Analysis

  • max time kernel
    110s
  • max time network
    128s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23/03/2023, 05:30

General

  • Target

    aec67f326b4c6ccd2add37f978ddd0310cc4791e8ac3a4a9e092a5e12eadc49c.exe

  • Size

    1007KB

  • MD5

    8105e6f0453b5628af0c0335c9a4eba7

  • SHA1

    6e8e62630c40be74337ca25c36a9b0404795544f

  • SHA256

    aec67f326b4c6ccd2add37f978ddd0310cc4791e8ac3a4a9e092a5e12eadc49c

  • SHA512

    9f888dd118d6c10e76d885b0b4a392b2f5f93098439b9af18348cc10c6c08e8491e4534fbfabbbd23b926117f5c9e2d9e762544d69c52bc58c5cf84f1ae6dee8

  • SSDEEP

    24576:hyzy5Xv6wHpXAg4L2Y5lC+OZC6p2N/vfSVeWAB:UzOXvBHpXK6Y5l6ZZM/vf6ef

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

trap

C2

193.233.20.30:4125

Attributes
  • auth_value

    b39a737e2e9eba88e48ab88d1061be9c

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aec67f326b4c6ccd2add37f978ddd0310cc4791e8ac3a4a9e092a5e12eadc49c.exe
    "C:\Users\Admin\AppData\Local\Temp\aec67f326b4c6ccd2add37f978ddd0310cc4791e8ac3a4a9e092a5e12eadc49c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino9263.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino9263.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1560
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8638.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8638.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1780
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino7954.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino7954.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2068
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus9947.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus9947.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4424
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor3925.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor3925.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1572
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dEZ39s16.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dEZ39s16.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4300
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en674044.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en674044.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3696
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge912317.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge912317.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4516
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4472
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:1228
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:5064
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:2736
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:5000
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:5040
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4940
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:3136
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:3324
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:3212

              Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                      Filesize

                      226KB

                      MD5

                      8627ebe3777cc777ed2a14b907162224

                      SHA1

                      06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                      SHA256

                      319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                      SHA512

                      9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                    • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                      Filesize

                      226KB

                      MD5

                      8627ebe3777cc777ed2a14b907162224

                      SHA1

                      06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                      SHA256

                      319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                      SHA512

                      9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                    • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                      Filesize

                      226KB

                      MD5

                      8627ebe3777cc777ed2a14b907162224

                      SHA1

                      06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                      SHA256

                      319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                      SHA512

                      9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                    • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                      Filesize

                      226KB

                      MD5

                      8627ebe3777cc777ed2a14b907162224

                      SHA1

                      06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                      SHA256

                      319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                      SHA512

                      9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge912317.exe

                      Filesize

                      226KB

                      MD5

                      8627ebe3777cc777ed2a14b907162224

                      SHA1

                      06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                      SHA256

                      319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                      SHA512

                      9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge912317.exe

                      Filesize

                      226KB

                      MD5

                      8627ebe3777cc777ed2a14b907162224

                      SHA1

                      06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                      SHA256

                      319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                      SHA512

                      9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino9263.exe

                      Filesize

                      829KB

                      MD5

                      5103e7e410dea2be8132b96eb15098a8

                      SHA1

                      bb6dfbf4c32d5e02c6fb6cf4f5aaab809b026cd5

                      SHA256

                      567689b22dc712327fb849be339ba1e81b88fd2cd7b0113675abc3040c3bbd08

                      SHA512

                      989e7e915655cca9b0807dafbe0dee31c88c26b16e3371a2e6838ffabcb98db13427d067014bdb909b95e0886861b1a24ca3b50f4f350b6d45740cc352740576

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino9263.exe

                      Filesize

                      829KB

                      MD5

                      5103e7e410dea2be8132b96eb15098a8

                      SHA1

                      bb6dfbf4c32d5e02c6fb6cf4f5aaab809b026cd5

                      SHA256

                      567689b22dc712327fb849be339ba1e81b88fd2cd7b0113675abc3040c3bbd08

                      SHA512

                      989e7e915655cca9b0807dafbe0dee31c88c26b16e3371a2e6838ffabcb98db13427d067014bdb909b95e0886861b1a24ca3b50f4f350b6d45740cc352740576

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en674044.exe

                      Filesize

                      175KB

                      MD5

                      581e8f97deca3769f1bc14882c9f26dc

                      SHA1

                      b69eb0b0c175888de0fa1ea7a0a045d69138d18e

                      SHA256

                      b277fd59e05cce33d218d0e9720f041eff2d7a5477b1e2843a6123aad307cd86

                      SHA512

                      f56835f4598bb5b121071373d760facd9173efdfadb741f99e3752c825f558b92922a3813606130ff0ed0f886d2d2858a0412d42284d3a941f0702d08eaec065

