Analysis

  • max time kernel
    137s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24-03-2023 00:05

General

  • Target

    576a12322a875c10784121c1f5f446686c3f59ffddc64928df3d36393b441209.exe

  • Size

    1023KB

  • MD5

    31c6ca8f8625fbb154522632dc6485c5

  • SHA1

    fc93a9c3645f957ed7e7691be4cceb36f7844324

  • SHA256

    576a12322a875c10784121c1f5f446686c3f59ffddc64928df3d36393b441209

  • SHA512

    be1ce78609dfbe13f27ac3a5343fcfb055b866889014351c0a65c7ab3246b578b844d063ff63c6fd9f36f59c6bbff4c5c682f8887e19c1a584742fb48522bbec

  • SSDEEP

    24576:JyhWWhtN1O0LMKApS7s2O4CmLVG8svAG4VIw:8hWWh1wKAys2HTxG8s4FV

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

trap

C2

193.233.20.30:4125

Attributes
  • auth_value

    b39a737e2e9eba88e48ab88d1061be9c

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\576a12322a875c10784121c1f5f446686c3f59ffddc64928df3d36393b441209.exe
    "C:\Users\Admin\AppData\Local\Temp\576a12322a875c10784121c1f5f446686c3f59ffddc64928df3d36393b441209.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino6514.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino6514.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino5661.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino5661.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2344
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino1181.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino1181.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:5108
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus6968.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus6968.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4916
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9067.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9067.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3112
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dfW24s51.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dfW24s51.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2988
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en811060.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en811060.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3492
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge684514.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge684514.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4688
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4728
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4388
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4364
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4796
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:1904
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:4956
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:3336
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:3220
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:4932
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:4852
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:4880

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Defense Evasion

              Modify Registry

              3
              T1112

              Disabling Security Tools

              2
              T1089

              Credential Access

              Credentials in Files

              2
              T1081

              Discovery

              Query Registry

              1
              T1012

              System Information Discovery

              1
              T1082

              Collection

              Data from Local System

              2
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge684514.exe
                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge684514.exe
                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino6514.exe
                Filesize

                841KB

                MD5

                736aca9ef52fbb2471f453bea779d2b3

                SHA1

                4cf45dfa7df64f3385c04a6561198615496657b8

                SHA256

                b2137f06641a114534b71852fba11f87843a412acf44c92bb353d4d8a148c4f0

                SHA512

                de1e713f21543fef255fa7d73743a3f4752d17118c0a64f1dfe1a48dcdd01a0900380e2bbfea6bc7d6ef1484d8e1c19044733d2c919848b1991316030e1ae809

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino6514.exe
                Filesize

                841KB

                MD5

                736aca9ef52fbb2471f453bea779d2b3

                SHA1

                4cf45dfa7df64f3385c04a6561198615496657b8

                SHA256

                b2137f06641a114534b71852fba11f87843a412acf44c92bb353d4d8a148c4f0

                SHA512

                de1e713f21543fef255fa7d73743a3f4752d17118c0a64f1dfe1a48dcdd01a0900380e2bbfea6bc7d6ef1484d8e1c19044733d2c919848b1991316030e1ae809

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en811060.exe
                Filesize

                175KB

                MD5

                581e8f97deca3769f1bc14882c9f26dc

                SHA1

                b69eb0b0c175888de0fa1ea7a0a045d69138d18e

                SHA256

                b277fd59e05cce33d218d0e9720f041eff2d7a5477b1e2843a6123aad307cd86

                SHA512

                f56835f4598bb5b121071373d760facd9173efdfadb741f99e3752c825f558b92922a3813606130ff0ed0f886d2d2858a0412d42284d3a941f0702d08eaec065

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en811060.exe
                Filesize

