Analysis

  • max time kernel
    125s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/03/2023, 12:50

General

  • Target

    30d0b7378fc10fb319f9ef062b9fa5a0c6dfd782d64d2cb9b1817ef8b3cf99df.exe

  • Size

    1010KB

  • MD5

    1d083e73314393adf861be89df1ae52f

  • SHA1

    6d577ce05f1ee5c45b4c6d3778ea8224de9e938a

  • SHA256

    30d0b7378fc10fb319f9ef062b9fa5a0c6dfd782d64d2cb9b1817ef8b3cf99df

  • SHA512

    54c2d1c7ad58cd2cf5e2b32029cf829ef43df60f7a8560bdbe00bf8adbd4ebe26bc1566662d9084c778f6acf2de661eba05ff143b54d16f2c6f0bfd65f69253f

  • SSDEEP

    24576:VyiHajhfz8cstGysQEbStmQLdObjUJ6luaSpL80:wYU78Lvd9DMn46yL8

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

nerv

C2

193.233.20.32:4125

Attributes
  • auth_value

    e383fe5545fbf9f612ad8eee12544595

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30d0b7378fc10fb319f9ef062b9fa5a0c6dfd782d64d2cb9b1817ef8b3cf99df.exe
    "C:\Users\Admin\AppData\Local\Temp\30d0b7378fc10fb319f9ef062b9fa5a0c6dfd782d64d2cb9b1817ef8b3cf99df.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3924
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino5807.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino5807.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3372
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino5565.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino5565.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1508
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino3446.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino3446.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2744
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus8614.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus8614.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1176
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0395.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0395.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4724
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 1088
              6⤵
              • Program crash
              PID:1648
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dFj62s73.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dFj62s73.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4992
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 1332
            5⤵
            • Program crash
            PID:4488
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en490542.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en490542.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2212
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge075158.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge075158.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4780
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1456
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3144
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1580
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4676
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:4716
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:4516
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:1200
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:3312
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:4340
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4724 -ip 4724
                1⤵
                  PID:2440
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4992 -ip 4992
                  1⤵
                    PID:3556
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:2848
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:5076

                  Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                          Filesize

                          226KB

                          MD5

                          8627ebe3777cc777ed2a14b907162224

                          SHA1

                          06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                          SHA256

                          319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                          SHA512

                          9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                        • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                          Filesize

                          226KB

                          MD5

                          8627ebe3777cc777ed2a14b907162224

                          SHA1

                          06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                          SHA256

                          319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                          SHA512

                          9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                        • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                          Filesize

                          226KB

                          MD5

                          8627ebe3777cc777ed2a14b907162224

                          SHA1

                          06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                          SHA256

                          319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                          SHA512

                          9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                        • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                          Filesize

                          226KB

                          MD5

                          8627ebe3777cc777ed2a14b907162224

                          SHA1

                          06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                          SHA256

                          319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                          SHA512

                          9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                        • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                          Filesize

                          226KB

                          MD5

                          8627ebe3777cc777ed2a14b907162224

                          SHA1

                          06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                          SHA256

                          319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                          SHA512

                          9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge075158.exe

                          Filesize

                          226KB

                          MD5

                          8627ebe3777cc777ed2a14b907162224

                          SHA1

                          06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                          SHA256

                          319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                          SHA512

                          9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge075158.exe

                          Filesize

                          226KB

                          MD5

                          8627ebe3777cc777ed2a14b907162224

                          SHA1

                          06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                          SHA256

                          319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                          SHA512

                          9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino5807.exe

                          Filesize

                          828KB

                          MD5

                          5a59f5204bf05c298df2dbd760bfcfae

                          SHA1

                          873b130615f3f28b536060a52fa51b5cdea7ce12

                          SHA256

                          ebe49c4a6762a69b63f4c99d710e791ea1683daee4823a045ab6092c48012dcd

                          SHA512

                          796e26c9416474aaaf1de9656c0c0cf33db0447a6d15a5b734cf72c5f6c7cccea134c63e9c6aeda81b406c20bafd3f5db3db18e6e295eeb208f89457b455fa4d

