Analysis

  • max time kernel
    93s
  • max time network
    121s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 19:23

General

  • Target

    6b0fa5869c427e311eb0c99bba4a8b95bb41de73ca18d350b4d5078f30ddb9e2.exe

  • Size

    1.0MB

  • MD5

    b8f0732ba8a7e7c9b543b05d5a020fbd

  • SHA1

    1588310df148dde870e7040d75337e4744349883

  • SHA256

    6b0fa5869c427e311eb0c99bba4a8b95bb41de73ca18d350b4d5078f30ddb9e2

  • SHA512

    655e4e8f2631be4c9eb5196a11a3edb1142f23c035575cf6bfa7c2b25fe3110d368ba84d74be41f1f31a2acc97559ddcec38f5f0164557ee3c7bb35cd8e2f8f2

  • SSDEEP

    24576:SyHpIMQaeEBrgEMcEmrgCN8PX+OkmMueV2HVotBTZQ:5oa1RVEmr2PE6eW+Z

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

renta

C2

176.113.115.145:4125

Attributes
  • auth_value

    359596fd5b36e9925ade4d9a1846bafb

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b0fa5869c427e311eb0c99bba4a8b95bb41de73ca18d350b4d5078f30ddb9e2.exe
    "C:\Users\Admin\AppData\Local\Temp\6b0fa5869c427e311eb0c99bba4a8b95bb41de73ca18d350b4d5078f30ddb9e2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4132
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina6445.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina6445.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4296
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1178.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1178.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1740
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina7506.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina7506.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1744
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu027736.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu027736.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2096
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor3770.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor3770.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4460
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dMq64s43.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dMq64s43.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3964
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en436563.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en436563.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4688
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge226369.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge226369.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4696
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4356
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3028
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3412
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3336
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:5060
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:5056
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:396
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:5064
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:4972
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:4920

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                d5cebe0b7804641b13f07c48b23c74ee

                SHA1

                20670b6638e6807a2d3fd9e103365a4a5ec37868

                SHA256

                88ff20644d39fbfa9cc624147c0503a5fa35aaed9d8c094ecd287733edc09cba

                SHA512

                aa8675d1c082f48d7c6c1eccee53233e867188251d9a8c0a72a93d29433dca664dcb8d9da92c8c1e8bda97582226a1f953acc0300766d28d14176513b57b37ca

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                d5cebe0b7804641b13f07c48b23c74ee

                SHA1

                20670b6638e6807a2d3fd9e103365a4a5ec37868

                SHA256

                88ff20644d39fbfa9cc624147c0503a5fa35aaed9d8c094ecd287733edc09cba

                SHA512

                aa8675d1c082f48d7c6c1eccee53233e867188251d9a8c0a72a93d29433dca664dcb8d9da92c8c1e8bda97582226a1f953acc0300766d28d14176513b57b37ca

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                d5cebe0b7804641b13f07c48b23c74ee

                SHA1

                20670b6638e6807a2d3fd9e103365a4a5ec37868

                SHA256

                88ff20644d39fbfa9cc624147c0503a5fa35aaed9d8c094ecd287733edc09cba

                SHA512

                aa8675d1c082f48d7c6c1eccee53233e867188251d9a8c0a72a93d29433dca664dcb8d9da92c8c1e8bda97582226a1f953acc0300766d28d14176513b57b37ca

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                d5cebe0b7804641b13f07c48b23c74ee

                SHA1

                20670b6638e6807a2d3fd9e103365a4a5ec37868

                SHA256

                88ff20644d39fbfa9cc624147c0503a5fa35aaed9d8c094ecd287733edc09cba

                SHA512

                aa8675d1c082f48d7c6c1eccee53233e867188251d9a8c0a72a93d29433dca664dcb8d9da92c8c1e8bda97582226a1f953acc0300766d28d14176513b57b37ca

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge226369.exe

                Filesize

                227KB

                MD5

                d5cebe0b7804641b13f07c48b23c74ee

                SHA1

                20670b6638e6807a2d3fd9e103365a4a5ec37868

                SHA256

                88ff20644d39fbfa9cc624147c0503a5fa35aaed9d8c094ecd287733edc09cba

                SHA512

                aa8675d1c082f48d7c6c1eccee53233e867188251d9a8c0a72a93d29433dca664dcb8d9da92c8c1e8bda97582226a1f953acc0300766d28d14176513b57b37ca