                175KB

                MD5

                581e8f97deca3769f1bc14882c9f26dc

                SHA1

                b69eb0b0c175888de0fa1ea7a0a045d69138d18e

                SHA256

                b277fd59e05cce33d218d0e9720f041eff2d7a5477b1e2843a6123aad307cd86

                SHA512

                f56835f4598bb5b121071373d760facd9173efdfadb741f99e3752c825f558b92922a3813606130ff0ed0f886d2d2858a0412d42284d3a941f0702d08eaec065

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino5661.exe
                Filesize

                699KB

                MD5

                0f80633d2c17e9f85912ad856a00f0b6

                SHA1

                f40387014b6f18f38836a57cbdb26b936271a1c9

                SHA256

                46c949b4cd5580fe97198c44f36c33f199c2f68ba347037d074fa20a8f677361

                SHA512

                47641737465ac10bd7589877ffc909016ecac0876e8821917d87702e677a0faf1f94519da0374867f7cfb8435cfe61944839a9f9c019e66be97d48d6b5971fe9

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino5661.exe
                Filesize

                699KB

                MD5

                0f80633d2c17e9f85912ad856a00f0b6

                SHA1

                f40387014b6f18f38836a57cbdb26b936271a1c9

                SHA256

                46c949b4cd5580fe97198c44f36c33f199c2f68ba347037d074fa20a8f677361

                SHA512

                47641737465ac10bd7589877ffc909016ecac0876e8821917d87702e677a0faf1f94519da0374867f7cfb8435cfe61944839a9f9c019e66be97d48d6b5971fe9

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dfW24s51.exe
                Filesize

                358KB

                MD5

                493decf4a3f4022c0928a98f63b00488

                SHA1

                e159a0aca5fc634d5c5d7b3f90eced7f32ab6562

                SHA256

                3eb454f9493853add0579574e91de5f11785729c534fa5d39c5f69176aeece12

                SHA512

                3dede5d60125f9a76577443e21dbfedd9b116142efa54c1c7d1d58d9c6cf9a9182d0115bc8ccedee06a2d8220f1199678ba458ed0cd80d93dd6acecc31d3e767

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dfW24s51.exe
                Filesize

                358KB

                MD5

                493decf4a3f4022c0928a98f63b00488

                SHA1

                e159a0aca5fc634d5c5d7b3f90eced7f32ab6562

                SHA256

                3eb454f9493853add0579574e91de5f11785729c534fa5d39c5f69176aeece12

                SHA512

                3dede5d60125f9a76577443e21dbfedd9b116142efa54c1c7d1d58d9c6cf9a9182d0115bc8ccedee06a2d8220f1199678ba458ed0cd80d93dd6acecc31d3e767

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino1181.exe
                Filesize

                346KB

                MD5

                aa41dda56198ef5add18ec458882f72a

                SHA1

                6c3c957d7f0b1f1cc5cb957ec5d843a32bd8518d

                SHA256

                4cf3a9f061b3a96eccc296b217cd877017ea754d2acaa29b57832f5fa28adf80

                SHA512

                265399dc602333bf0ddfe791316fe380209acc895fa2f0fd3baeba2b70484f3b4ac3a89a70bfdcc8f6b0a15b6aadd4666c5f9a3a11357caa43cf254657cab5c0

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino1181.exe
                Filesize

                346KB

                MD5

                aa41dda56198ef5add18ec458882f72a

                SHA1

                6c3c957d7f0b1f1cc5cb957ec5d843a32bd8518d

                SHA256

                4cf3a9f061b3a96eccc296b217cd877017ea754d2acaa29b57832f5fa28adf80

                SHA512

                265399dc602333bf0ddfe791316fe380209acc895fa2f0fd3baeba2b70484f3b4ac3a89a70bfdcc8f6b0a15b6aadd4666c5f9a3a11357caa43cf254657cab5c0

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus6968.exe
                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus6968.exe
                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9067.exe
                Filesize

