Analysis

  • max time kernel
    111s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 20:46

General

  • Target

    8b3c6304ff3bd2e35ca474b59ab2e159.exe

  • Size

    1.0MB

  • MD5

    8b3c6304ff3bd2e35ca474b59ab2e159

  • SHA1

    2b65edbe590baa889172b574ab33a955f543f194

  • SHA256

    d94601185ca26188c394f7d299828f30caeba8338635565a4cad614b74c945f4

  • SHA512

    9f769d6148f739b489b981c36ca6c3c96bd14e45d3bf86827e148704d87347dfad0ac54aaa64970e861186be964d36f861f67aee4338ec52288f1d3eaa4c1dfe

  • SSDEEP

    24576:/ybBrPMgGNvZISo3ADC1FB9sAC+X0WKhUo7Djn1fG:KbJgNvQ3AyF7Z3XwH7Djn1

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

renta

C2

176.113.115.145:4125

Attributes
  • auth_value

    359596fd5b36e9925ade4d9a1846bafb

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b3c6304ff3bd2e35ca474b59ab2e159.exe
    "C:\Users\Admin\AppData\Local\Temp\8b3c6304ff3bd2e35ca474b59ab2e159.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8725.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8725.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4676
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina2403.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina2403.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3860
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8755.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8755.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2488
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu527689.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu527689.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4872
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor8407.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor8407.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1268
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dZZ61s06.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dZZ61s06.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3112
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en588115.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en588115.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4132
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge402050.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge402050.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2616
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4648
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4384
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2100
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3728
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:4216
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:2348
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:2864
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:1760
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:3192
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:1120

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                c48337298a2d7bbc9cf6e66af67e0871

                SHA1

                467af534d6be03a79d7229fee1badf4475f00628

                SHA256

                3c6d055f5935d7e210a0c764c5cf3550aabba49c3758ee94cd41cda27a749bfc

                SHA512

                d7786bcfc680d82fbaa83230a7c4828589ebeeb55663f0fb2c5d58e35504b04e6869e0c46a7e115eeb13e6a4d63971289e38e33b6f1d7d04ef18beba6972e119

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                c48337298a2d7bbc9cf6e66af67e0871

                SHA1

                467af534d6be03a79d7229fee1badf4475f00628

                SHA256

                3c6d055f5935d7e210a0c764c5cf3550aabba49c3758ee94cd41cda27a749bfc

                SHA512

                d7786bcfc680d82fbaa83230a7c4828589ebeeb55663f0fb2c5d58e35504b04e6869e0c46a7e115eeb13e6a4d63971289e38e33b6f1d7d04ef18beba6972e119

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                c48337298a2d7bbc9cf6e66af67e0871

                SHA1

                467af534d6be03a79d7229fee1badf4475f00628

                SHA256

                3c6d055f5935d7e210a0c764c5cf3550aabba49c3758ee94cd41cda27a749bfc

                SHA512

                d7786bcfc680d82fbaa83230a7c4828589ebeeb55663f0fb2c5d58e35504b04e6869e0c46a7e115eeb13e6a4d63971289e38e33b6f1d7d04ef18beba6972e119

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                c48337298a2d7bbc9cf6e66af67e0871

                SHA1

                467af534d6be03a79d7229fee1badf4475f00628

                SHA256

                3c6d055f5935d7e210a0c764c5cf3550aabba49c3758ee94cd41cda27a749bfc

                SHA512

                d7786bcfc680d82fbaa83230a7c4828589ebeeb55663f0fb2c5d58e35504b04e6869e0c46a7e115eeb13e6a4d63971289e38e33b6f1d7d04ef18beba6972e119

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge402050.exe

                Filesize

                227KB

                MD5

                c48337298a2d7bbc9cf6e66af67e0871

                SHA1

                467af534d6be03a79d7229fee1badf4475f00628

                SHA256

                3c6d055f5935d7e210a0c764c5cf3550aabba49c3758ee94cd41cda27a749bfc

                SHA512

                d7786bcfc680d82fbaa83230a7c4828589ebeeb55663f0fb2c5d58e35504b04e6869e0c46a7e115eeb13e6a4d63971289e38e33b6f1d7d04ef18beba6972e119