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge226369.exe

                Filesize

                227KB

                MD5

                d5cebe0b7804641b13f07c48b23c74ee

                SHA1

                20670b6638e6807a2d3fd9e103365a4a5ec37868

                SHA256

                88ff20644d39fbfa9cc624147c0503a5fa35aaed9d8c094ecd287733edc09cba

                SHA512

                aa8675d1c082f48d7c6c1eccee53233e867188251d9a8c0a72a93d29433dca664dcb8d9da92c8c1e8bda97582226a1f953acc0300766d28d14176513b57b37ca

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina6445.exe

                Filesize

                857KB

                MD5

                140b342fc2bf4dada8837613d84a43b6

                SHA1

                aec1d6e58548934edcf99eaa0abba4b19147326f

                SHA256

                cd1d24e35d8de035b5ab277cd9d15a902ad98e1512a0dc3f198010089e323fa7

                SHA512

                a0c5ef8452f5dee322fa70397c1d2b2856fab4bae9ddc38725c6e42bbfc3f3e2543968b17bbba8ce234bc4a8853e81639dd0e5ce6bd3d16d762dd75b3ba0e603

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina6445.exe

                Filesize

                857KB

                MD5

                140b342fc2bf4dada8837613d84a43b6

                SHA1

                aec1d6e58548934edcf99eaa0abba4b19147326f

                SHA256

                cd1d24e35d8de035b5ab277cd9d15a902ad98e1512a0dc3f198010089e323fa7

                SHA512

                a0c5ef8452f5dee322fa70397c1d2b2856fab4bae9ddc38725c6e42bbfc3f3e2543968b17bbba8ce234bc4a8853e81639dd0e5ce6bd3d16d762dd75b3ba0e603

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en436563.exe

                Filesize

                175KB

                MD5

                f442159f309e9db40f9911f184977133

                SHA1

                01f4d3c1b9a4f03254cf7ba4fc614940fa9ed48b

                SHA256

                8bc2139a73abfbdd440cd444ec4b7a0370dda6bd9174fb240cd3388268aac802

                SHA512

                a8c4e0b2a539c3d97259e60d9a0e793bda87139d6d807b677493f70a3c13c55b02a0046a22fe0608d8ca6aa38fd475ac82284b18d3601a4aae04f22347a40123

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en436563.exe

                Filesize

                175KB

                MD5

                f442159f309e9db40f9911f184977133

                SHA1

                01f4d3c1b9a4f03254cf7ba4fc614940fa9ed48b

                SHA256

                8bc2139a73abfbdd440cd444ec4b7a0370dda6bd9174fb240cd3388268aac802

                SHA512

                a8c4e0b2a539c3d97259e60d9a0e793bda87139d6d807b677493f70a3c13c55b02a0046a22fe0608d8ca6aa38fd475ac82284b18d3601a4aae04f22347a40123

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1178.exe

                Filesize

                715KB

                MD5

                3720d3eb597ee9be715cb4192c8d23b0

                SHA1

                25f74f0c233f49584ed15c424a63bf392d49f35b

                SHA256

                a64ea8ff130de11406b82d3cce4952c1f4732cf7e030c8c5b3828ebbfbc6ada4

                SHA512

                e1f3068abf29c11f484b1557d315752b17d9c0241b290664d6b6e30dbdb1bdb9d41257589fabbcc4869d12c686cc38f2284a55de6e3bdb0e00a1eb5d0566e9f9

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1178.exe

                Filesize

                715KB

                MD5

                3720d3eb597ee9be715cb4192c8d23b0

                SHA1

                25f74f0c233f49584ed15c424a63bf392d49f35b

                SHA256

                a64ea8ff130de11406b82d3cce4952c1f4732cf7e030c8c5b3828ebbfbc6ada4

                SHA512

                e1f3068abf29c11f484b1557d315752b17d9c0241b290664d6b6e30dbdb1bdb9d41257589fabbcc4869d12c686cc38f2284a55de6e3bdb0e00a1eb5d0566e9f9

