              • memory/4056-173-0x0000000005150000-0x0000000005162000-memory.dmp
                Filesize

                72KB

              • memory/4056-175-0x0000000005150000-0x0000000005162000-memory.dmp
                Filesize

                72KB

              • memory/4056-177-0x0000000005150000-0x0000000005162000-memory.dmp
                Filesize

                72KB

              • memory/4056-179-0x0000000005150000-0x0000000005162000-memory.dmp
                Filesize

                72KB

              • memory/4056-181-0x0000000005150000-0x0000000005162000-memory.dmp
                Filesize

                72KB

              • memory/4056-183-0x0000000005150000-0x0000000005162000-memory.dmp
                Filesize

                72KB

              • memory/4056-184-0x0000000000BB0000-0x0000000000BC0000-memory.dmp
                Filesize

                64KB

              • memory/4056-185-0x0000000000400000-0x000000000070C000-memory.dmp
                Filesize

                3.0MB

              • memory/4056-165-0x0000000005150000-0x0000000005162000-memory.dmp
                Filesize

                72KB

              • memory/4056-188-0x0000000000400000-0x000000000070C000-memory.dmp
                Filesize

                3.0MB

              • memory/4056-150-0x00000000022E0000-0x00000000022FA000-memory.dmp
                Filesize

                104KB

              • memory/4056-161-0x0000000005150000-0x0000000005162000-memory.dmp
                Filesize

                72KB

              • memory/4056-159-0x0000000005150000-0x0000000005162000-memory.dmp
                Filesize

                72KB

              • memory/4056-157-0x0000000005150000-0x0000000005162000-memory.dmp
                Filesize

                72KB

              • memory/4056-156-0x0000000005150000-0x0000000005162000-memory.dmp
                Filesize

                72KB

              • memory/4056-155-0x0000000005150000-0x0000000005168000-memory.dmp
                Filesize

                96KB

              • memory/4056-154-0x0000000004C50000-0x000000000514E000-memory.dmp
                Filesize

                5.0MB

              • memory/4056-153-0x0000000000BB0000-0x0000000000BC0000-memory.dmp
                Filesize

                64KB

              • memory/4056-152-0x0000000000BB0000-0x0000000000BC0000-memory.dmp
                Filesize

                64KB

              • memory/4056-151-0x00000000001D0000-0x00000000001FD000-memory.dmp
                Filesize

                180KB

              • memory/4392-144-0x0000000000B00000-0x0000000000B0A000-memory.dmp
                Filesize

                40KB

              • memory/4788-198-0x0000000005200000-0x000000000523E000-memory.dmp
                Filesize

                248KB

              • memory/4788-212-0x0000000005200000-0x000000000523E000-memory.dmp
                Filesize

                248KB

              • memory/4788-214-0x0000000005200000-0x000000000523E000-memory.dmp
                Filesize

                248KB

              • memory/4788-216-0x0000000005200000-0x000000000523E000-memory.dmp
                Filesize

                248KB

              • memory/4788-218-0x0000000005200000-0x000000000523E000-memory.dmp
                Filesize

                248KB

              • memory/4788-220-0x0000000005200000-0x000000000523E000-memory.dmp
                Filesize

                248KB

              • memory/4788-222-0x0000000005200000-0x000000000523E000-memory.dmp
                Filesize

                248KB

              • memory/4788-224-0x0000000005200000-0x000000000523E000-memory.dmp
                Filesize

                248KB

              • memory/4788-226-0x0000000005200000-0x000000000523E000-memory.dmp
                Filesize

                248KB

              • memory/4788-228-0x0000000005200000-0x000000000523E000-memory.dmp
                Filesize

                248KB

              • memory/4788-429-0x0000000000720000-0x000000000076B000-memory.dmp
                Filesize

                300KB

              • memory/4788-431-0x0000000000840000-0x0000000000850000-memory.dmp
                Filesize

                64KB

              • memory/4788-435-0x0000000000840000-0x0000000000850000-memory.dmp
                Filesize

                64KB

              • memory/4788-433-0x0000000000840000-0x0000000000850000-memory.dmp
                Filesize

                64KB

              • memory/4788-1105-0x0000000005850000-0x0000000005E56000-memory.dmp
                Filesize

                6.0MB

              • memory/4788-1106-0x00000000052B0000-0x00000000053BA000-memory.dmp
                Filesize

                1.0MB

              • memory/4788-1107-0x00000000053F0000-0x0000000005402000-memory.dmp
                Filesize

                72KB

              • memory/4788-1108-0x0000000005410000-0x000000000544E000-memory.dmp
                Filesize

                248KB

              • memory/4788-1109-0x0000000000840000-0x0000000000850000-memory.dmp
                Filesize

                64KB

              • memory/4788-1110-0x0000000005560000-0x00000000055AB000-memory.dmp
                Filesize

                300KB

              • memory/4788-1111-0x00000000056F0000-0x0000000005756000-memory.dmp
                Filesize

                408KB

              • memory/4788-1112-0x00000000063F0000-0x0000000006482000-memory.dmp
                Filesize

                584KB

              • memory/4788-1114-0x0000000000840000-0x0000000000850000-memory.dmp
                Filesize

                64KB

              • memory/4788-1115-0x0000000000840000-0x0000000000850000-memory.dmp
                Filesize

                64KB

              • memory/4788-1116-0x0000000000840000-0x0000000000850000-memory.dmp
                Filesize

                64KB

              • memory/4788-1117-0x0000000006490000-0x0000000006506000-memory.dmp
                Filesize

                472KB

              • memory/4788-1118-0x0000000006510000-0x0000000006560000-memory.dmp
                Filesize

                320KB

              • memory/4788-1119-0x0000000000840000-0x0000000000850000-memory.dmp
                Filesize

                64KB

              • memory/4788-210-0x0000000005200000-0x000000000523E000-memory.dmp
                Filesize

                248KB

              • memory/4788-208-0x0000000005200000-0x000000000523E000-memory.dmp
                Filesize

                248KB

              • memory/4788-206-0x0000000005200000-0x000000000523E000-memory.dmp
                Filesize

                248KB

              • memory/4788-204-0x0000000005200000-0x000000000523E000-memory.dmp
                Filesize

                248KB

              • memory/4788-202-0x0000000005200000-0x000000000523E000-memory.dmp
                Filesize

                248KB

              • memory/4788-200-0x0000000005200000-0x000000000523E000-memory.dmp
                Filesize

                248KB

              • memory/4788-196-0x0000000005200000-0x000000000523E000-memory.dmp
                Filesize

                248KB

              • memory/4788-195-0x0000000005200000-0x000000000523E000-memory.dmp
                Filesize

                248KB

              • memory/4788-194-0x0000000005200000-0x0000000005244000-memory.dmp
                Filesize

                272KB

              • memory/4788-193-0x0000000002510000-0x0000000002556000-memory.dmp
                Filesize

                280KB

              • memory/4788-1120-0x0000000009AF0000-0x0000000009CB2000-memory.dmp
                Filesize

                1.8MB

              • memory/4788-1121-0x0000000009CC0000-0x000000000A1EC000-memory.dmp
                Filesize

                5.2MB