Analysis

  • max time kernel
    140s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 20:21

General

  • Target

    ec58e8343e86d189c139b88fa82c69ac4fd49f017779af5d09527ab907dfd5a1.exe

  • Size

    1.0MB

  • MD5

    f2a464cd449f6cb4dcef1817ff9cc5e9

  • SHA1

    5c5e84c9f339858990bd98c4c460d645f8df4e63

  • SHA256

    ec58e8343e86d189c139b88fa82c69ac4fd49f017779af5d09527ab907dfd5a1

  • SHA512

    43973c1062016788d8753ff4477b25d6d2ba98011e47705400e49bfb0d3b4fc2bdc1729d902fba6535b07e5201cf6306921fce521c60a5893510d1148d56d8d3

  • SSDEEP

    24576:uy7sx+gOxhPOmIV9EaS6Yv5C36cf0camN/83e8:9y+VhPQfEaS6803h0cz/4

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

renta

C2

176.113.115.145:4125

Attributes
  • auth_value

    359596fd5b36e9925ade4d9a1846bafb

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec58e8343e86d189c139b88fa82c69ac4fd49f017779af5d09527ab907dfd5a1.exe
    "C:\Users\Admin\AppData\Local\Temp\ec58e8343e86d189c139b88fa82c69ac4fd49f017779af5d09527ab907dfd5a1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7586.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7586.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:372
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0196.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0196.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4116
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina9510.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina9510.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1324
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu281534.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu281534.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2980
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor6607.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor6607.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4896
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dmn27s33.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dmn27s33.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4160
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en383915.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en383915.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:440
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge203884.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge203884.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:760
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1260
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:1216
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2708
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:2252
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:1328
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:2388
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:5080
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:5084
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:1412
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:1348
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:3984

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                683e43b04249009991b146d761913b49

                SHA1

                743b560069f8ecc0d3e58a1571c379875cad7513

                SHA256

                4a8b43ae4eb4544091e7643d80bd33ee0849ea6aa538a254cb63170e934e07a8

                SHA512

                0769c7c069c760b278996831f7f69016379bd2a559a7be38a8f2f821fecee10df2c1e6be5267037de5aae2c32657bbf138def0b546e2bd556f5a287bd192a3f4

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                683e43b04249009991b146d761913b49

                SHA1

                743b560069f8ecc0d3e58a1571c379875cad7513

                SHA256

                4a8b43ae4eb4544091e7643d80bd33ee0849ea6aa538a254cb63170e934e07a8

                SHA512

                0769c7c069c760b278996831f7f69016379bd2a559a7be38a8f2f821fecee10df2c1e6be5267037de5aae2c32657bbf138def0b546e2bd556f5a287bd192a3f4

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                683e43b04249009991b146d761913b49

                SHA1

                743b560069f8ecc0d3e58a1571c379875cad7513

                SHA256

                4a8b43ae4eb4544091e7643d80bd33ee0849ea6aa538a254cb63170e934e07a8

                SHA512

                0769c7c069c760b278996831f7f69016379bd2a559a7be38a8f2f821fecee10df2c1e6be5267037de5aae2c32657bbf138def0b546e2bd556f5a287bd192a3f4

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                683e43b04249009991b146d761913b49

                SHA1

                743b560069f8ecc0d3e58a1571c379875cad7513

                SHA256

                4a8b43ae4eb4544091e7643d80bd33ee0849ea6aa538a254cb63170e934e07a8

                SHA512

                0769c7c069c760b278996831f7f69016379bd2a559a7be38a8f2f821fecee10df2c1e6be5267037de5aae2c32657bbf138def0b546e2bd556f5a287bd192a3f4

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                683e43b04249009991b146d761913b49

                SHA1

                743b560069f8ecc0d3e58a1571c379875cad7513

                SHA256

                4a8b43ae4eb4544091e7643d80bd33ee0849ea6aa538a254cb63170e934e07a8

                SHA512

                0769c7c069c760b278996831f7f69016379bd2a559a7be38a8f2f821fecee10df2c1e6be5267037de5aae2c32657bbf138def0b546e2bd556f5a287bd192a3f4