                300KB

                MD5

                5bfbcb4fdd65effed255d1f7962b002c

                SHA1

                482a98cdae4b543e0392f2303187b099d57db4ff

                SHA256

                b653e4a2293b01f6f01af36065bb95e91de77030e5fdfcc2cf5b6bcecfbc589c

                SHA512

                85720624b81a2ad97ab0dc93eb2ddf7db890be3d81987d7cd92de099ec96e6b8a73f84fc8a0b600f5cdf7d9e12800d173928ab8a49182069f9093502724524de

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9067.exe
                Filesize

                300KB

                MD5

                5bfbcb4fdd65effed255d1f7962b002c

                SHA1

                482a98cdae4b543e0392f2303187b099d57db4ff

                SHA256

                b653e4a2293b01f6f01af36065bb95e91de77030e5fdfcc2cf5b6bcecfbc589c

                SHA512

                85720624b81a2ad97ab0dc93eb2ddf7db890be3d81987d7cd92de099ec96e6b8a73f84fc8a0b600f5cdf7d9e12800d173928ab8a49182069f9093502724524de

              • memory/2988-1112-0x0000000004B30000-0x0000000004B40000-memory.dmp
                Filesize

                64KB

              • memory/2988-1116-0x0000000006680000-0x0000000006BAC000-memory.dmp
                Filesize

                5.2MB

              • memory/2988-1123-0x0000000004B30000-0x0000000004B40000-memory.dmp
                Filesize

                64KB

              • memory/2988-1122-0x0000000006FA0000-0x0000000006FF0000-memory.dmp
                Filesize

                320KB

              • memory/2988-1121-0x0000000006F10000-0x0000000006F86000-memory.dmp
                Filesize

                472KB

              • memory/2988-1120-0x0000000004B30000-0x0000000004B40000-memory.dmp
                Filesize

                64KB

              • memory/2988-1119-0x0000000004B30000-0x0000000004B40000-memory.dmp
                Filesize

                64KB

              • memory/2988-1118-0x0000000004B30000-0x0000000004B40000-memory.dmp
                Filesize

                64KB

              • memory/2988-1115-0x00000000064A0000-0x0000000006662000-memory.dmp
                Filesize

                1.8MB

              • memory/2988-1114-0x00000000063C0000-0x0000000006452000-memory.dmp
                Filesize

                584KB

              • memory/2988-1113-0x0000000005D00000-0x0000000005D66000-memory.dmp
                Filesize

                408KB

              • memory/2988-1111-0x0000000005B70000-0x0000000005BBB000-memory.dmp
                Filesize

                300KB

              • memory/2988-1110-0x0000000005A20000-0x0000000005A5E000-memory.dmp
                Filesize

                248KB

              • memory/2988-1109-0x0000000005A00000-0x0000000005A12000-memory.dmp
                Filesize

                72KB

              • memory/2988-1108-0x00000000058C0000-0x00000000059CA000-memory.dmp
                Filesize

                1.0MB

              • memory/2988-1107-0x0000000005230000-0x0000000005836000-memory.dmp
                Filesize

                6.0MB

              • memory/2988-234-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/2988-232-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/2988-230-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/2988-195-0x0000000004AD0000-0x0000000004B16000-memory.dmp
                Filesize

                280KB

              • memory/2988-196-0x00000000051C0000-0x0000000005204000-memory.dmp
                Filesize

                272KB

              • memory/2988-198-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/2988-197-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/2988-200-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/2988-203-0x00000000007F0000-0x000000000083B000-memory.dmp
                Filesize

                300KB

              • memory/2988-202-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/2988-206-0x0000000004B30000-0x0000000004B40000-memory.dmp
                Filesize

                64KB

              • memory/2988-208-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/2988-207-0x0000000004B30000-0x0000000004B40000-memory.dmp
                Filesize

                64KB

              • memory/2988-204-0x0000000004B30000-0x0000000004B40000-memory.dmp
                Filesize