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino5807.exe

                          Filesize

                          828KB

                          MD5

                          5a59f5204bf05c298df2dbd760bfcfae

                          SHA1

                          873b130615f3f28b536060a52fa51b5cdea7ce12

                          SHA256

                          ebe49c4a6762a69b63f4c99d710e791ea1683daee4823a045ab6092c48012dcd

                          SHA512

                          796e26c9416474aaaf1de9656c0c0cf33db0447a6d15a5b734cf72c5f6c7cccea134c63e9c6aeda81b406c20bafd3f5db3db18e6e295eeb208f89457b455fa4d

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en490542.exe

                          Filesize

                          175KB

                          MD5

                          df39317620e311ee6f800aceab8f8fbb

                          SHA1

                          3770f429007247a25c2c0c3508085e3f3c0da4dd

                          SHA256

                          28fc40298727a89753cd8d8642f33fc2a802a6755feac82db7652888cc565474

                          SHA512

                          ed55b31668fa23d4d803b83c2dd466187963fa9f22d64d628fec6767ab16a7a6cca47508d5d815c51b71ec395c626785471d7168b96e997689db4bcb8a8973d2

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en490542.exe

                          Filesize

                          175KB

                          MD5

                          df39317620e311ee6f800aceab8f8fbb

                          SHA1

                          3770f429007247a25c2c0c3508085e3f3c0da4dd

                          SHA256

                          28fc40298727a89753cd8d8642f33fc2a802a6755feac82db7652888cc565474

                          SHA512

                          ed55b31668fa23d4d803b83c2dd466187963fa9f22d64d628fec6767ab16a7a6cca47508d5d815c51b71ec395c626785471d7168b96e997689db4bcb8a8973d2

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino5565.exe

                          Filesize

                          686KB

                          MD5

                          60547834e05b56e4c158b063b4e98e72

                          SHA1

                          88b0e6521dac6cc48bd0a2c5439da7ed92d1a75d

                          SHA256

                          14ac0fd99835877bce38b5ae40ff5ab04f3c8ce6f7ce11e756a015766f194b5d

                          SHA512

                          944aac6ad41333348e08e470e633c9d7d6b42e8d954083c9ecc7377c3993b51db56974c078efe8c264fa7a10a02d9d0c138c69b0fcd0aeb6467861020f456f3f

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino5565.exe

                          Filesize

                          686KB

                          MD5

                          60547834e05b56e4c158b063b4e98e72

                          SHA1

                          88b0e6521dac6cc48bd0a2c5439da7ed92d1a75d

                          SHA256

                          14ac0fd99835877bce38b5ae40ff5ab04f3c8ce6f7ce11e756a015766f194b5d

                          SHA512

                          944aac6ad41333348e08e470e633c9d7d6b42e8d954083c9ecc7377c3993b51db56974c078efe8c264fa7a10a02d9d0c138c69b0fcd0aeb6467861020f456f3f

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dFj62s73.exe

                          Filesize

                          356KB

                          MD5

                          546e366e9659d094c30ab88f31ac8d00

                          SHA1

                          03d339c999132eaef0a1060beb69405037143437

                          SHA256

                          845041278d43d8b2c06a848a8fb86b22ecd4617648c717f0411b3c8c5feeacd5

                          SHA512

                          d530d9d6a1542abddd656a76dca71250ab092b667be67ceb7e3aba179040cd8fd702ea1e2d6569aa539652f0da96a61d2a72a9fd9edc7f954f372582787247de

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dFj62s73.exe

                          Filesize

                          356KB

                          MD5

                          546e366e9659d094c30ab88f31ac8d00

                          SHA1

                          03d339c999132eaef0a1060beb69405037143437

                          SHA256

                          845041278d43d8b2c06a848a8fb86b22ecd4617648c717f0411b3c8c5feeacd5

                          SHA512

                          d530d9d6a1542abddd656a76dca71250ab092b667be67ceb7e3aba179040cd8fd702ea1e2d6569aa539652f0da96a61d2a72a9fd9edc7f954f372582787247de

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino3446.exe

                          Filesize

                          340KB

                          MD5

                          e74358ac450a87c5b26dfe4b9ab16148

                          SHA1

                          69264a486d3d0a22bfdf2a0e2e51cf4fa9f8d33c

                          SHA256

                          8900cc026b5eaf08edecd48a8beffa37e56b3248df7b5d8c70e4540924d114d0

                          SHA512

                          aef97b09191e8592d1a8e1f57983f4f18191889a263357ada130f0af184186590d5ae8e3355f2f8a3379551598983375f1ac8d5f11360c7a9b6301c8eda15c0b