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge402050.exe

                Filesize

                227KB

                MD5

                c48337298a2d7bbc9cf6e66af67e0871

                SHA1

                467af534d6be03a79d7229fee1badf4475f00628

                SHA256

                3c6d055f5935d7e210a0c764c5cf3550aabba49c3758ee94cd41cda27a749bfc

                SHA512

                d7786bcfc680d82fbaa83230a7c4828589ebeeb55663f0fb2c5d58e35504b04e6869e0c46a7e115eeb13e6a4d63971289e38e33b6f1d7d04ef18beba6972e119

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8725.exe

                Filesize

                857KB

                MD5

                ae7a97aa790dba0ab593e41a6aeb2d7f

                SHA1

                59dc0fc9648d33d5d94408a7d7b7b74130678443

                SHA256

                19937810cc729da8c31b4a37c85abb20999d70ff30bbd663da52a2573b476943

                SHA512

                7b17c953dc2d7896a5c4a9b77f14c29e9af2a45c73c4568709befde1501da1687d4cb4b5a6b8f32b0ab611406840fbed6d16fa80c33c5ec4038722af88b83e7c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8725.exe

                Filesize

                857KB

                MD5

                ae7a97aa790dba0ab593e41a6aeb2d7f

                SHA1

                59dc0fc9648d33d5d94408a7d7b7b74130678443

                SHA256

                19937810cc729da8c31b4a37c85abb20999d70ff30bbd663da52a2573b476943

                SHA512

                7b17c953dc2d7896a5c4a9b77f14c29e9af2a45c73c4568709befde1501da1687d4cb4b5a6b8f32b0ab611406840fbed6d16fa80c33c5ec4038722af88b83e7c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en588115.exe

                Filesize

                175KB

                MD5

                6660924815fb87ee45a70a5b5bdf1da6

                SHA1

                e6ec4dc7931f68f3109acbe9d585f8e74082ef1c

                SHA256

                d2b9ad17ff6da25b59c0109f902d01f11368ccf95bab57ce36bde5d96138281c

                SHA512

                4fb7e3152ca72bec051ffe3452f9fa5fd17955136167e41625cb4d698355259c9d2194c2a1da89064262fb120c06afed2393d6ac206d67f44c18b317b676a016

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en588115.exe

                Filesize

                175KB

                MD5

                6660924815fb87ee45a70a5b5bdf1da6

                SHA1

                e6ec4dc7931f68f3109acbe9d585f8e74082ef1c

                SHA256

                d2b9ad17ff6da25b59c0109f902d01f11368ccf95bab57ce36bde5d96138281c

                SHA512

                4fb7e3152ca72bec051ffe3452f9fa5fd17955136167e41625cb4d698355259c9d2194c2a1da89064262fb120c06afed2393d6ac206d67f44c18b317b676a016

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina2403.exe

                Filesize

                715KB

                MD5

                2af28e79df938216945e29a823ca8557

                SHA1

                a28a75c655ed55d35b96437d4137e2e36b920104

                SHA256

                f8a6b00ca1cc473167a2eae4c041e89f748b3281bcf57bc576b8b230ad190602

                SHA512

                e175629f9ff6d64f74c3599d202a1e5779bc89f77cd72e1c5dddf689606e05bed43e04b3f680f67f0a186fd598b93dadc2dbafb5c04edb385b4e4eea02b03aad

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina2403.exe

                Filesize

                715KB

                MD5

                2af28e79df938216945e29a823ca8557

                SHA1

                a28a75c655ed55d35b96437d4137e2e36b920104

                SHA256

                f8a6b00ca1cc473167a2eae4c041e89f748b3281bcf57bc576b8b230ad190602

                SHA512

                e175629f9ff6d64f74c3599d202a1e5779bc89f77cd72e1c5dddf689606e05bed43e04b3f680f67f0a186fd598b93dadc2dbafb5c04edb385b4e4eea02b03aad

