Analysis

  • max time kernel
    143s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/03/2023, 02:57

General

  • Target

    aa07747daef11599f221f38aafb2d38a71d7310e61a5d261593a3ddb06dfc9b2.exe

  • Size

    1.0MB

  • MD5

    4f54408432805101f2d2c67af035b979

  • SHA1

    fa4fbe4715c31ced4ad4b49767812a53480f1b79

  • SHA256

    aa07747daef11599f221f38aafb2d38a71d7310e61a5d261593a3ddb06dfc9b2

  • SHA512

    a4a528f5d9ccbf4fb40b0d74e5ce05ddcda1af525a75c74aa6302f5ed80dcca358c136ee86abd6c1024204109c4f63e8288b0a6598a97e42af863ee195dacd16

  • SSDEEP

    24576:Py9F0dKMYIer7jtBwsd7paUw5+Qnnz7ai:aHQKMlm7JBwsd4UW+Qnz7

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

roxi

C2

193.233.20.31:4125

Attributes
  • auth_value

    9d8be78c896acc3cf8b8a6637a221376

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa07747daef11599f221f38aafb2d38a71d7310e61a5d261593a3ddb06dfc9b2.exe
    "C:\Users\Admin\AppData\Local\Temp\aa07747daef11599f221f38aafb2d38a71d7310e61a5d261593a3ddb06dfc9b2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4440
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino8497.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino8497.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4696
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino6154.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino6154.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4816
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino1691.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino1691.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:5032
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus5183.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus5183.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3236
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4238.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4238.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3856
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3856 -s 1084
              6⤵
              • Program crash
              PID:1200
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dCG92s78.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dCG92s78.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4980
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 1348
            5⤵
            • Program crash
            PID:3820
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en124947.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en124947.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3648
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge875228.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge875228.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:216
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1676
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:5004
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3220
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3188
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:4608
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:4740
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:3628
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:1556
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:4384
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3856 -ip 3856
                1⤵
                  PID:3700
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4980 -ip 4980
                  1⤵
                    PID:1428
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:1396

                  Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                          Filesize

                          226KB

                          MD5

                          8627ebe3777cc777ed2a14b907162224

                          SHA1

                          06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                          SHA256

                          319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                          SHA512

                          9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                        • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                          Filesize

                          226KB

                          MD5

                          8627ebe3777cc777ed2a14b907162224

                          SHA1

                          06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                          SHA256

                          319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                          SHA512

                          9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                        • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                          Filesize

                          226KB

                          MD5

                          8627ebe3777cc777ed2a14b907162224

                          SHA1

                          06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                          SHA256

                          319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                          SHA512

                          9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                        • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                          Filesize

                          226KB

                          MD5

                          8627ebe3777cc777ed2a14b907162224

                          SHA1

                          06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                          SHA256

                          319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                          SHA512

                          9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge875228.exe

                          Filesize

                          226KB

                          MD5

                          8627ebe3777cc777ed2a14b907162224

                          SHA1

                          06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                          SHA256

                          319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                          SHA512

                          9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge875228.exe

                          Filesize

                          226KB

                          MD5

                          8627ebe3777cc777ed2a14b907162224

                          SHA1

                          06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                          SHA256

                          319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                          SHA512

                          9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino8497.exe

                          Filesize

                          841KB

                          MD5

                          fc0e6bc5a80b61355a40b125a20bec48

                          SHA1

                          7d0c7c75359f471a95b27e9f46bd99d37faea20b

                          SHA256

                          5a6175e1b8a6f8a0f8a6494533d5232abb18899b67ebac3eecc3d831299e2822

                          SHA512

                          ac0f0628c24c54f0f0b27a4a6e90d258df1a6bca924a66448fb044c5a4da93a09dc058f5bb360fd8caadb92b07f2ee1b9ce382c07c5321d82c7ae335a564cac2

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino8497.exe

                          Filesize

                          841KB

                          MD5

                          fc0e6bc5a80b61355a40b125a20bec48

                          SHA1

                          7d0c7c75359f471a95b27e9f46bd99d37faea20b

                          SHA256

                          5a6175e1b8a6f8a0f8a6494533d5232abb18899b67ebac3eecc3d831299e2822

                          SHA512

                          ac0f0628c24c54f0f0b27a4a6e90d258df1a6bca924a66448fb044c5a4da93a09dc058f5bb360fd8caadb92b07f2ee1b9ce382c07c5321d82c7ae335a564cac2