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino3446.exe

                          Filesize

                          340KB

                          MD5

                          e74358ac450a87c5b26dfe4b9ab16148

                          SHA1

                          69264a486d3d0a22bfdf2a0e2e51cf4fa9f8d33c

                          SHA256

                          8900cc026b5eaf08edecd48a8beffa37e56b3248df7b5d8c70e4540924d114d0

                          SHA512

                          aef97b09191e8592d1a8e1f57983f4f18191889a263357ada130f0af184186590d5ae8e3355f2f8a3379551598983375f1ac8d5f11360c7a9b6301c8eda15c0b

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus8614.exe

                          Filesize

                          11KB

                          MD5

                          7e93bacbbc33e6652e147e7fe07572a0

                          SHA1

                          421a7167da01c8da4dc4d5234ca3dd84e319e762

                          SHA256

                          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                          SHA512

                          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus8614.exe

                          Filesize

                          11KB

                          MD5

                          7e93bacbbc33e6652e147e7fe07572a0

                          SHA1

                          421a7167da01c8da4dc4d5234ca3dd84e319e762

                          SHA256

                          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                          SHA512

                          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0395.exe

                          Filesize

                          298KB

                          MD5

                          5f3e6e9f1e9c0184c946af19c2f30248

                          SHA1

                          4a0db757878c376ca14245728bfc560754d0f5c0

                          SHA256

                          9867821c32a036a13abd190fc793ec2707645a14fee472601ce4d5680bd141eb

                          SHA512

                          cde693d83f2e908ea055565b1da64d63586f75c63492a0e7a0d09b791755bcd70b636e683b22b070b93978e035328a2fd7ffe2fc77bc2ee53560bd5daa6fefeb

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0395.exe

                          Filesize

                          298KB

                          MD5

                          5f3e6e9f1e9c0184c946af19c2f30248

                          SHA1

                          4a0db757878c376ca14245728bfc560754d0f5c0

                          SHA256

                          9867821c32a036a13abd190fc793ec2707645a14fee472601ce4d5680bd141eb

                          SHA512

                          cde693d83f2e908ea055565b1da64d63586f75c63492a0e7a0d09b791755bcd70b636e683b22b070b93978e035328a2fd7ffe2fc77bc2ee53560bd5daa6fefeb