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dZZ61s06.exe

                Filesize

                366KB

                MD5

                6776667c0dafb7d183964f8c26ec6318

                SHA1

                3c339128390e5cfdf604c521314a80dbcd83063f

                SHA256

                5606173526fc4165a15f0e97dfd7622066204cb2222baa216a1faf71914f7a0d

                SHA512

                e1d201e4e88bf510022a67fe809cf7e85680c37da70d46c46742e04f002b7bbd141bcd79050b369a7abf0a20db9c5ad656ac71c916c7640a6e8fb9f1a7fba757

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dZZ61s06.exe

                Filesize

                366KB

                MD5

                6776667c0dafb7d183964f8c26ec6318

                SHA1

                3c339128390e5cfdf604c521314a80dbcd83063f

                SHA256

                5606173526fc4165a15f0e97dfd7622066204cb2222baa216a1faf71914f7a0d

                SHA512

                e1d201e4e88bf510022a67fe809cf7e85680c37da70d46c46742e04f002b7bbd141bcd79050b369a7abf0a20db9c5ad656ac71c916c7640a6e8fb9f1a7fba757

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8755.exe

                Filesize

                354KB

                MD5

                87a42be6aead20bba1b01e02ebbe4efc

                SHA1

                9855d36ae3b9dc8791cf3f08d0375bbfe8dd6d4b

                SHA256

                ada92e565a747fe51fa926de1f5a6785613ae3b6867d7a099e332c1abf60b0a0

                SHA512

                605f494ddc0a98f0f6394e531adaeee46cda1d74d8cd3b19324378682240a97947b05ff060cc3e255807b948f65e377dd7f5a8157cea1a728cc82b4c73ee26c9

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8755.exe

                Filesize

                354KB

                MD5

                87a42be6aead20bba1b01e02ebbe4efc

                SHA1

                9855d36ae3b9dc8791cf3f08d0375bbfe8dd6d4b

                SHA256

                ada92e565a747fe51fa926de1f5a6785613ae3b6867d7a099e332c1abf60b0a0

                SHA512

                605f494ddc0a98f0f6394e531adaeee46cda1d74d8cd3b19324378682240a97947b05ff060cc3e255807b948f65e377dd7f5a8157cea1a728cc82b4c73ee26c9

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu527689.exe

                Filesize

                13KB

                MD5

                b14aba062d3248033cca771a4b958df6

                SHA1

                466db44f064aa8efb0f2f70984e494c455f05782

                SHA256

                ab4255502b3b2a4b71d652142a4f5b93f756124b20556e60fd04c2508cceeb9f

                SHA512

                57b18af998f83636ac0445f622a0cbe1c308c162a8a5792b30b5162f6e6471b355df13b6d1ce04c3562e22ebf541ec5c8f6943c977091db06f1172190c632c1b

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu527689.exe

                Filesize

                13KB

                MD5

                b14aba062d3248033cca771a4b958df6

                SHA1

                466db44f064aa8efb0f2f70984e494c455f05782

                SHA256

                ab4255502b3b2a4b71d652142a4f5b93f756124b20556e60fd04c2508cceeb9f

                SHA512

                57b18af998f83636ac0445f622a0cbe1c308c162a8a5792b30b5162f6e6471b355df13b6d1ce04c3562e22ebf541ec5c8f6943c977091db06f1172190c632c1b

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor8407.exe

                Filesize

                308KB

                MD5

                987567b162cf7a657b96aa3d907abac4

                SHA1

                c627132ca3b1f302d58cecc29f25a13af199600a

                SHA256

                ab2ab1fc951696b466e94b5894a05d95bf49603937c5b09be2267b81f7749555

                SHA512

                8ab171767c16a88b4677753706154a444a6ceac385bf6c7d3eca661254fe8515fad72a5a6cb1cf8ed2dfa1b7b6a2df4dc5fca4f3bd5f85d49fd5d2b69141df2e