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en124947.exe

                          Filesize

                          175KB

                          MD5

                          30bf410db5f6c05f0dee763f5a0fe5b7

                          SHA1

                          1f4187925e1af163603a12bb116e869f8f137455

                          SHA256

                          d1f5b4b1ee5703bf94f9c1bee60e91463db4c28beeb7510ea7ceba9fab4b1178

                          SHA512

                          5edc65f5e5278af8731174dbdc70a8a5efddf1ee756df1accead04f1490b90eb05b25a1eaaba49d1f274aeff4de0bc02ec79f220ea99bc5383e2890ed4f211de

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en124947.exe

                          Filesize

                          175KB

                          MD5

                          30bf410db5f6c05f0dee763f5a0fe5b7

                          SHA1

                          1f4187925e1af163603a12bb116e869f8f137455

                          SHA256

                          d1f5b4b1ee5703bf94f9c1bee60e91463db4c28beeb7510ea7ceba9fab4b1178

                          SHA512

                          5edc65f5e5278af8731174dbdc70a8a5efddf1ee756df1accead04f1490b90eb05b25a1eaaba49d1f274aeff4de0bc02ec79f220ea99bc5383e2890ed4f211de

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino6154.exe

                          Filesize

                          699KB

                          MD5

                          79e67f042b9550d8120392c0dbd4f08d

                          SHA1

                          e29b9463dda4b115ff760be39be13169b42325ff

                          SHA256

                          c535d5d8743d9b77ef37089d32fde7bb75420fd145391d12c559b732276780eb

                          SHA512

                          00129a01072ca33650d882a9b305573a579090c897e34d2cde7e85f5b37be15db8a206aec714091e3ccc4a6701ed8658b41caa8fe087de6395e79b9cf65e6def

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino6154.exe

                          Filesize

                          699KB

                          MD5

                          79e67f042b9550d8120392c0dbd4f08d

                          SHA1

                          e29b9463dda4b115ff760be39be13169b42325ff

                          SHA256

                          c535d5d8743d9b77ef37089d32fde7bb75420fd145391d12c559b732276780eb

                          SHA512

                          00129a01072ca33650d882a9b305573a579090c897e34d2cde7e85f5b37be15db8a206aec714091e3ccc4a6701ed8658b41caa8fe087de6395e79b9cf65e6def

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dCG92s78.exe

                          Filesize

                          358KB

                          MD5

                          854f50a732e7d5bc302dcfcb40be35ff

                          SHA1

                          2d27a26075f55b6bb5e3e0449bae08889d7b55b5

                          SHA256

                          f2dd50d796fb9baa302da79aa2adbe0b7612a0f6c8f204d60ab30e1eb2bfdf51

                          SHA512

                          303bb2af3b394a829d2181ebd93a06ff99e8e2c8bfe2edab195baec9fccb18f96a4b3f503e68615ea51f5b07521a92e2bd3d47187863f78aa9bb65f514165eb1

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dCG92s78.exe

                          Filesize

                          358KB

                          MD5

                          854f50a732e7d5bc302dcfcb40be35ff

                          SHA1

                          2d27a26075f55b6bb5e3e0449bae08889d7b55b5

                          SHA256

                          f2dd50d796fb9baa302da79aa2adbe0b7612a0f6c8f204d60ab30e1eb2bfdf51

                          SHA512

                          303bb2af3b394a829d2181ebd93a06ff99e8e2c8bfe2edab195baec9fccb18f96a4b3f503e68615ea51f5b07521a92e2bd3d47187863f78aa9bb65f514165eb1

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino1691.exe

                          Filesize

                          346KB

                          MD5

                          62062b52b9324f7201462b36bcd82c33

                          SHA1

                          6cec27cc78f79c3a840520f45c7a9d309f500be3

                          SHA256

                          d463e875b20f9e806ee4390de29df3c508da69e162c43ba753ed08edad583fed

                          SHA512

                          a21488722e120f98ebc8389108f8ef95ebf389f9e0bfd2106bd0e61fc06889cee555aeb66455ef7fa32168f7eb06f4af17aa074eadfb0448235ee0419d2ffd58

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino1691.exe

                          Filesize

                          346KB

                          MD5

                          62062b52b9324f7201462b36bcd82c33

                          SHA1

                          6cec27cc78f79c3a840520f45c7a9d309f500be3

                          SHA256

                          d463e875b20f9e806ee4390de29df3c508da69e162c43ba753ed08edad583fed

                          SHA512

                          a21488722e120f98ebc8389108f8ef95ebf389f9e0bfd2106bd0e61fc06889cee555aeb66455ef7fa32168f7eb06f4af17aa074eadfb0448235ee0419d2ffd58

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus5183.exe

                          Filesize

                          11KB

                          MD5

                          7e93bacbbc33e6652e147e7fe07572a0

                          SHA1

                          421a7167da01c8da4dc4d5234ca3dd84e319e762

                          SHA256

                          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                          SHA512