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dMq64s43.exe

                Filesize

                366KB

                MD5

                77606543c0d7bf7f66dd951953cd7e27

                SHA1

                0968458f67b556964a1cf5396361253f47d65964

                SHA256

                4a867ecd99881bb00b4ffaed3681c6f884e3ff4dabcf91c957210433c9b86f13

                SHA512

                84932014e9d1f3c0a6d36202fb06d2f74b94d4a3e027cd8bab1e107c5fc7f84671042db6f0fee8971a6174ce32a3c570f340beeba2e277a4e39a59df1b58b0d2

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dMq64s43.exe

                Filesize

                366KB

                MD5

                77606543c0d7bf7f66dd951953cd7e27

                SHA1

                0968458f67b556964a1cf5396361253f47d65964

                SHA256

                4a867ecd99881bb00b4ffaed3681c6f884e3ff4dabcf91c957210433c9b86f13

                SHA512

                84932014e9d1f3c0a6d36202fb06d2f74b94d4a3e027cd8bab1e107c5fc7f84671042db6f0fee8971a6174ce32a3c570f340beeba2e277a4e39a59df1b58b0d2

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina7506.exe

                Filesize

                354KB

                MD5

                bb8f16ca474bf5f5ffb99ca6ffe5d3d9

                SHA1

                a86bc730a00724e73969e31830dd2fa7cf1b1c6b

                SHA256

                6d930cd7dbef82f9c64277a671ff11ea1805bf39fb75550ee3e09cfbe407d820

                SHA512

                79ae8b56fc718b655477a937816765679f309826f94bff47090f73b0bc610c9eb0ede44f2d4165a819dec13dc99474107fa1a86f522a491e2fbbbeede0d17e25

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina7506.exe

                Filesize

                354KB

                MD5

                bb8f16ca474bf5f5ffb99ca6ffe5d3d9

                SHA1

                a86bc730a00724e73969e31830dd2fa7cf1b1c6b

                SHA256

                6d930cd7dbef82f9c64277a671ff11ea1805bf39fb75550ee3e09cfbe407d820

                SHA512

                79ae8b56fc718b655477a937816765679f309826f94bff47090f73b0bc610c9eb0ede44f2d4165a819dec13dc99474107fa1a86f522a491e2fbbbeede0d17e25

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu027736.exe

                Filesize

                13KB

                MD5

                9f81df1c7384ae02079352475c83bda9

                SHA1

                8b51591ee342fd728717ed62468de4229a6c942c

                SHA256

                f0292de189c89f3ea413553a7b75a24938f1af19040726905b8a3f269a7b02d6

                SHA512

                7c84922511d84a62407aa8bec952b034c4f4ef92f50e5da475d290d5931c44daa3eafbe4d2ae813d6e56d83cacdd2d0d2f708d46a82492ce5a01b370af42b3a4

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu027736.exe

                Filesize

                13KB

                MD5

                9f81df1c7384ae02079352475c83bda9

                SHA1

                8b51591ee342fd728717ed62468de4229a6c942c

                SHA256

                f0292de189c89f3ea413553a7b75a24938f1af19040726905b8a3f269a7b02d6

                SHA512

                7c84922511d84a62407aa8bec952b034c4f4ef92f50e5da475d290d5931c44daa3eafbe4d2ae813d6e56d83cacdd2d0d2f708d46a82492ce5a01b370af42b3a4

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor3770.exe

                Filesize

                308KB

                MD5

                c7ff1717e813a2048fc252c6fe858678

                SHA1

                6e2766f698c2275e58708f77f87f33710c01ae98

                SHA256

                8c2643fb99111cdf3fea57e1b8456b43d39c9d1459f6fda67831bd75650062e5

                SHA512

                325a70443c94b3cebe5a5ce95e37d7b07ae5cdf218511e966cbb414e738a5bdecc4b323e3476683745a6948b0426c6b0e6227b680a730027a5714078162f1424

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor3770.exe

                Filesize

                308KB

                MD5

                c7ff1717e813a2048fc252c6fe858678

                SHA1

                6e2766f698c2275e58708f77f87f33710c01ae98

                SHA256

                8c2643fb99111cdf3fea57e1b8456b43d39c9d1459f6fda67831bd75650062e5

                SHA512

                325a70443c94b3cebe5a5ce95e37d7b07ae5cdf218511e966cbb414e738a5bdecc4b323e3476683745a6948b0426c6b0e6227b680a730027a5714078162f1424

