Analysis

  • max time kernel
    114s
  • max time network
    117s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24/03/2023, 04:22

General

  • Target

    be22b68f30e727d8499182c2313abd11323f471e6775864318f0a5f1510ea045.exe

  • Size

    1.0MB

  • MD5

    1e319c28cc21f759f2c1b8f5914b7442

  • SHA1

    1dd714fbc3148e427246cb07dc361d2ffce0ea9f

  • SHA256

    be22b68f30e727d8499182c2313abd11323f471e6775864318f0a5f1510ea045

  • SHA512

    616f56246e9b1e796aa382835ee98a11a5f52babfb5d4aed065868f4aec64c91367098017089bc34383512c4c0f2667048a91f39b9af4a16f737b160a72fc8b2

  • SSDEEP

    24576:myduPAZAP1UCbm4GMkegwcuiYJurkL+4ZpgjS5LN:14PAmhrVkLDuiYUrkf7

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

roxi

C2

193.233.20.31:4125

Attributes
  • auth_value

    9d8be78c896acc3cf8b8a6637a221376

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be22b68f30e727d8499182c2313abd11323f471e6775864318f0a5f1510ea045.exe
    "C:\Users\Admin\AppData\Local\Temp\be22b68f30e727d8499182c2313abd11323f471e6775864318f0a5f1510ea045.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino4392.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino4392.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2328
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8646.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8646.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2572
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino9648.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino9648.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2636
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus9317.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus9317.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3136
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4737.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4737.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2056
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dvp66s72.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dvp66s72.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1252
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en215727.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en215727.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2136
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge329281.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge329281.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:408
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3936
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4712
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4356
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3344
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:4420
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:3848
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4324
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:4332
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:4392
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:5116
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:4212

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge329281.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge329281.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino4392.exe

                Filesize

                842KB

                MD5

                62180b891fb85d9be0471e21e63baec6

                SHA1

                a533bd9d380ff7f1134d42d764f7bdd4d43f583c

                SHA256

                97677f2c26a8bf25e482f6159b38122e4e1e9c9b85bc2ea9373d674a58013911

                SHA512

                5e2f35cc9e6d0001b039413616ad25969f1aa29cf309b3e312c60e9dda4cb707a914a7a1e74f4ff2d238ecabf7995ab7fe7961584ad6163db7957e1965d124ad

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino4392.exe

                Filesize

                842KB

                MD5

                62180b891fb85d9be0471e21e63baec6

                SHA1

                a533bd9d380ff7f1134d42d764f7bdd4d43f583c

                SHA256

                97677f2c26a8bf25e482f6159b38122e4e1e9c9b85bc2ea9373d674a58013911

                SHA512

                5e2f35cc9e6d0001b039413616ad25969f1aa29cf309b3e312c60e9dda4cb707a914a7a1e74f4ff2d238ecabf7995ab7fe7961584ad6163db7957e1965d124ad

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en215727.exe

                Filesize

                175KB

                MD5

                30bf410db5f6c05f0dee763f5a0fe5b7

                SHA1

                1f4187925e1af163603a12bb116e869f8f137455

                SHA256

                d1f5b4b1ee5703bf94f9c1bee60e91463db4c28beeb7510ea7ceba9fab4b1178

                SHA512

                5edc65f5e5278af8731174dbdc70a8a5efddf1ee756df1accead04f1490b90eb05b25a1eaaba49d1f274aeff4de0bc02ec79f220ea99bc5383e2890ed4f211de

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en215727.exe

                Filesize

                175KB

                MD5

                30bf410db5f6c05f0dee763f5a0fe5b7

                SHA1

                1f4187925e1af163603a12bb116e869f8f137455

                SHA256

                d1f5b4b1ee5703bf94f9c1bee60e91463db4c28beeb7510ea7ceba9fab4b1178

                SHA512

                5edc65f5e5278af8731174dbdc70a8a5efddf1ee756df1accead04f1490b90eb05b25a1eaaba49d1f274aeff4de0bc02ec79f220ea99bc5383e2890ed4f211de

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8646.exe

                Filesize

                700KB

                MD5

                5a3ed0c8f6f67b1a56ffd8bff2bbdcee

                SHA1

                d5eae657dfca48fad98580fdf4c911ad584bb1d8

                SHA256

                0a933498e761dc8ddf310917d0ed9b45490e54e95b04f57ee5ddcd3a48bfd6fe

                SHA512

                64b5b2eadc3a9b3b24e941d37cab340f332e63b51d8bf67fcfd7de351d2ad92a9168ca541c5656b915c6328737e2a630f83c934db10bbc09aa8e15307560643e