                          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus5183.exe

                          Filesize

                          11KB

                          MD5

                          7e93bacbbc33e6652e147e7fe07572a0

                          SHA1

                          421a7167da01c8da4dc4d5234ca3dd84e319e762

                          SHA256

                          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                          SHA512

                          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4238.exe

                          Filesize

                          300KB

                          MD5

                          904f2979599db8ddd8fc4addccc23907

                          SHA1

                          33520b8c2b8c34139df09b998000aaef10215cdf

                          SHA256

                          35abbd5e603c01f35e4d2b2a7ba23d683d09abad527f7c72e658e934373edb5e

                          SHA512

                          e1bf88996add9b13ae911fc3f1c5af47a72dfa47b11a3295f1dea8572c9f7415ac63566f412b3b403d6f8ad07d2a616ea83fa4d38312d3e5989d47cee8ce8664

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4238.exe

                          Filesize

                          300KB

                          MD5

                          904f2979599db8ddd8fc4addccc23907

                          SHA1

                          33520b8c2b8c34139df09b998000aaef10215cdf

                          SHA256

                          35abbd5e603c01f35e4d2b2a7ba23d683d09abad527f7c72e658e934373edb5e

                          SHA512

                          e1bf88996add9b13ae911fc3f1c5af47a72dfa47b11a3295f1dea8572c9f7415ac63566f412b3b403d6f8ad07d2a616ea83fa4d38312d3e5989d47cee8ce8664

                        • memory/3236-161-0x00000000000C0000-0x00000000000CA000-memory.dmp

                          Filesize

                          40KB

                        • memory/3648-1141-0x0000000005850000-0x0000000005860000-memory.dmp

                          Filesize

                          64KB

                        • memory/3648-1140-0x0000000000F50000-0x0000000000F82000-memory.dmp

                          Filesize

                          200KB

                        • memory/3856-179-0x0000000002700000-0x0000000002712000-memory.dmp

                          Filesize

                          72KB

                        • memory/3856-201-0x0000000004F20000-0x0000000004F30000-memory.dmp

                          Filesize

                          64KB

                        • memory/3856-185-0x0000000002700000-0x0000000002712000-memory.dmp

                          Filesize

                          72KB

                        • memory/3856-187-0x0000000002700000-0x0000000002712000-memory.dmp

                          Filesize

                          72KB

                        • memory/3856-189-0x0000000002700000-0x0000000002712000-memory.dmp

                          Filesize

                          72KB

                        • memory/3856-191-0x0000000002700000-0x0000000002712000-memory.dmp

                          Filesize

                          72KB

                        • memory/3856-193-0x0000000002700000-0x0000000002712000-memory.dmp

                          Filesize

                          72KB

                        • memory/3856-195-0x0000000002700000-0x0000000002712000-memory.dmp

                          Filesize

                          72KB

                        • memory/3856-197-0x0000000002700000-0x0000000002712000-memory.dmp

                          Filesize

                          72KB

                        • memory/3856-199-0x0000000002700000-0x0000000002712000-memory.dmp

                          Filesize

                          72KB

                        • memory/3856-200-0x0000000000400000-0x000000000070E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3856-183-0x0000000002700000-0x0000000002712000-memory.dmp

                          Filesize

                          72KB

                        • memory/3856-202-0x0000000004F20000-0x0000000004F30000-memory.dmp

                          Filesize

                          64KB

                        • memory/3856-204-0x0000000000400000-0x000000000070E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3856-181-0x0000000002700000-0x0000000002712000-memory.dmp

                          Filesize

                          72KB

                        • memory/3856-177-0x0000000002700000-0x0000000002712000-memory.dmp

                          Filesize

                          72KB

                        • memory/3856-175-0x0000000002700000-0x0000000002712000-memory.dmp

                          Filesize

                          72KB

                        • memory/3856-173-0x0000000002700000-0x0000000002712000-memory.dmp

                          Filesize

                          72KB

                        • memory/3856-172-0x0000000002700000-0x0000000002712000-memory.dmp

                          Filesize

                          72KB

                        • memory/3856-170-0x0000000004F20000-0x0000000004F30000-memory.dmp

                          Filesize

                          64KB

                        • memory/3856-171-0x0000000004F20000-0x0000000004F30000-memory.dmp

                          Filesize

                          64KB

                        • memory/3856-169-0x0000000004F20000-0x0000000004F30000-memory.dmp

                          Filesize

                          64KB

                        • memory/3856-168-0x0000000000890000-0x00000000008BD000-memory.dmp

                          Filesize

                          180KB

                        • memory/3856-167-0x0000000004F30000-0x00000000054D4000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/4980-214-0x00000000027A0000-0x00000000027DE000-memory.dmp