                        • memory/1176-161-0x0000000000950000-0x000000000095A000-memory.dmp

                          Filesize

                          40KB

                        • memory/2212-1142-0x0000000005330000-0x0000000005340000-memory.dmp

                          Filesize

                          64KB

                        • memory/2212-1141-0x00000000009F0000-0x0000000000A22000-memory.dmp

                          Filesize

                          200KB

                        • memory/4724-181-0x0000000007220000-0x0000000007232000-memory.dmp

                          Filesize

                          72KB

                        • memory/4724-203-0x0000000007340000-0x0000000007350000-memory.dmp

                          Filesize

                          64KB

                        • memory/4724-185-0x0000000007220000-0x0000000007232000-memory.dmp

                          Filesize

                          72KB

                        • memory/4724-187-0x0000000007220000-0x0000000007232000-memory.dmp

                          Filesize

                          72KB

                        • memory/4724-189-0x0000000007220000-0x0000000007232000-memory.dmp

                          Filesize

                          72KB

                        • memory/4724-191-0x0000000007220000-0x0000000007232000-memory.dmp

                          Filesize

                          72KB

                        • memory/4724-193-0x0000000007220000-0x0000000007232000-memory.dmp

                          Filesize

                          72KB

                        • memory/4724-195-0x0000000007220000-0x0000000007232000-memory.dmp

                          Filesize

                          72KB

                        • memory/4724-197-0x0000000007220000-0x0000000007232000-memory.dmp

                          Filesize

                          72KB

                        • memory/4724-199-0x0000000007220000-0x0000000007232000-memory.dmp

                          Filesize

                          72KB

                        • memory/4724-200-0x0000000000400000-0x0000000002B79000-memory.dmp

                          Filesize

                          39.5MB

                        • memory/4724-202-0x0000000007340000-0x0000000007350000-memory.dmp

                          Filesize

                          64KB

                        • memory/4724-204-0x0000000007340000-0x0000000007350000-memory.dmp

                          Filesize

                          64KB

                        • memory/4724-183-0x0000000007220000-0x0000000007232000-memory.dmp

                          Filesize

                          72KB

                        • memory/4724-205-0x0000000000400000-0x0000000002B79000-memory.dmp

                          Filesize

                          39.5MB

                        • memory/4724-179-0x0000000007220000-0x0000000007232000-memory.dmp

                          Filesize

                          72KB

                        • memory/4724-177-0x0000000007220000-0x0000000007232000-memory.dmp

                          Filesize

                          72KB

                        • memory/4724-175-0x0000000007220000-0x0000000007232000-memory.dmp

                          Filesize

                          72KB

                        • memory/4724-173-0x0000000007220000-0x0000000007232000-memory.dmp

                          Filesize

                          72KB

                        • memory/4724-172-0x0000000007220000-0x0000000007232000-memory.dmp

                          Filesize

                          72KB

                        • memory/4724-171-0x0000000007340000-0x0000000007350000-memory.dmp

                          Filesize

                          64KB

                        • memory/4724-170-0x0000000007340000-0x0000000007350000-memory.dmp

                          Filesize

                          64KB

                        • memory/4724-169-0x0000000007340000-0x0000000007350000-memory.dmp

                          Filesize

                          64KB

                        • memory/4724-168-0x0000000002B80000-0x0000000002BAD000-memory.dmp

                          Filesize

                          180KB

                        • memory/4724-167-0x0000000007350000-0x00000000078F4000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/4992-213-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4992-228-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4992-230-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4992-232-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4992-234-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4992-236-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4992-238-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4992-240-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4992-242-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4992-244-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4992-246-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4992-248-0x0000000007350000-0x0000000007360000-memory.dmp

                          Filesize

                          64KB

                        • memory/4992-1120-0x0000000007910000-0x0000000007F28000-memory.dmp

                          Filesize

                          6.1MB

                        • memory/4992-1121-0x0000000007F70000-0x000000000807A000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/4992-1122-0x00000000080B0000-0x00000000080C2000-memory.dmp

                          Filesize

                          72KB

                        • memory/4992-1123-0x00000000080D0000-0x000000000810C000-memory.dmp

                          Filesize

                          240KB

                        • memory/4992-1124-0x0000000007350000-0x0000000007360000-memory.dmp

                          Filesize

                          64KB

                        • memory/4992-1126-0x00000000083C0000-0x0000000008426000-memory.dmp

                          Filesize

                          408KB

                        • memory/4992-1127-0x0000000008BD0000-0x0000000008C62000-memory.dmp

                          Filesize

                          584KB

                        • memory/4992-1128-0x0000000007350000-0x0000000007360000-memory.dmp

                          Filesize

                          64KB

                        • memory/4992-1129-0x0000000007350000-0x0000000007360000-memory.dmp

                          Filesize

                          64KB

                        • memory/4992-1130-0x0000000007350000-0x0000000007360000-memory.dmp

                          Filesize

                          64KB

                        • memory/4992-1131-0x0000000004A70000-0x0000000004AE6000-memory.dmp

                          Filesize

                          472KB

                        • memory/4992-1132-0x000000000A070000-0x000000000A0C0000-memory.dmp

                          Filesize

                          320KB

                        • memory/4992-1133-0x000000000A0F0000-0x000000000A2B2000-memory.dmp

                          Filesize

                          1.8MB

                        • memory/4992-1134-0x000000000A2C0000-0x000000000A7EC000-memory.dmp

                          Filesize

                          5.2MB

                        • memory/4992-226-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4992-224-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4992-222-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4992-220-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4992-218-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4992-216-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4992-214-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4992-212-0x0000000007350000-0x0000000007360000-memory.dmp

                          Filesize

                          64KB

                        • memory/4992-211-0x0000000007350000-0x0000000007360000-memory.dmp

                          Filesize

                          64KB

                        • memory/4992-210-0x0000000002B90000-0x0000000002BDB000-memory.dmp

                          Filesize

                          300KB

                        • memory/4992-1135-0x0000000007350000-0x0000000007360000-memory.dmp

                          Filesize

                          64KB