              • memory/2096-144-0x0000000000C60000-0x0000000000C6A000-memory.dmp

                Filesize

                40KB

              • memory/3964-1109-0x0000000005A20000-0x0000000005A5E000-memory.dmp

                Filesize

                248KB

              • memory/3964-221-0x00000000028A0000-0x00000000028DF000-memory.dmp

                Filesize

                252KB

              • memory/3964-1122-0x0000000004D80000-0x0000000004D90000-memory.dmp

                Filesize

                64KB

              • memory/3964-1121-0x0000000006870000-0x0000000006D9C000-memory.dmp

                Filesize

                5.2MB

              • memory/3964-1120-0x00000000066A0000-0x0000000006862000-memory.dmp

                Filesize

                1.8MB

              • memory/3964-1119-0x0000000006510000-0x0000000006560000-memory.dmp

                Filesize

                320KB

              • memory/3964-1118-0x0000000006480000-0x00000000064F6000-memory.dmp

                Filesize

                472KB

              • memory/3964-1117-0x0000000004D80000-0x0000000004D90000-memory.dmp

                Filesize

                64KB

              • memory/3964-1115-0x0000000004D80000-0x0000000004D90000-memory.dmp

                Filesize

                64KB

              • memory/3964-1116-0x0000000004D80000-0x0000000004D90000-memory.dmp

                Filesize

                64KB

              • memory/3964-1113-0x0000000005DA0000-0x0000000005E06000-memory.dmp

                Filesize

                408KB

              • memory/3964-1112-0x0000000005D00000-0x0000000005D92000-memory.dmp

                Filesize

                584KB

              • memory/3964-1111-0x0000000004D80000-0x0000000004D90000-memory.dmp

                Filesize

                64KB

              • memory/3964-1110-0x0000000005B70000-0x0000000005BBB000-memory.dmp

                Filesize

                300KB

              • memory/3964-1108-0x0000000005A00000-0x0000000005A12000-memory.dmp

                Filesize

                72KB

              • memory/3964-1107-0x00000000058E0000-0x00000000059EA000-memory.dmp

                Filesize

                1.0MB

              • memory/3964-1106-0x0000000005290000-0x0000000005896000-memory.dmp

                Filesize

                6.0MB

              • memory/3964-233-0x00000000028A0000-0x00000000028DF000-memory.dmp

                Filesize

                252KB

              • memory/3964-194-0x0000000002680000-0x00000000026C6000-memory.dmp

                Filesize

                280KB

              • memory/3964-195-0x00000000028A0000-0x00000000028E4000-memory.dmp

                Filesize

                272KB

              • memory/3964-196-0x00000000028A0000-0x00000000028DF000-memory.dmp

                Filesize

                252KB

              • memory/3964-198-0x00000000007F0000-0x000000000083B000-memory.dmp

                Filesize

                300KB

              • memory/3964-197-0x00000000028A0000-0x00000000028DF000-memory.dmp

                Filesize

                252KB

              • memory/3964-200-0x0000000004D80000-0x0000000004D90000-memory.dmp

                Filesize

                64KB

              • memory/3964-202-0x0000000004D80000-0x0000000004D90000-memory.dmp

                Filesize

                64KB

              • memory/3964-201-0x00000000028A0000-0x00000000028DF000-memory.dmp

                Filesize

                252KB

              • memory/3964-205-0x0000000004D80000-0x0000000004D90000-memory.dmp

                Filesize

                64KB

              • memory/3964-204-0x00000000028A0000-0x00000000028DF000-memory.dmp

                Filesize

                252KB

              • memory/3964-207-0x00000000028A0000-0x00000000028DF000-memory.dmp

                Filesize

                252KB

              • memory/3964-209-0x00000000028A0000-0x00000000028DF000-memory.dmp

                Filesize

                252KB

              • memory/3964-211-0x00000000028A0000-0x00000000028DF000-memory.dmp

                Filesize

                252KB

              • memory/3964-213-0x00000000028A0000-0x00000000028DF000-memory.dmp

                Filesize

                252KB

              • memory/3964-215-0x00000000028A0000-0x00000000028DF000-memory.dmp

                Filesize

                252KB

              • memory/3964-217-0x00000000028A0000-0x00000000028DF000-memory.dmp

                Filesize