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge203884.exe

                Filesize

                227KB

                MD5

                683e43b04249009991b146d761913b49

                SHA1

                743b560069f8ecc0d3e58a1571c379875cad7513

                SHA256

                4a8b43ae4eb4544091e7643d80bd33ee0849ea6aa538a254cb63170e934e07a8

                SHA512

                0769c7c069c760b278996831f7f69016379bd2a559a7be38a8f2f821fecee10df2c1e6be5267037de5aae2c32657bbf138def0b546e2bd556f5a287bd192a3f4

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge203884.exe

                Filesize

                227KB

                MD5

                683e43b04249009991b146d761913b49

                SHA1

                743b560069f8ecc0d3e58a1571c379875cad7513

                SHA256

                4a8b43ae4eb4544091e7643d80bd33ee0849ea6aa538a254cb63170e934e07a8

                SHA512

                0769c7c069c760b278996831f7f69016379bd2a559a7be38a8f2f821fecee10df2c1e6be5267037de5aae2c32657bbf138def0b546e2bd556f5a287bd192a3f4

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7586.exe

                Filesize

                857KB

                MD5

                682e39577352ed5fc578ae4663b8dcac

                SHA1

                c633b766fab4b349fbceed2416f1f39d884ae082

                SHA256

                6d3a25eff471f4b50b05d25a04ecdadcde89749bf14abb11cc9b24f0d7c276a1

                SHA512

                a4df6e8f28c7dcc87bcef92b678f087c5186e7f570783cfeb1b6fef2503d9ab72dcb14de6538b49757c3f65dece2ff3f02f4a51d4f16d1638c79bdb921ebcf9b

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7586.exe

                Filesize

                857KB

                MD5

                682e39577352ed5fc578ae4663b8dcac

                SHA1

                c633b766fab4b349fbceed2416f1f39d884ae082

                SHA256

                6d3a25eff471f4b50b05d25a04ecdadcde89749bf14abb11cc9b24f0d7c276a1

                SHA512

                a4df6e8f28c7dcc87bcef92b678f087c5186e7f570783cfeb1b6fef2503d9ab72dcb14de6538b49757c3f65dece2ff3f02f4a51d4f16d1638c79bdb921ebcf9b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en383915.exe

                Filesize

                175KB

                MD5

                7ea68ee25719b46f5be97646e84a5646

                SHA1

                ef75f83de5a3cda1d1cdc4e999694e62a79e8b0d

                SHA256

                1b00c80086bc9535f162d50de3f12b970b2702a7cca7a2222c5699b9deb0e901

                SHA512

                a14bf6c6197ed6cb7561393fb52abf1c3acaca37af9c32df29e5d1d65faf1dc712d06733524cd33b4c55ec1faa873da77d745982ecabb3dafb8eecbb04bd8694

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en383915.exe

                Filesize

                175KB

                MD5

                7ea68ee25719b46f5be97646e84a5646

                SHA1

                ef75f83de5a3cda1d1cdc4e999694e62a79e8b0d

                SHA256

                1b00c80086bc9535f162d50de3f12b970b2702a7cca7a2222c5699b9deb0e901

                SHA512

                a14bf6c6197ed6cb7561393fb52abf1c3acaca37af9c32df29e5d1d65faf1dc712d06733524cd33b4c55ec1faa873da77d745982ecabb3dafb8eecbb04bd8694

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0196.exe

                Filesize

                715KB

                MD5

                a560677dcb963d5c0a250ba8b21d76eb

                SHA1

                9f5f86345595ca54647b200f34272ac66695ebfe

                SHA256

                5817d23d45786e0229e48bed6f056d7470f688e8391d8ced5f1a304760138554

                SHA512

                164bf8aebb1a9c99828c870e00995d25426f4640971bc604c7e1420099a8b483112d8ccc41b4104187b2b7120ad1a0ea18b8052d31f7bb1737c0975a98102b48

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0196.exe

                Filesize

                715KB

                MD5

                a560677dcb963d5c0a250ba8b21d76eb

                SHA1

                9f5f86345595ca54647b200f34272ac66695ebfe

                SHA256

                5817d23d45786e0229e48bed6f056d7470f688e8391d8ced5f1a304760138554

                SHA512

                164bf8aebb1a9c99828c870e00995d25426f4640971bc604c7e1420099a8b483112d8ccc41b4104187b2b7120ad1a0ea18b8052d31f7bb1737c0975a98102b48

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dmn27s33.exe

                Filesize

                366KB

                MD5

                c2fc0ac4dc654688be17918b7166571c

                SHA1

                3da1f406321c4ae2b1a33586d39a5d8feca870f2

                SHA256

                f88f68b84dd07b82c980a8e2b222e26961afe972a0d765b2726192d679682c1a

                SHA512

                95c242a500a54e192769237ad0cde786ddd1f85427a03243f9cb616adc65bb54d85b34e30b69c596198bd67d9443fa91b95c5fa4d13d3246597bc457b2ed9fad

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dmn27s33.exe

                Filesize

                366KB

                MD5

                c2fc0ac4dc654688be17918b7166571c

                SHA1

                3da1f406321c4ae2b1a33586d39a5d8feca870f2

                SHA256

                f88f68b84dd07b82c980a8e2b222e26961afe972a0d765b2726192d679682c1a

                SHA512

                95c242a500a54e192769237ad0cde786ddd1f85427a03243f9cb616adc65bb54d85b34e30b69c596198bd67d9443fa91b95c5fa4d13d3246597bc457b2ed9fad

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina9510.exe

                Filesize

                354KB

                MD5

                1efab739112da7ec39fa452c8fa60dc5

                SHA1

                175489004c5f8881189c01056b31f62d9f40dc06

                SHA256

                6e9b651ed9837fcdd01efdfcd608a40f561475773c02be2e0e22f21c702fb942

                SHA512

                254624f54bebd8c4c2fbef9a058bfca3eb7f4ca12ef473ece807c9541b1dd6925d4cdc5380dbf5fb9f5eb2d46c765d87348580910154a21723c79b6978dd71c7

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina9510.exe

                Filesize

                354KB

                MD5

                1efab739112da7ec39fa452c8fa60dc5

                SHA1

                175489004c5f8881189c01056b31f62d9f40dc06

                SHA256

                6e9b651ed9837fcdd01efdfcd608a40f561475773c02be2e0e22f21c702fb942

                SHA512

                254624f54bebd8c4c2fbef9a058bfca3eb7f4ca12ef473ece807c9541b1dd6925d4cdc5380dbf5fb9f5eb2d46c765d87348580910154a21723c79b6978dd71c7

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu281534.exe

                Filesize

                13KB

                MD5

                68aa881a4dcde4f7d440d4e537c79587

                SHA1

                58e47d83713edc7cd08143f11cce13c5209cc6a6

                SHA256

                55cf0dbcfe33360b8d6f3e346304074f379e849928beacee5d9c9e4b46e37ff6

                SHA512

                9ff55e5de03e2e3bc9fd6652444fce586b413e27833d697b290b1a31f0e1a13229b84fba640e23f350b74b3c4134fda7797b6d83a4e94456971e0e9544a32e1c

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu281534.exe

                Filesize

                13KB

                MD5

                68aa881a4dcde4f7d440d4e537c79587

                SHA1

                58e47d83713edc7cd08143f11cce13c5209cc6a6

                SHA256

                55cf0dbcfe33360b8d6f3e346304074f379e849928beacee5d9c9e4b46e37ff6

                SHA512

                9ff55e5de03e2e3bc9fd6652444fce586b413e27833d697b290b1a31f0e1a13229b84fba640e23f350b74b3c4134fda7797b6d83a4e94456971e0e9544a32e1c

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor6607.exe

                Filesize

                308KB

                MD5

                6f335403b24c030f19da2e22bb11910a

                SHA1

                efeb2f40990960194b7dc879a7c0214e669a45c4

                SHA256

                2229e0a0506edb76259a3cb0b8a7cb6327ffd9aad87b9c5108c280ea627a3c1f

                SHA512

                8d7bfd2d2259453bdabd6cf5487ae11e089d6181c773ce9939912bd51dd86ef84791383691aa21ed0640df3713ffe7a43bd31b1c6ca38136d899c2d7c531b2cd

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor6607.exe

                Filesize

                308KB

                MD5

                6f335403b24c030f19da2e22bb11910a

                SHA1

                efeb2f40990960194b7dc879a7c0214e669a45c4

                SHA256

                2229e0a0506edb76259a3cb0b8a7cb6327ffd9aad87b9c5108c280ea627a3c1f

                SHA512

                8d7bfd2d2259453bdabd6cf5487ae11e089d6181c773ce9939912bd51dd86ef84791383691aa21ed0640df3713ffe7a43bd31b1c6ca38136d899c2d7c531b2cd

              • memory/440-1140-0x0000000004E40000-0x0000000004E50000-memory.dmp

                Filesize

                64KB

              • memory/440-1139-0x0000000000570000-0x00000000005A2000-memory.dmp

                Filesize

                200KB

              • memory/2980-161-0x0000000000990000-0x000000000099A000-memory.dmp

                Filesize

                40KB

              • memory/4160-1123-0x0000000006050000-0x00000000060E2000-memory.dmp

                Filesize

                584KB

              • memory/4160-237-0x0000000002570000-0x00000000025AF000-memory.dmp

                Filesize

                252KB

              • memory/4160-1133-0x0000000006D80000-0x00000000072AC000-memory.dmp

                Filesize

                5.2MB

              • memory/4160-1132-0x0000000006BB0000-0x0000000006D72000-memory.dmp

                Filesize

                1.8MB

              • memory/4160-1131-0x00000000023D0000-0x00000000023E0000-memory.dmp

                Filesize

                64KB

              • memory/4160-1130-0x00000000023D0000-0x00000000023E0000-memory.dmp

                Filesize

                64KB

              • memory/4160-1129-0x00000000023D0000-0x00000000023E0000-memory.dmp

                Filesize

                64KB

              • memory/4160-1128-0x00000000023D0000-0x00000000023E0000-memory.dmp

                Filesize

                64KB

              • memory/4160-1127-0x00000000069C0000-0x0000000006A10000-memory.dmp

                Filesize

                320KB

              • memory/4160-1126-0x0000000006930000-0x00000000069A6000-memory.dmp

                Filesize

                472KB

              • memory/4160-1124-0x00000000060F0000-0x0000000006156000-memory.dmp

                Filesize

                408KB

              • memory/4160-1122-0x00000000023D0000-0x00000000023E0000-memory.dmp

                Filesize

                64KB

              • memory/4160-208-0x0000000002570000-0x00000000025AF000-memory.dmp

                Filesize

                252KB

              • memory/4160-209-0x0000000002570000-0x00000000025AF000-memory.dmp

                Filesize

                252KB

              • memory/4160-211-0x0000000002570000-0x00000000025AF000-memory.dmp

                Filesize

                252KB

              • memory/4160-213-0x0000000002570000-0x00000000025AF000-memory.dmp

                Filesize

                252KB

              • memory/4160-217-0x0000000002570000-0x00000000025AF000-memory.dmp

                Filesize

                252KB

              • memory/4160-215-0x0000000002570000-0x00000000025AF000-memory.dmp

                Filesize

                252KB

              • memory/4160-219-0x0000000002570000-0x00000000025AF000-memory.dmp

                Filesize

                252KB

              • memory/4160-221-0x00000000007F0000-0x000000000083B000-memory.dmp

                Filesize

                300KB

              • memory/4160-223-0x0000000002570000-0x00000000025AF000-memory.dmp

                Filesize

                252KB

              • memory/4160-222-0x00000000023D0000-0x00000000023E0000-memory.dmp

                Filesize

                64KB

              • memory/4160-226-0x0000000002570000-0x00000000025AF000-memory.dmp

                Filesize

                252KB

              • memory/4160-225-0x00000000023D0000-0x00000000023E0000-memory.dmp

                Filesize

                64KB

              • memory/4160-227-0x00000000023D0000-0x00000000023E0000-memory.dmp

                Filesize

                64KB

              • memory/4160-229-0x0000000002570000-0x00000000025AF000-memory.dmp

                Filesize

                252KB

              • memory/4160-231-0x0000000002570000-0x00000000025AF000-memory.dmp

                Filesize

                252KB

              • memory/4160-233-0x0000000002570000-0x00000000025AF000-memory.dmp

                Filesize

                252KB

              • memory/4160-235-0x0000000002570000-0x00000000025AF000-memory.dmp

                Filesize

                252KB

              • memory/4160-1121-0x0000000005D70000-0x0000000005DAC000-memory.dmp

                Filesize

                240KB

              • memory/4160-239-0x0000000002570000-0x00000000025AF000-memory.dmp

                Filesize

                252KB

              • memory/4160-241-0x0000000002570000-0x00000000025AF000-memory.dmp

                Filesize

                252KB

              • memory/4160-243-0x0000000002570000-0x00000000025AF000-memory.dmp

                Filesize

                252KB

              • memory/4160-245-0x0000000002570000-0x00000000025AF000-memory.dmp

                Filesize

                252KB

              • memory/4160-1118-0x0000000005620000-0x0000000005C38000-memory.dmp

                Filesize

                6.1MB

              • memory/4160-1119-0x0000000005C40000-0x0000000005D4A000-memory.dmp

                Filesize

                1.0MB

              • memory/4160-1120-0x0000000005D50000-0x0000000005D62000-memory.dmp

                Filesize

                72KB

              • memory/4896-195-0x0000000002440000-0x0000000002452000-memory.dmp

                Filesize

                72KB

              • memory/4896-167-0x00000000007E0000-0x000000000080D000-memory.dmp

                Filesize

                180KB

              • memory/4896-191-0x0000000002440000-0x0000000002452000-memory.dmp

                Filesize

                72KB

              • memory/4896-189-0x0000000002440000-0x0000000002452000-memory.dmp

                Filesize

                72KB

              • memory/4896-203-0x0000000000400000-0x000000000070F000-memory.dmp

                Filesize

                3.1MB

              • memory/4896-201-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

                Filesize

                64KB

              • memory/4896-200-0x0000000000400000-0x000000000070F000-memory.dmp

                Filesize

                3.1MB

              • memory/4896-199-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

                Filesize

                64KB

              • memory/4896-198-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

                Filesize

                64KB

              • memory/4896-183-0x0000000002440000-0x0000000002452000-memory.dmp

                Filesize

                72KB

              • memory/4896-185-0x0000000002440000-0x0000000002452000-memory.dmp

                Filesize

                72KB

              • memory/4896-187-0x0000000002440000-0x0000000002452000-memory.dmp

                Filesize

                72KB

              • memory/4896-197-0x0000000002440000-0x0000000002452000-memory.dmp

                Filesize

                72KB

              • memory/4896-181-0x0000000002440000-0x0000000002452000-memory.dmp

                Filesize

                72KB

              • memory/4896-179-0x0000000002440000-0x0000000002452000-memory.dmp

                Filesize

                72KB

              • memory/4896-177-0x0000000002440000-0x0000000002452000-memory.dmp

                Filesize

                72KB

              • memory/4896-175-0x0000000002440000-0x0000000002452000-memory.dmp

                Filesize

                72KB

              • memory/4896-173-0x0000000002440000-0x0000000002452000-memory.dmp

                Filesize

                72KB

              • memory/4896-170-0x0000000002440000-0x0000000002452000-memory.dmp

                Filesize

                72KB

              • memory/4896-171-0x0000000002440000-0x0000000002452000-memory.dmp

                Filesize

                72KB

              • memory/4896-169-0x0000000004EB0000-0x0000000005454000-memory.dmp

                Filesize

                5.6MB

              • memory/4896-168-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

                Filesize

                64KB

              • memory/4896-193-0x0000000002440000-0x0000000002452000-memory.dmp

                Filesize

                72KB