                64KB

              • memory/2988-210-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/2988-212-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/2988-214-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/2988-216-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/2988-218-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/2988-220-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/2988-222-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/2988-224-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/2988-226-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/2988-228-0x00000000051C0000-0x00000000051FE000-memory.dmp
                Filesize

                248KB

              • memory/3112-174-0x0000000004C30000-0x0000000004C42000-memory.dmp
                Filesize

                72KB

              • memory/3112-176-0x0000000004C30000-0x0000000004C42000-memory.dmp
                Filesize

                72KB

              • memory/3112-160-0x0000000004C30000-0x0000000004C42000-memory.dmp
                Filesize

                72KB

              • memory/3112-188-0x0000000004D30000-0x0000000004D40000-memory.dmp
                Filesize

                64KB

              • memory/3112-187-0x0000000004D30000-0x0000000004D40000-memory.dmp
                Filesize

                64KB

              • memory/3112-186-0x0000000004D30000-0x0000000004D40000-memory.dmp
                Filesize

                64KB

              • memory/3112-185-0x0000000000400000-0x000000000070E000-memory.dmp
                Filesize

                3.1MB

              • memory/3112-184-0x0000000004C30000-0x0000000004C42000-memory.dmp
                Filesize

                72KB

              • memory/3112-158-0x0000000004C30000-0x0000000004C42000-memory.dmp
                Filesize

                72KB

              • memory/3112-182-0x0000000004C30000-0x0000000004C42000-memory.dmp
                Filesize

                72KB

              • memory/3112-180-0x0000000004C30000-0x0000000004C42000-memory.dmp
                Filesize

                72KB

              • memory/3112-178-0x0000000004C30000-0x0000000004C42000-memory.dmp
                Filesize

                72KB

              • memory/3112-164-0x0000000004C30000-0x0000000004C42000-memory.dmp
                Filesize

                72KB

              • memory/3112-152-0x00000000001D0000-0x00000000001FD000-memory.dmp
                Filesize

                180KB

              • memory/3112-190-0x0000000000400000-0x000000000070E000-memory.dmp
                Filesize

                3.1MB

              • memory/3112-172-0x0000000004C30000-0x0000000004C42000-memory.dmp
                Filesize

                72KB

              • memory/3112-162-0x0000000004C30000-0x0000000004C42000-memory.dmp
                Filesize

                72KB

              • memory/3112-168-0x0000000004C30000-0x0000000004C42000-memory.dmp
                Filesize

                72KB

              • memory/3112-166-0x0000000004C30000-0x0000000004C42000-memory.dmp
                Filesize

                72KB

              • memory/3112-157-0x0000000004C30000-0x0000000004C42000-memory.dmp
                Filesize

                72KB

              • memory/3112-154-0x0000000004C30000-0x0000000004C48000-memory.dmp
                Filesize

                96KB

              • memory/3112-150-0x0000000000A50000-0x0000000000A6A000-memory.dmp
                Filesize

                104KB

              • memory/3112-170-0x0000000004C30000-0x0000000004C42000-memory.dmp
                Filesize

                72KB

              • memory/3112-151-0x0000000004D40000-0x000000000523E000-memory.dmp
                Filesize

                5.0MB

              • memory/3112-156-0x0000000004D30000-0x0000000004D40000-memory.dmp
                Filesize

                64KB

              • memory/3112-155-0x0000000004D30000-0x0000000004D40000-memory.dmp
                Filesize

                64KB

              • memory/3112-153-0x0000000004D30000-0x0000000004D40000-memory.dmp
                Filesize

                64KB

              • memory/3492-1130-0x0000000005390000-0x00000000053DB000-memory.dmp
                Filesize

                300KB

              • memory/3492-1131-0x00000000051E0000-0x00000000051F0000-memory.dmp
                Filesize

                64KB

              • memory/3492-1129-0x0000000000950000-0x0000000000982000-memory.dmp
                Filesize

                200KB

              • memory/4916-144-0x00000000005F0000-0x00000000005FA000-memory.dmp
                Filesize

                40KB