                252KB

              • memory/3964-219-0x00000000028A0000-0x00000000028DF000-memory.dmp

                Filesize

                252KB

              • memory/3964-231-0x00000000028A0000-0x00000000028DF000-memory.dmp

                Filesize

                252KB

              • memory/3964-223-0x00000000028A0000-0x00000000028DF000-memory.dmp

                Filesize

                252KB

              • memory/3964-225-0x00000000028A0000-0x00000000028DF000-memory.dmp

                Filesize

                252KB

              • memory/3964-227-0x00000000028A0000-0x00000000028DF000-memory.dmp

                Filesize

                252KB

              • memory/3964-229-0x00000000028A0000-0x00000000028DF000-memory.dmp

                Filesize

                252KB

              • memory/4460-172-0x0000000000B90000-0x0000000000BA2000-memory.dmp

                Filesize

                72KB

              • memory/4460-187-0x0000000000B80000-0x0000000000B90000-memory.dmp

                Filesize

                64KB

              • memory/4460-164-0x0000000000B90000-0x0000000000BA2000-memory.dmp

                Filesize

                72KB

              • memory/4460-189-0x0000000000400000-0x000000000070F000-memory.dmp

                Filesize

                3.1MB

              • memory/4460-170-0x0000000000B90000-0x0000000000BA2000-memory.dmp

                Filesize

                72KB

              • memory/4460-158-0x0000000000B90000-0x0000000000BA2000-memory.dmp

                Filesize

                72KB

              • memory/4460-186-0x0000000000B80000-0x0000000000B90000-memory.dmp

                Filesize

                64KB

              • memory/4460-185-0x0000000000400000-0x000000000070F000-memory.dmp

                Filesize

                3.1MB

              • memory/4460-184-0x0000000000B90000-0x0000000000BA2000-memory.dmp

                Filesize

                72KB

              • memory/4460-182-0x0000000000B90000-0x0000000000BA2000-memory.dmp

                Filesize

                72KB

              • memory/4460-180-0x0000000000B90000-0x0000000000BA2000-memory.dmp

                Filesize

                72KB

              • memory/4460-168-0x0000000000B90000-0x0000000000BA2000-memory.dmp

                Filesize

                72KB

              • memory/4460-176-0x0000000000B90000-0x0000000000BA2000-memory.dmp

                Filesize

                72KB

              • memory/4460-174-0x0000000000B90000-0x0000000000BA2000-memory.dmp

                Filesize

                72KB

              • memory/4460-162-0x0000000000B90000-0x0000000000BA2000-memory.dmp

                Filesize

                72KB

              • memory/4460-160-0x0000000000B90000-0x0000000000BA2000-memory.dmp

                Filesize

                72KB

              • memory/4460-178-0x0000000000B90000-0x0000000000BA2000-memory.dmp

                Filesize

                72KB

              • memory/4460-166-0x0000000000B90000-0x0000000000BA2000-memory.dmp

                Filesize

                72KB

              • memory/4460-157-0x0000000000B90000-0x0000000000BA2000-memory.dmp

                Filesize

                72KB

              • memory/4460-153-0x0000000000B80000-0x0000000000B90000-memory.dmp

                Filesize

                64KB

              • memory/4460-150-0x0000000000AF0000-0x0000000000B0A000-memory.dmp

                Filesize

                104KB

              • memory/4460-151-0x0000000004CA0000-0x000000000519E000-memory.dmp

                Filesize

                5.0MB

              • memory/4460-152-0x0000000000710000-0x000000000073D000-memory.dmp

                Filesize

                180KB

              • memory/4460-156-0x0000000000B80000-0x0000000000B90000-memory.dmp

                Filesize

                64KB

              • memory/4460-154-0x0000000000B90000-0x0000000000BA8000-memory.dmp

                Filesize

                96KB

              • memory/4460-155-0x0000000000B80000-0x0000000000B90000-memory.dmp

                Filesize

                64KB

              • memory/4688-1130-0x0000000005900000-0x0000000005910000-memory.dmp

                Filesize

                64KB

              • memory/4688-1129-0x00000000057D0000-0x000000000581B000-memory.dmp

                Filesize

                300KB

              • memory/4688-1128-0x0000000000D90000-0x0000000000DC2000-memory.dmp

                Filesize

                200KB