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en674044.exe

                      Filesize

                      175KB

                      MD5

                      581e8f97deca3769f1bc14882c9f26dc

                      SHA1

                      b69eb0b0c175888de0fa1ea7a0a045d69138d18e

                      SHA256

                      b277fd59e05cce33d218d0e9720f041eff2d7a5477b1e2843a6123aad307cd86

                      SHA512

                      f56835f4598bb5b121071373d760facd9173efdfadb741f99e3752c825f558b92922a3813606130ff0ed0f886d2d2858a0412d42284d3a941f0702d08eaec065

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8638.exe

                      Filesize

                      687KB

                      MD5

                      ac1fac953370efeb172f2de2bde0b3fb

                      SHA1

                      47a4e1c12cb10ee0bd4886879d37af56bfadcb18

                      SHA256

                      8fe1aa113826abc51192b9029185da91a0ddd2a785798c36a97828808b69fbe1

                      SHA512

                      584746cab7d04a27b67fd96da5a877eb82cf00a5e2df4ebe7b9dc2fc813c6eb944237d0aaf897a8e8e4373c8f4659f7ca96f0027571ed3d19c8d4be4f801d5a0

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8638.exe

                      Filesize

                      687KB

                      MD5

                      ac1fac953370efeb172f2de2bde0b3fb

                      SHA1

                      47a4e1c12cb10ee0bd4886879d37af56bfadcb18

                      SHA256

                      8fe1aa113826abc51192b9029185da91a0ddd2a785798c36a97828808b69fbe1

                      SHA512

                      584746cab7d04a27b67fd96da5a877eb82cf00a5e2df4ebe7b9dc2fc813c6eb944237d0aaf897a8e8e4373c8f4659f7ca96f0027571ed3d19c8d4be4f801d5a0

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dEZ39s16.exe

                      Filesize

                      357KB

                      MD5

                      d2a082336165829a9b8c1b3c65915457

                      SHA1

                      db532831f0ceef9cafc5ee64772e7f1af84de027

                      SHA256

                      8da3159aea9d6a95ca1e7179d32be114aaedbc975cff42c8a183d8cf9fc05bad

                      SHA512

                      bf98dcdf9df91c9c3549cc3ba97d6297eb0e45c7b70aa5b99dd4bf6dc980befcb223846ac5ce2d6c9aaf3f65898755c5c8e8b6de4a5ee090d27037cf90efd5bd

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dEZ39s16.exe

                      Filesize

                      357KB

                      MD5

                      d2a082336165829a9b8c1b3c65915457

                      SHA1

                      db532831f0ceef9cafc5ee64772e7f1af84de027

                      SHA256

                      8da3159aea9d6a95ca1e7179d32be114aaedbc975cff42c8a183d8cf9fc05bad

                      SHA512

                      bf98dcdf9df91c9c3549cc3ba97d6297eb0e45c7b70aa5b99dd4bf6dc980befcb223846ac5ce2d6c9aaf3f65898755c5c8e8b6de4a5ee090d27037cf90efd5bd

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino7954.exe

                      Filesize

                      340KB

                      MD5

                      05608567a6157446d7400206e724766d

                      SHA1

                      95385ff4d5a199341a0e035c266ba9cd7ad63b31

                      SHA256

                      b189f205f0536781afab03269d398002515dc7b3c60948ef83b9c7b8f0cafb65

                      SHA512

                      eba7880be1e5c52311da6a2a4c0af5160a39ede8cdc0a17edd8a71c538ecbc17711e8dcb503a1adf2b34927100a75f4209ddbaedc2e570359a0f2d538db92792

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino7954.exe

                      Filesize

                      340KB

                      MD5

                      05608567a6157446d7400206e724766d

                      SHA1

                      95385ff4d5a199341a0e035c266ba9cd7ad63b31

                      SHA256

                      b189f205f0536781afab03269d398002515dc7b3c60948ef83b9c7b8f0cafb65

                      SHA512

                      eba7880be1e5c52311da6a2a4c0af5160a39ede8cdc0a17edd8a71c538ecbc17711e8dcb503a1adf2b34927100a75f4209ddbaedc2e570359a0f2d538db92792

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus9947.exe

                      Filesize

                      11KB

                      MD5

                      7e93bacbbc33e6652e147e7fe07572a0

                      SHA1

                      421a7167da01c8da4dc4d5234ca3dd84e319e762

                      SHA256

                      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                      SHA512