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8646.exe

                Filesize

                700KB

                MD5

                5a3ed0c8f6f67b1a56ffd8bff2bbdcee

                SHA1

                d5eae657dfca48fad98580fdf4c911ad584bb1d8

                SHA256

                0a933498e761dc8ddf310917d0ed9b45490e54e95b04f57ee5ddcd3a48bfd6fe

                SHA512

                64b5b2eadc3a9b3b24e941d37cab340f332e63b51d8bf67fcfd7de351d2ad92a9168ca541c5656b915c6328737e2a630f83c934db10bbc09aa8e15307560643e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dvp66s72.exe

                Filesize

                358KB

                MD5

                eb5568a55e44472110bb29d46fabac16

                SHA1

                8d4bb35cad6dc03b1c3d6bd6e0be5888c12254b1

                SHA256

                9468e58dba3706e67c1c8c938739a74b7dfcd32a1cb6cbdf02a765daf7908e65

                SHA512

                3cc6fe38a6cc9a21fd8427d60a942b24684b3dc2470fe3b5b70089f5a85406a59c7c0de9df7239cd0d1953583f5508dd70d10c8fc64003235942f3ed97390bfc

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dvp66s72.exe

                Filesize

                358KB

                MD5

                eb5568a55e44472110bb29d46fabac16

                SHA1

                8d4bb35cad6dc03b1c3d6bd6e0be5888c12254b1

                SHA256

                9468e58dba3706e67c1c8c938739a74b7dfcd32a1cb6cbdf02a765daf7908e65

                SHA512

                3cc6fe38a6cc9a21fd8427d60a942b24684b3dc2470fe3b5b70089f5a85406a59c7c0de9df7239cd0d1953583f5508dd70d10c8fc64003235942f3ed97390bfc

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino9648.exe

                Filesize

                347KB

                MD5

                27a00f07804cf821b251128c8585edef

                SHA1

                340c92a8b261e37ba56205ee594cb17ed1d099b7

                SHA256

                332947b033b8c39554b4daf9d46a745b422599345328a82b7911b240cec1f629

                SHA512

                c760182ef0e79b3da17449122f7c8cf42e8850be0f64f242a1e557de074a36c1bc9b0cb102ba4449fc73850a99f5ec5e61e1d4cf4472960ea5211c28c15effe3

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino9648.exe

                Filesize

                347KB

                MD5

                27a00f07804cf821b251128c8585edef

                SHA1

                340c92a8b261e37ba56205ee594cb17ed1d099b7

                SHA256

                332947b033b8c39554b4daf9d46a745b422599345328a82b7911b240cec1f629

                SHA512

                c760182ef0e79b3da17449122f7c8cf42e8850be0f64f242a1e557de074a36c1bc9b0cb102ba4449fc73850a99f5ec5e61e1d4cf4472960ea5211c28c15effe3

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus9317.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus9317.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4737.exe

                Filesize

                300KB

                MD5

                c283569f87d06e35b7f9a534f5d29051

                SHA1

                9c2507271533b7e4b46a55493467a7f42941d3c4

                SHA256

                d7e71d96745ae6b49bef91d4b587018b3742b5d16289c16ca04b84927663accf

                SHA512

                75ae3905883cf9f600c181acc8ef58765897a2e4958ff8a16fa6c728f183ee80edf189f84a7b3fc97aef3f3d9fa08bd7f513819e54ae343ba3b54b8bf03590fc

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4737.exe

                Filesize

                300KB

                MD5

                c283569f87d06e35b7f9a534f5d29051

                SHA1

                9c2507271533b7e4b46a55493467a7f42941d3c4

                SHA256

                d7e71d96745ae6b49bef91d4b587018b3742b5d16289c16ca04b84927663accf

                SHA512

                75ae3905883cf9f600c181acc8ef58765897a2e4958ff8a16fa6c728f183ee80edf189f84a7b3fc97aef3f3d9fa08bd7f513819e54ae343ba3b54b8bf03590fc

              • memory/1252-1114-0x0000000005B70000-0x0000000005BBB000-memory.dmp

                Filesize

                300KB

              • memory/1252-228-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

                Filesize

                248KB

              • memory/1252-1125-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                Filesize

                64KB

              • memory/1252-1124-0x00000000069B0000-0x0000000006EDC000-memory.dmp

                Filesize

                5.2MB

              • memory/1252-1123-0x00000000067E0000-0x00000000069A2000-memory.dmp

                Filesize

                1.8MB

              • memory/1252-1120-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                Filesize

                64KB

              • memory/1252-1121-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                Filesize

                64KB

              • memory/1252-1122-0x0000000006670000-0x00000000066C0000-memory.dmp

                Filesize

                320KB

              • memory/1252-1119-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                Filesize

                64KB

              • memory/1252-1118-0x00000000065F0000-0x0000000006666000-memory.dmp

                Filesize

                472KB

              • memory/1252-1117-0x0000000005DA0000-0x0000000005E06000-memory.dmp

                Filesize

                408KB

              • memory/1252-1116-0x0000000005D00000-0x0000000005D92000-memory.dmp

                Filesize

                584KB

              • memory/1252-1113-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                Filesize