                          Filesize

                          248KB

                        • memory/4980-230-0x00000000027A0000-0x00000000027DE000-memory.dmp

                          Filesize

                          248KB

                        • memory/4980-232-0x00000000027A0000-0x00000000027DE000-memory.dmp

                          Filesize

                          248KB

                        • memory/4980-234-0x00000000027A0000-0x00000000027DE000-memory.dmp

                          Filesize

                          248KB

                        • memory/4980-236-0x00000000027A0000-0x00000000027DE000-memory.dmp

                          Filesize

                          248KB

                        • memory/4980-238-0x00000000027A0000-0x00000000027DE000-memory.dmp

                          Filesize

                          248KB

                        • memory/4980-240-0x00000000027A0000-0x00000000027DE000-memory.dmp

                          Filesize

                          248KB

                        • memory/4980-243-0x0000000002540000-0x0000000002550000-memory.dmp

                          Filesize

                          64KB

                        • memory/4980-241-0x0000000000870000-0x00000000008BB000-memory.dmp

                          Filesize

                          300KB

                        • memory/4980-245-0x0000000002540000-0x0000000002550000-memory.dmp

                          Filesize

                          64KB

                        • memory/4980-247-0x0000000002540000-0x0000000002550000-memory.dmp

                          Filesize

                          64KB

                        • memory/4980-244-0x00000000027A0000-0x00000000027DE000-memory.dmp

                          Filesize

                          248KB

                        • memory/4980-1119-0x0000000005410000-0x0000000005A28000-memory.dmp

                          Filesize

                          6.1MB

                        • memory/4980-1120-0x0000000005A30000-0x0000000005B3A000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/4980-1121-0x00000000029D0000-0x00000000029E2000-memory.dmp

                          Filesize

                          72KB

                        • memory/4980-1122-0x0000000002540000-0x0000000002550000-memory.dmp

                          Filesize

                          64KB

                        • memory/4980-1123-0x0000000005B40000-0x0000000005B7C000-memory.dmp

                          Filesize

                          240KB

                        • memory/4980-1124-0x0000000005E10000-0x0000000005EA2000-memory.dmp

                          Filesize

                          584KB

                        • memory/4980-1125-0x0000000005EB0000-0x0000000005F16000-memory.dmp

                          Filesize

                          408KB

                        • memory/4980-1126-0x00000000065D0000-0x0000000006792000-memory.dmp

                          Filesize

                          1.8MB

                        • memory/4980-1127-0x00000000067A0000-0x0000000006CCC000-memory.dmp

                          Filesize

                          5.2MB

                        • memory/4980-1129-0x0000000006F20000-0x0000000006F96000-memory.dmp

                          Filesize

                          472KB

                        • memory/4980-1130-0x0000000006FA0000-0x0000000006FF0000-memory.dmp

                          Filesize

                          320KB

                        • memory/4980-1132-0x0000000002540000-0x0000000002550000-memory.dmp

                          Filesize

                          64KB

                        • memory/4980-1131-0x0000000002540000-0x0000000002550000-memory.dmp

                          Filesize

                          64KB

                        • memory/4980-1133-0x0000000002540000-0x0000000002550000-memory.dmp

                          Filesize

                          64KB

                        • memory/4980-1134-0x0000000002540000-0x0000000002550000-memory.dmp

                          Filesize

                          64KB

                        • memory/4980-228-0x00000000027A0000-0x00000000027DE000-memory.dmp

                          Filesize

                          248KB

                        • memory/4980-226-0x00000000027A0000-0x00000000027DE000-memory.dmp

                          Filesize

                          248KB

                        • memory/4980-224-0x00000000027A0000-0x00000000027DE000-memory.dmp

                          Filesize

                          248KB

                        • memory/4980-222-0x00000000027A0000-0x00000000027DE000-memory.dmp

                          Filesize

                          248KB

                        • memory/4980-220-0x00000000027A0000-0x00000000027DE000-memory.dmp

                          Filesize

                          248KB

                        • memory/4980-218-0x00000000027A0000-0x00000000027DE000-memory.dmp

                          Filesize

                          248KB

                        • memory/4980-216-0x00000000027A0000-0x00000000027DE000-memory.dmp

                          Filesize

                          248KB

                        • memory/4980-212-0x00000000027A0000-0x00000000027DE000-memory.dmp

                          Filesize

                          248KB

                        • memory/4980-210-0x00000000027A0000-0x00000000027DE000-memory.dmp

                          Filesize

                          248KB

                        • memory/4980-209-0x00000000027A0000-0x00000000027DE000-memory.dmp

                          Filesize

                          248KB