Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-03-2023 07:39

General

  • Target

    c050da5a654800e6a07e09b3048063ea31746a48a26748a5bcfb4037b2fb6a14.exe

  • Size

    1011KB

  • MD5

    8069eaea95244995de36a75c78bd2b24

  • SHA1

    2616b9dd7e561abe0a7cc7bd66ffe7e6e957b610

  • SHA256

    c050da5a654800e6a07e09b3048063ea31746a48a26748a5bcfb4037b2fb6a14

  • SHA512

    f56777359b3123d5c6073e2c1798e6d7a71b7ffc786464df5c59999279cc0ef850844d8322bbcc9cc67fe1b9e26a79f063f83390e1476218545cc78c060166ea

  • SSDEEP

    12288:+Mrry906vdU5TvUflNnxHm3GDZs23LOcQ9Ctfcm7BDZlIgiuOMNMxuNjDEEsi9h1:1yD7nGsbrQ9Ctkm1zI78Mxulpsi9h6m

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

roxi

C2

193.233.20.31:4125

Attributes
  • auth_value

    9d8be78c896acc3cf8b8a6637a221376

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c050da5a654800e6a07e09b3048063ea31746a48a26748a5bcfb4037b2fb6a14.exe
    "C:\Users\Admin\AppData\Local\Temp\c050da5a654800e6a07e09b3048063ea31746a48a26748a5bcfb4037b2fb6a14.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino0022.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino0022.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1544
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino3895.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino3895.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1028
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino4201.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino4201.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1364
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus3148.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus3148.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1704
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7364.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7364.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4208
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 1084
              6⤵
              • Program crash
              PID:4268
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dRg15s31.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dRg15s31.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5092
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 1736
            5⤵
            • Program crash
            PID:5080
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en114934.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en114934.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4256
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge692513.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge692513.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2088
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:876
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3100
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3352
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:1104
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:4892
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:5028
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4684
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:4740
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:348
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4208 -ip 4208
                1⤵
                  PID:3076
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5092 -ip 5092
                  1⤵
                    PID:2028
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:4224
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:2632

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge692513.exe

                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge692513.exe

                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino0022.exe

                    Filesize

                    829KB

                    MD5

                    12b9ae40dd74ecd590a6a9ed4cf909de

                    SHA1

                    ebcc4c58e4e7dcc13f34c962eb23b4f390ef96e4

                    SHA256

                    0e18e2c4f4ce09bf59878515fb93c24e9034c5b7d11c5a298ffaa0072633d0a1

                    SHA512

                    331442d575f475763d745d3a7a93e7a9b9f6a905b23e48195320485c7f04f6f399afe902b925b40e9e0d7bf7c934b40754849ba3a86ca0eec365ec736879d722

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino0022.exe

                    Filesize

                    829KB

                    MD5

                    12b9ae40dd74ecd590a6a9ed4cf909de

                    SHA1

                    ebcc4c58e4e7dcc13f34c962eb23b4f390ef96e4

                    SHA256

                    0e18e2c4f4ce09bf59878515fb93c24e9034c5b7d11c5a298ffaa0072633d0a1

                    SHA512

                    331442d575f475763d745d3a7a93e7a9b9f6a905b23e48195320485c7f04f6f399afe902b925b40e9e0d7bf7c934b40754849ba3a86ca0eec365ec736879d722

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en114934.exe

                    Filesize

                    175KB

                    MD5

                    30bf410db5f6c05f0dee763f5a0fe5b7

                    SHA1

                    1f4187925e1af163603a12bb116e869f8f137455

                    SHA256

                    d1f5b4b1ee5703bf94f9c1bee60e91463db4c28beeb7510ea7ceba9fab4b1178

                    SHA512

                    5edc65f5e5278af8731174dbdc70a8a5efddf1ee756df1accead04f1490b90eb05b25a1eaaba49d1f274aeff4de0bc02ec79f220ea99bc5383e2890ed4f211de