                64KB

              • memory/1252-1112-0x0000000005A20000-0x0000000005A5E000-memory.dmp

                Filesize

                248KB

              • memory/1252-1111-0x0000000005A00000-0x0000000005A12000-memory.dmp

                Filesize

                72KB

              • memory/1252-1110-0x00000000058C0000-0x00000000059CA000-memory.dmp

                Filesize

                1.0MB

              • memory/1252-197-0x00000000022A0000-0x00000000022E6000-memory.dmp

                Filesize

                280KB

              • memory/1252-198-0x0000000004CD0000-0x0000000004D14000-memory.dmp

                Filesize

                272KB

              • memory/1252-199-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

                Filesize

                248KB

              • memory/1252-200-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

                Filesize

                248KB

              • memory/1252-202-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

                Filesize

                248KB

              • memory/1252-204-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

                Filesize

                248KB

              • memory/1252-206-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

                Filesize

                248KB

              • memory/1252-208-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

                Filesize

                248KB

              • memory/1252-210-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

                Filesize

                248KB

              • memory/1252-212-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

                Filesize

                248KB

              • memory/1252-214-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

                Filesize

                248KB

              • memory/1252-216-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

                Filesize

                248KB

              • memory/1252-218-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

                Filesize

                248KB

              • memory/1252-220-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

                Filesize

                248KB

              • memory/1252-222-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

                Filesize

                248KB

              • memory/1252-224-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

                Filesize

                248KB

              • memory/1252-226-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

                Filesize

                248KB

              • memory/1252-1109-0x00000000052A0000-0x00000000058A6000-memory.dmp

                Filesize

                6.0MB

              • memory/1252-230-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

                Filesize

                248KB

              • memory/1252-232-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

                Filesize

                248KB

              • memory/1252-269-0x00000000007F0000-0x000000000083B000-memory.dmp

                Filesize

                300KB

              • memory/1252-272-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                Filesize

                64KB

              • memory/1252-275-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                Filesize

                64KB

              • memory/1252-271-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-176-0x0000000004C30000-0x0000000004C42000-memory.dmp

                Filesize

                72KB

              • memory/2056-158-0x0000000004C30000-0x0000000004C48000-memory.dmp

                Filesize

                96KB

              • memory/2056-170-0x0000000004C30000-0x0000000004C42000-memory.dmp

                Filesize

                72KB

              • memory/2056-192-0x0000000000400000-0x000000000070E000-memory.dmp

                Filesize

                3.1MB

              • memory/2056-172-0x0000000004C30000-0x0000000004C42000-memory.dmp

                Filesize

                72KB

              • memory/2056-166-0x0000000004C30000-0x0000000004C42000-memory.dmp

                Filesize

                72KB

              • memory/2056-189-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-188-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-187-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-186-0x0000000004C30000-0x0000000004C42000-memory.dmp

                Filesize

                72KB

              • memory/2056-184-0x0000000004C30000-0x0000000004C42000-memory.dmp

                Filesize

                72KB

              • memory/2056-182-0x0000000004C30000-0x0000000004C42000-memory.dmp

                Filesize

                72KB

              • memory/2056-168-0x0000000004C30000-0x0000000004C42000-memory.dmp

                Filesize

                72KB

              • memory/2056-180-0x0000000004C30000-0x0000000004C42000-memory.dmp

                Filesize

                72KB

              • memory/2056-190-0x0000000000400000-0x000000000070E000-memory.dmp

                Filesize

                3.1MB

              • memory/2056-174-0x0000000004C30000-0x0000000004C42000-memory.dmp

                Filesize

                72KB

              • memory/2056-164-0x0000000004C30000-0x0000000004C42000-memory.dmp

                Filesize

                72KB

              • memory/2056-162-0x0000000004C30000-0x0000000004C42000-memory.dmp

                Filesize

                72KB

              • memory/2056-155-0x00000000001D0000-0x00000000001FD000-memory.dmp

                Filesize

                180KB

              • memory/2056-156-0x0000000002410000-0x000000000242A000-memory.dmp

                Filesize

                104KB

              • memory/2056-157-0x0000000004DA0000-0x000000000529E000-memory.dmp

                Filesize

                5.0MB

              • memory/2056-160-0x0000000004C30000-0x0000000004C42000-memory.dmp

                Filesize

                72KB

              • memory/2056-159-0x0000000004C30000-0x0000000004C42000-memory.dmp

                Filesize

                72KB

              • memory/2056-178-0x0000000004C30000-0x0000000004C42000-memory.dmp

                Filesize

                72KB

              • memory/2136-1133-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

                Filesize

                64KB

              • memory/2136-1132-0x0000000004CB0000-0x0000000004CFB000-memory.dmp

                Filesize

                300KB

              • memory/2136-1131-0x0000000000270000-0x00000000002A2000-memory.dmp

                Filesize

                200KB

              • memory/3136-149-0x0000000000C20000-0x0000000000C2A000-memory.dmp

                Filesize

                40KB