                      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus9947.exe

                      Filesize

                      11KB

                      MD5

                      7e93bacbbc33e6652e147e7fe07572a0

                      SHA1

                      421a7167da01c8da4dc4d5234ca3dd84e319e762

                      SHA256

                      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                      SHA512

                      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor3925.exe

                      Filesize

                      300KB

                      MD5

                      2429006472a4214f3a09e88573b27dad

                      SHA1

                      8fbd3b7899e6ee30042645c0cb8ef836362e1d25

                      SHA256

                      f09ec63569f32219169787542eb496051698f8870b55c21d1f4dc8e4aece4cd8

                      SHA512

                      edd69043d66bcf5e309c6d2d150086b5ba4617cfc391fd23d4fcd65c47467cb3b0046dca681cb7ccc927cc37a0463110c4c3eedce815e21290b50cb30d4c1039

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor3925.exe

                      Filesize

                      300KB

                      MD5

                      2429006472a4214f3a09e88573b27dad

                      SHA1

                      8fbd3b7899e6ee30042645c0cb8ef836362e1d25

                      SHA256

                      f09ec63569f32219169787542eb496051698f8870b55c21d1f4dc8e4aece4cd8

                      SHA512

                      edd69043d66bcf5e309c6d2d150086b5ba4617cfc391fd23d4fcd65c47467cb3b0046dca681cb7ccc927cc37a0463110c4c3eedce815e21290b50cb30d4c1039