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en114934.exe

                    Filesize

                    175KB

                    MD5

                    30bf410db5f6c05f0dee763f5a0fe5b7

                    SHA1

                    1f4187925e1af163603a12bb116e869f8f137455

                    SHA256

                    d1f5b4b1ee5703bf94f9c1bee60e91463db4c28beeb7510ea7ceba9fab4b1178

                    SHA512

                    5edc65f5e5278af8731174dbdc70a8a5efddf1ee756df1accead04f1490b90eb05b25a1eaaba49d1f274aeff4de0bc02ec79f220ea99bc5383e2890ed4f211de

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino3895.exe

                    Filesize

                    686KB

                    MD5

                    af4821baa44d3f128f374b2b0e9f6a0d

                    SHA1

                    3a51cf21ef9f1683c70ee63209c97cbb17e152fe

                    SHA256

                    98395ae9a2a39e6793122a02887987eb223c9e05a270c843dab7f002ffea4fc4

                    SHA512

                    70a8777810bdc1064dc0b6cac69c382e3747bc554b35fb848bd54a7df4ca5611e521b4d3e022b60a93c27b0a645108c27f7ae785c1e09638990819e86de14069

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino3895.exe

                    Filesize

                    686KB

                    MD5

                    af4821baa44d3f128f374b2b0e9f6a0d

                    SHA1

                    3a51cf21ef9f1683c70ee63209c97cbb17e152fe

                    SHA256

                    98395ae9a2a39e6793122a02887987eb223c9e05a270c843dab7f002ffea4fc4

                    SHA512

                    70a8777810bdc1064dc0b6cac69c382e3747bc554b35fb848bd54a7df4ca5611e521b4d3e022b60a93c27b0a645108c27f7ae785c1e09638990819e86de14069

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dRg15s31.exe

                    Filesize

                    355KB

                    MD5

                    1cdc3e2db29ed156eedc9eaa11ac286d

                    SHA1

                    e8aee9f324c2367807f4472bc0339b3f437fd9e4

                    SHA256

                    15c9170bbdd9c23c3829b98f90d5673489f2c138a3857e39c5fe8d9b02351faa

                    SHA512

                    4ed71c095b8fffd5bad4418a74a3460a8c167dc840694ce0a754f26655cc4814f38460f71a12403b570f0d0702e7dee7b612bdf3dcaa97c83924f5f77476f06b

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dRg15s31.exe

                    Filesize

                    355KB

                    MD5

                    1cdc3e2db29ed156eedc9eaa11ac286d

                    SHA1

                    e8aee9f324c2367807f4472bc0339b3f437fd9e4

                    SHA256

                    15c9170bbdd9c23c3829b98f90d5673489f2c138a3857e39c5fe8d9b02351faa

                    SHA512

                    4ed71c095b8fffd5bad4418a74a3460a8c167dc840694ce0a754f26655cc4814f38460f71a12403b570f0d0702e7dee7b612bdf3dcaa97c83924f5f77476f06b

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino4201.exe

                    Filesize

                    340KB

                    MD5

                    1a52c94abede3ea01c78f6ed01b3499f

                    SHA1

                    3a72e622d60db17095b941f2550da1fbaf633286

                    SHA256

                    012d9dd6738b1c4d897177dbe563aa39a5a0dee34092cf5014be96d9d7b6ba89

                    SHA512

                    233fa845ca081003405ed0a3e9298c67aee397b1183532e47ca03d1a2395cffe5bb8bfca2aaca47ab95b402b56842f958bf653081285578ebe2460487bcb0efb

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino4201.exe

                    Filesize

                    340KB

                    MD5

                    1a52c94abede3ea01c78f6ed01b3499f

                    SHA1

                    3a72e622d60db17095b941f2550da1fbaf633286

                    SHA256

                    012d9dd6738b1c4d897177dbe563aa39a5a0dee34092cf5014be96d9d7b6ba89

                    SHA512

                    233fa845ca081003405ed0a3e9298c67aee397b1183532e47ca03d1a2395cffe5bb8bfca2aaca47ab95b402b56842f958bf653081285578ebe2460487bcb0efb