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor8407.exe

                Filesize

                308KB

                MD5

                987567b162cf7a657b96aa3d907abac4

                SHA1

                c627132ca3b1f302d58cecc29f25a13af199600a

                SHA256

                ab2ab1fc951696b466e94b5894a05d95bf49603937c5b09be2267b81f7749555

                SHA512

                8ab171767c16a88b4677753706154a444a6ceac385bf6c7d3eca661254fe8515fad72a5a6cb1cf8ed2dfa1b7b6a2df4dc5fca4f3bd5f85d49fd5d2b69141df2e

              • memory/1268-179-0x0000000002530000-0x0000000002542000-memory.dmp

                Filesize

                72KB

              • memory/1268-200-0x0000000000400000-0x000000000070F000-memory.dmp

                Filesize

                3.1MB

              • memory/1268-175-0x0000000002530000-0x0000000002542000-memory.dmp

                Filesize

                72KB

              • memory/1268-181-0x0000000002530000-0x0000000002542000-memory.dmp

                Filesize

                72KB

              • memory/1268-183-0x0000000002530000-0x0000000002542000-memory.dmp

                Filesize

                72KB

              • memory/1268-185-0x0000000002530000-0x0000000002542000-memory.dmp

                Filesize

                72KB

              • memory/1268-187-0x0000000002530000-0x0000000002542000-memory.dmp

                Filesize

                72KB

              • memory/1268-189-0x0000000002530000-0x0000000002542000-memory.dmp

                Filesize

                72KB

              • memory/1268-191-0x0000000002530000-0x0000000002542000-memory.dmp

                Filesize

                72KB

              • memory/1268-193-0x0000000002530000-0x0000000002542000-memory.dmp

                Filesize

                72KB

              • memory/1268-195-0x0000000002530000-0x0000000002542000-memory.dmp

                Filesize

                72KB

              • memory/1268-197-0x0000000002530000-0x0000000002542000-memory.dmp

                Filesize

                72KB

              • memory/1268-199-0x0000000002530000-0x0000000002542000-memory.dmp

                Filesize

                72KB

              • memory/1268-177-0x0000000002530000-0x0000000002542000-memory.dmp

                Filesize

                72KB

              • memory/1268-201-0x0000000002520000-0x0000000002530000-memory.dmp

                Filesize

                64KB

              • memory/1268-202-0x0000000002520000-0x0000000002530000-memory.dmp

                Filesize

                64KB

              • memory/1268-203-0x0000000002520000-0x0000000002530000-memory.dmp

                Filesize

                64KB

              • memory/1268-205-0x0000000000400000-0x000000000070F000-memory.dmp

                Filesize

                3.1MB

              • memory/1268-173-0x0000000002530000-0x0000000002542000-memory.dmp

                Filesize

                72KB

              • memory/1268-172-0x0000000002530000-0x0000000002542000-memory.dmp

                Filesize

                72KB

              • memory/1268-171-0x0000000002520000-0x0000000002530000-memory.dmp

                Filesize

                64KB

              • memory/1268-170-0x0000000002520000-0x0000000002530000-memory.dmp

                Filesize

                64KB

              • memory/1268-169-0x0000000002520000-0x0000000002530000-memory.dmp

                Filesize

                64KB

              • memory/1268-168-0x00000000007E0000-0x000000000080D000-memory.dmp

                Filesize

                180KB

              • memory/1268-167-0x0000000004D90000-0x0000000005334000-memory.dmp

                Filesize

                5.6MB

              • memory/3112-217-0x0000000002890000-0x00000000028CF000-memory.dmp

                Filesize

                252KB

              • memory/3112-1124-0x0000000004F40000-0x0000000004F7C000-memory.dmp

                Filesize

                240KB

              • memory/3112-227-0x0000000002890000-0x00000000028CF000-memory.dmp

                Filesize

                252KB

              • memory/3112-229-0x0000000002890000-0x00000000028CF000-memory.dmp

                Filesize

                252KB

              • memory/3112-231-0x0000000002890000-0x00000000028CF000-memory.dmp

                Filesize

                252KB

              • memory/3112-233-0x0000000002890000-0x00000000028CF000-memory.dmp

                Filesize

                252KB

              • memory/3112-235-0x0000000002890000-0x00000000028CF000-memory.dmp

                Filesize

                252KB

              • memory/3112-237-0x0000000002890000-0x00000000028CF000-memory.dmp

                Filesize

                252KB

              • memory/3112-239-0x0000000002890000-0x00000000028CF000-memory.dmp

                Filesize

                252KB

              • memory/3112-241-0x0000000002890000-0x00000000028CF000-memory.dmp

                Filesize

                252KB

              • memory/3112-243-0x0000000002890000-0x00000000028CF000-memory.dmp

                Filesize

                252KB

              • memory/3112-279-0x00000000007F0000-0x000000000083B000-memory.dmp

                Filesize

                300KB

              • memory/3112-281-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

                Filesize

                64KB

              • memory/3112-283-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

                Filesize

                64KB

              • memory/3112-284-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

                Filesize

                64KB

              • memory/3112-1120-0x0000000005560000-0x0000000005B78000-memory.dmp

                Filesize

                6.1MB

              • memory/3112-1121-0x0000000004DE0000-0x0000000004EEA000-memory.dmp

                Filesize

                1.0MB

              • memory/3112-1122-0x0000000004F20000-0x0000000004F32000-memory.dmp

                Filesize

                72KB

              • memory/3112-1123-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

                Filesize

                64KB

              • memory/3112-225-0x0000000002890000-0x00000000028CF000-memory.dmp

                Filesize

                252KB

              • memory/3112-1126-0x0000000005E10000-0x0000000005E76000-memory.dmp

                Filesize

                408KB

              • memory/3112-1127-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

                Filesize

                64KB

              • memory/3112-1128-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

                Filesize

                64KB

              • memory/3112-1129-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

                Filesize

                64KB

              • memory/3112-1130-0x00000000064E0000-0x0000000006572000-memory.dmp

                Filesize

                584KB

              • memory/3112-1131-0x00000000066B0000-0x0000000006726000-memory.dmp

                Filesize

                472KB

              • memory/3112-1132-0x0000000006740000-0x0000000006790000-memory.dmp

                Filesize

                320KB

              • memory/3112-1133-0x00000000067C0000-0x0000000006982000-memory.dmp

                Filesize

                1.8MB

              • memory/3112-1134-0x0000000006990000-0x0000000006EBC000-memory.dmp

                Filesize

                5.2MB

              • memory/3112-223-0x0000000002890000-0x00000000028CF000-memory.dmp

                Filesize

                252KB

              • memory/3112-1135-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

                Filesize

                64KB

              • memory/3112-210-0x0000000002890000-0x00000000028CF000-memory.dmp

                Filesize

                252KB

              • memory/3112-211-0x0000000002890000-0x00000000028CF000-memory.dmp

                Filesize

                252KB

              • memory/3112-221-0x0000000002890000-0x00000000028CF000-memory.dmp

                Filesize

                252KB

              • memory/3112-219-0x0000000002890000-0x00000000028CF000-memory.dmp

                Filesize

                252KB

              • memory/3112-215-0x0000000002890000-0x00000000028CF000-memory.dmp

                Filesize

                252KB

              • memory/3112-213-0x0000000002890000-0x00000000028CF000-memory.dmp

                Filesize

                252KB

              • memory/4132-1142-0x0000000005850000-0x0000000005860000-memory.dmp

                Filesize

                64KB

              • memory/4132-1141-0x0000000000EE0000-0x0000000000F12000-memory.dmp

                Filesize

                200KB

              • memory/4872-161-0x0000000000470000-0x000000000047A000-memory.dmp

                Filesize

                40KB