                    • memory/1572-183-0x0000000004940000-0x0000000004952000-memory.dmp

                      Filesize

                      72KB

                    • memory/1572-167-0x0000000004940000-0x0000000004952000-memory.dmp

                      Filesize

                      72KB

                    • memory/1572-165-0x0000000004940000-0x0000000004952000-memory.dmp

                      Filesize

                      72KB

                    • memory/1572-162-0x0000000004940000-0x0000000004952000-memory.dmp

                      Filesize

                      72KB

                    • memory/1572-155-0x0000000002C50000-0x0000000002C7D000-memory.dmp

                      Filesize

                      180KB

                    • memory/1572-181-0x0000000004940000-0x0000000004952000-memory.dmp

                      Filesize

                      72KB

                    • memory/1572-179-0x0000000004940000-0x0000000004952000-memory.dmp

                      Filesize

                      72KB

                    • memory/1572-185-0x0000000004940000-0x0000000004952000-memory.dmp

                      Filesize

                      72KB

                    • memory/1572-189-0x0000000004940000-0x0000000004952000-memory.dmp

                      Filesize

                      72KB

                    • memory/1572-187-0x0000000004940000-0x0000000004952000-memory.dmp

                      Filesize

                      72KB

                    • memory/1572-177-0x0000000004940000-0x0000000004952000-memory.dmp

                      Filesize

                      72KB

                    • memory/1572-175-0x0000000004940000-0x0000000004952000-memory.dmp

                      Filesize

                      72KB

                    • memory/1572-173-0x0000000004940000-0x0000000004952000-memory.dmp

                      Filesize

                      72KB

                    • memory/1572-171-0x0000000004940000-0x0000000004952000-memory.dmp

                      Filesize

                      72KB

                    • memory/1572-169-0x0000000004940000-0x0000000004952000-memory.dmp

                      Filesize

                      72KB

                    • memory/1572-163-0x0000000004940000-0x0000000004952000-memory.dmp

                      Filesize

                      72KB

                    • memory/1572-190-0x0000000000400000-0x0000000002B79000-memory.dmp

                      Filesize

                      39.5MB

                    • memory/1572-194-0x0000000004960000-0x0000000004970000-memory.dmp

                      Filesize

                      64KB

                    • memory/1572-193-0x0000000004960000-0x0000000004970000-memory.dmp

                      Filesize

                      64KB

                    • memory/1572-195-0x0000000004960000-0x0000000004970000-memory.dmp

                      Filesize

                      64KB

                    • memory/1572-192-0x0000000000400000-0x0000000002B79000-memory.dmp

                      Filesize

                      39.5MB

                    • memory/1572-161-0x0000000004960000-0x0000000004970000-memory.dmp

                      Filesize

                      64KB

                    • memory/1572-160-0x0000000004960000-0x0000000004970000-memory.dmp

                      Filesize

                      64KB

                    • memory/1572-159-0x0000000004960000-0x0000000004970000-memory.dmp

                      Filesize

                      64KB

                    • memory/1572-158-0x0000000004940000-0x0000000004958000-memory.dmp

                      Filesize

                      96KB

                    • memory/1572-157-0x0000000007220000-0x000000000771E000-memory.dmp

                      Filesize

                      5.0MB

                    • memory/1572-156-0x00000000048A0000-0x00000000048BA000-memory.dmp

                      Filesize

                      104KB

                    • memory/3696-1135-0x0000000000130000-0x0000000000162000-memory.dmp

                      Filesize

                      200KB

                    • memory/3696-1137-0x0000000004D60000-0x0000000004D70000-memory.dmp

                      Filesize

                      64KB

                    • memory/3696-1136-0x0000000004B70000-0x0000000004BBB000-memory.dmp

                      Filesize

                      300KB

                    • memory/4300-203-0x0000000004A30000-0x0000000004A6E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4300-213-0x0000000004A30000-0x0000000004A6E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4300-219-0x0000000004A30000-0x0000000004A6E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4300-223-0x0000000004A30000-0x0000000004A6E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4300-225-0x0000000004A30000-0x0000000004A6E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4300-221-0x0000000004A30000-0x0000000004A6E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4300-227-0x0000000004A30000-0x0000000004A6E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4300-229-0x0000000004A30000-0x0000000004A6E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4300-235-0x0000000004A30000-0x0000000004A6E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4300-233-0x0000000004A30000-0x0000000004A6E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4300-231-0x0000000004A30000-0x0000000004A6E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4300-250-0x0000000002CB0000-0x0000000002CFB000-memory.dmp

                      Filesize

                      300KB

                    • memory/4300-252-0x0000000007280000-0x0000000007290000-memory.dmp

                      Filesize

                      64KB

                    • memory/4300-255-0x0000000007280000-0x0000000007290000-memory.dmp

                      Filesize

                      64KB

                    • memory/4300-257-0x0000000007280000-0x0000000007290000-memory.dmp

                      Filesize

                      64KB

                    • memory/4300-1112-0x0000000007DA0000-0x00000000083A6000-memory.dmp

                      Filesize

                      6.0MB

                    • memory/4300-1113-0x0000000007790000-0x000000000789A000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/4300-1114-0x0000000007240000-0x0000000007252000-memory.dmp

                      Filesize

                      72KB

                    • memory/4300-1115-0x00000000078A0000-0x00000000078DE000-memory.dmp

                      Filesize

                      248KB

                    • memory/4300-1116-0x0000000007280000-0x0000000007290000-memory.dmp

                      Filesize

                      64KB

                    • memory/4300-1117-0x00000000079E0000-0x0000000007A2B000-memory.dmp

                      Filesize

                      300KB

                    • memory/4300-1119-0x0000000007280000-0x0000000007290000-memory.dmp

                      Filesize

                      64KB

                    • memory/4300-1120-0x0000000007280000-0x0000000007290000-memory.dmp

                      Filesize

                      64KB

                    • memory/4300-1121-0x0000000007280000-0x0000000007290000-memory.dmp

                      Filesize

                      64KB

                    • memory/4300-1122-0x0000000007B60000-0x0000000007BC6000-memory.dmp

                      Filesize

                      408KB

                    • memory/4300-1123-0x0000000008860000-0x00000000088F2000-memory.dmp

                      Filesize

                      584KB

                    • memory/4300-1124-0x0000000008930000-0x0000000008AF2000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/4300-1125-0x0000000008B00000-0x000000000902C000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/4300-1126-0x0000000007280000-0x0000000007290000-memory.dmp

                      Filesize

                      64KB

                    • memory/4300-217-0x0000000004A30000-0x0000000004A6E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4300-215-0x0000000004A30000-0x0000000004A6E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4300-205-0x0000000004A30000-0x0000000004A6E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4300-207-0x0000000004A30000-0x0000000004A6E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4300-211-0x0000000004A30000-0x0000000004A6E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4300-209-0x0000000004A30000-0x0000000004A6E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4300-202-0x0000000004A30000-0x0000000004A6E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4300-201-0x0000000004A30000-0x0000000004A74000-memory.dmp

                      Filesize

                      272KB

                    • memory/4300-200-0x0000000004750000-0x0000000004796000-memory.dmp

                      Filesize

                      280KB

                    • memory/4300-1128-0x00000000093A0000-0x0000000009416000-memory.dmp

                      Filesize

                      472KB

                    • memory/4300-1129-0x0000000009420000-0x0000000009470000-memory.dmp

                      Filesize

                      320KB

                    • memory/4424-149-0x00000000006B0000-0x00000000006BA000-memory.dmp

                      Filesize

                      40KB