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus3148.exe

                    Filesize

                    11KB

                    MD5

                    7e93bacbbc33e6652e147e7fe07572a0

                    SHA1

                    421a7167da01c8da4dc4d5234ca3dd84e319e762

                    SHA256

                    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                    SHA512

                    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus3148.exe

                    Filesize

                    11KB

                    MD5

                    7e93bacbbc33e6652e147e7fe07572a0

                    SHA1

                    421a7167da01c8da4dc4d5234ca3dd84e319e762

                    SHA256

                    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                    SHA512

                    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7364.exe

                    Filesize

                    298KB

                    MD5

                    e90fd255917ddd0ded2c983afceb650e

                    SHA1

                    b76442bb99789808344e5be367e2331761da37e8

                    SHA256

                    ec4a4bb33818f86635c3ea41658030a2156ff1475c46cee8fe15d57dc306bbc6

                    SHA512

                    15dbbcef9878fa7ffce61a2fa272d2ba1f13e9bad1f46d7b75c1f216de05876e3504f0cbae18ba834e9d9b77670747be92ff2521e1eff5c12c78dc0aab957e3f

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7364.exe

                    Filesize

                    298KB

                    MD5

                    e90fd255917ddd0ded2c983afceb650e

                    SHA1

                    b76442bb99789808344e5be367e2331761da37e8

                    SHA256

                    ec4a4bb33818f86635c3ea41658030a2156ff1475c46cee8fe15d57dc306bbc6

                    SHA512

                    15dbbcef9878fa7ffce61a2fa272d2ba1f13e9bad1f46d7b75c1f216de05876e3504f0cbae18ba834e9d9b77670747be92ff2521e1eff5c12c78dc0aab957e3f

                  • memory/1704-161-0x0000000000D60000-0x0000000000D6A000-memory.dmp

                    Filesize

                    40KB

                  • memory/4208-181-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4208-202-0x00000000073A0000-0x00000000073B0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4208-177-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4208-183-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4208-185-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4208-187-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4208-189-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4208-191-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4208-193-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4208-195-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4208-197-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4208-199-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4208-200-0x0000000000400000-0x0000000002B79000-memory.dmp

                    Filesize

                    39.5MB

                  • memory/4208-179-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4208-203-0x00000000073A0000-0x00000000073B0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4208-204-0x00000000073A0000-0x00000000073B0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4208-205-0x0000000000400000-0x0000000002B79000-memory.dmp

                    Filesize

                    39.5MB

                  • memory/4208-175-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4208-173-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4208-171-0x00000000073A0000-0x00000000073B0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4208-172-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4208-169-0x00000000073A0000-0x00000000073B0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4208-170-0x00000000073A0000-0x00000000073B0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4208-168-0x0000000002C60000-0x0000000002C8D000-memory.dmp

                    Filesize

                    180KB

                  • memory/4208-167-0x00000000073B0000-0x0000000007954000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/4256-1142-0x00000000052D0000-0x00000000052E0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4256-1141-0x0000000000A00000-0x0000000000A32000-memory.dmp

                    Filesize

                    200KB

                  • memory/5092-213-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5092-227-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5092-229-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5092-231-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5092-233-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5092-235-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5092-237-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5092-239-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5092-241-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5092-243-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5092-245-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5092-247-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5092-1120-0x0000000007950000-0x0000000007F68000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/5092-1121-0x0000000007F70000-0x000000000807A000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/5092-1122-0x00000000080B0000-0x00000000080C2000-memory.dmp

                    Filesize

                    72KB

                  • memory/5092-1123-0x00000000080D0000-0x000000000810C000-memory.dmp

                    Filesize

                    240KB

                  • memory/5092-1124-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5092-1126-0x00000000083C0000-0x0000000008452000-memory.dmp

                    Filesize

                    584KB

                  • memory/5092-1127-0x0000000008460000-0x00000000084C6000-memory.dmp

                    Filesize

                    408KB

                  • memory/5092-1128-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5092-1129-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5092-1130-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5092-1131-0x0000000008DC0000-0x0000000008F82000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/5092-1132-0x0000000008FB0000-0x00000000094DC000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/5092-1133-0x0000000009600000-0x0000000009676000-memory.dmp

                    Filesize

                    472KB

                  • memory/5092-1134-0x00000000096A0000-0x00000000096F0000-memory.dmp

                    Filesize

                    320KB

                  • memory/5092-225-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5092-223-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5092-221-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5092-219-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5092-215-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5092-217-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5092-214-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/5092-212-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5092-211-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5092-210-0x0000000002B90000-0x0000000002BDB000-memory.dmp

                    Filesize

                    300KB

                  • memory/5092-1136-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB